Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
One of the main problems in applying evolutionary optimisation methods is the choice of operators and parameter values. This paper propose a competitive evolution method, in which ...
This paper presents a method and a tool for building trustable OO components. The methodology is based on an integrated design and test approach for OO software components. It is ...
In this study, a neural network based approach is used to predict the presence of Maturity Onset Diabetes type 3, referred as MODY3 Type II diabetes mellitus. The study has used b...
Nawaz Khan, Chukwuemeka A. Ikejiaku, Shahedur Rahm...
Temporal correctness is crucial to the dependability of real-time systems. Few methods exist to test for temporal correctness and most existing methods are ad-hoc. A problem with ...