Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been...
Istehad Chowdhury, Brian Chan, Mohammad Zulkernine
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Software product line engineering is mostly about the systematic management of commonality and variability between product line members. The effectiveness of this approach thus ve...
We present a tool for performance modeling of Service Oriented Architectures (SOAs). As mission-critical use of whole-ofgovernment SOAs become pervasive, the capability to model a...
VieDAME is a tool for monitoring and dynamic service adaptation of BPEL processes. The tool monitors partner service interaction to compute Quality of Service (QoS) data and perfo...
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
ion-based Requirements Management Anthony Finkelstein, University College London Leah Goldin, Afeka-Tel Aviv College of Engineering ROA workshop - ICSE 2006 of Abstraction in Softw...