Sciweavers

335 search results - page 11 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
IWPSE
2007
IEEE
14 years 2 months ago
Using concept analysis to detect co-change patterns
Software systems need to change over time to cope with new requirements, and due to design decisions, the changes happen to crosscut the system’s structure. Understanding how ch...
Tudor Gîrba, Stéphane Ducasse, Adrian...
JIPS
2010
162views more  JIPS 2010»
13 years 3 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
HAIS
2009
Springer
14 years 1 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
OOPSLA
2005
Springer
14 years 2 months ago
Modeling architectural patterns using architectural primitives
Architectural patterns are a key point in architectural documentation. Regrettably, there is poor support for modeling architectural patterns, because the pattern elements are not...
Uwe Zdun, Paris Avgeriou
ASE
2011
13 years 6 days ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie