Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2021
Generating Optimal Attack Paths in Generative Adversarial Phishing
2021 IEEE International Conference on Intelligence and Security Informatics (ISI)Pages 1–6https://doi.org/10.1109/ISI53945.2021.9624751Phishing attacks have witnessed a rapid increase thanks to the matured social engineering techniques, COVID-19 pandemic, and recently adversarial deep learning techniques. Even though adversarial phishing attacks are recent, attackers are crafting such ...
- research-articleJanuary 2021
Privacy preserving defect prediction using generalization and entropy-based data reduction
Intelligent Data Analysis (INDA), Volume 25, Issue 6Pages 1369–1405https://doi.org/10.3233/IDA-205504The software engineering community produces data that can be analyzed to enhance the quality of future software products, and data regarding software defects can be used by data scientists to create defect predictors. However, sharing such data ...
- research-articleJanuary 2021
Fault-based testing for discovering SQL injection vulnerabilities in web applications
International Journal of Information and Computer Security (IJICS), Volume 16, Issue 1-2Pages 51–62https://doi.org/10.1504/ijics.2021.117394In this paper we proposed a model to investigate the behaviour of websites when dealing with invalid inputs. Many vulnerabilities rise from invalid inputs. An invalid input is considered as a form of a successful attack if it is processed by the website ...
- research-articleMay 2019
Mining software repositories for adaptive change commits using machine learning techniques
Information and Software Technology (INST), Volume 109, Issue CPages 80–91https://doi.org/10.1016/j.infsof.2019.01.008Abstract ContextVersion Control Systems, such as Subversion, are standard repositories that preserve all of the maintenance changes undertaken to source code artifacts during the evolution of a software system. The documented data ...
- articleJanuary 2018
Evaluating the Understandability of Android Applications
International Journal of Software Innovation (IJSI), Volume 6, Issue 1Pages 44–57https://doi.org/10.4018/IJSI.2018010104Understandability is one of the major quality attributes used to measure the understandability of object oriented software and Android applications based on certain metrics. It is very important in most software development life cycles because ...
- articleJanuary 2017
A New Data Mining-Based Framework to Test Case Prioritization Using Software Defect Prediction
International Journal of Open Source Software and Processes (IJOSSP-IGI), Volume 8, Issue 1Pages 21–41https://doi.org/10.4018/IJOSSP.2017010102Test cases do not have the same importance when used to detect faults in software; therefore, it is more efficient to test the system with the test cases that have the ability to detect the faults. This research proposes a new framework that combines ...
- articleJanuary 2017
Evaluating Maintainability of Open Source Software: A Case Study
International Journal of Open Source Software and Processes (IJOSSP-IGI), Volume 8, Issue 1Pages 1–20https://doi.org/10.4018/IJOSSP.2017010101Maintainability is one of the most important quality attribute that affect the quality of software. There are four factors that affect the maintainability of software which are: analyzability, changeability, stability, and testability. Open source ...
- articleOctober 2016
Test Case Reduction Using Data Mining Technique
International Journal of Software Innovation (IJSI), Volume 4, Issue 4Pages 56–70https://doi.org/10.4018/IJSI.2016100104Software testing is a process of ratifying the functionality of software. It is a crucial area which consumes a great deal of time and cost. The time spent on testing is mainly concerned with testing large numbers of unreliable test cases. The authors' ...
- articleNovember 2012
Dispersion-based prediction framework for estimating missing values in wireless sensor networks
International Journal of Sensor Networks (IJSNET), Volume 12, Issue 3Pages 149–159https://doi.org/10.1504/IJSNET.2012.050448Wireless Sensor Networks (WSNs) have attracted many researchers in the past few years due to their applicability for a wide-range of applications. WSNs rely on unreliable sensing schemes in which a sensor might lose some data due to the inherent ...
- articleNovember 2012
Model Checking Based Classification Technique for Wireless Sensor Networks
The New Review of Information Networking (NRIN), Volume 17, Issue 2Pages 93–107https://doi.org/10.1080/13614576.2012.724286Recently, many data mining techniques have been applied to analyze and interpret the huge volume of data collected from wireless sensor networks. Such techniques, especially classification and clustering, have been used to relate raw data and assign a ...
- research-articleApril 2012
Mutation operators for JADE mobile agent systems
ICICS '12: Proceedings of the 3rd International Conference on Information and Communication SystemsArticle No.: 16, Pages 1–5https://doi.org/10.1145/2222444.2222460Mobile Agent System (MAS) is a distributed software system responsible for supporting and managing mobile agents. It is suitable to develop many applications for mobile computing. Testing and debugging MASs is hard to do, due the complex execution of ...
- ArticleMarch 2011
Implementing and Evaluating a Runtime Conformance Checker for Mobile Agent Systems
ICST '11: Proceedings of the 2011 Fourth IEEE International Conference on Software Testing, Verification and ValidationPages 269–278https://doi.org/10.1109/ICST.2011.62A Mobile Agent System (MAS) is a special kind of distributed system in which the agent software can move from one physical host to another. This paper describes a new approach, together with its implementation and evaluation, for checking the ...
- doctoral_thesisJanuary 2010
Runtime conformance checking of mobile agent systems using executable models
Mobility occurs naturally in many distributed system applications such as telecommunications and electronic commerce. Mobility may reduce bandwidth consumption and coupling and increase flexibility. However, it seems that relatively little work has been ...
- research-articleJuly 2009
Run-time conformance checking of mobile and distributed systems using executable models
PADTAD '09: Proceedings of the 7th Workshop on Parallel and Distributed Systems: Testing, Analysis, and DebuggingArticle No.: 1, Pages 1–11https://doi.org/10.1145/1639622.1639623This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera --- a novel, high-level language supporting the description and execution of models of concurrent, mobile, distributed, and ...