Sciweavers

419 search results - page 8 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
SRDS
2010
IEEE
13 years 6 months ago
A Study on Latent Vulnerabilities
Abstract-Software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptibl...
Beng Heng Ng, Xin Hu, Atul Prakash
CSFW
2009
IEEE
14 years 3 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 9 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
ICSE
2011
IEEE-ACM
13 years 13 hour ago
StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements
Software projects typically rely on system analysts to conduct requirements elicitation, an approach potentially costly for large projects with many stakeholders and requirements....
Soo Ling Lim, Daniela Damian, Anthony Finkelstein
INFOCOM
2008
IEEE
14 years 3 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan