Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Dimitris Mitropoulos"'
Publikováno v:
Atmosphere, Vol 15, Iss 4, p 442 (2024)
Greece and the surrounding areas experienced an early warm spell with characteristics of a typical summer Mediterranean heatwave in mid-May 2020. The maximum 2 m temperature at Kalamata (southern Greece) reached 40 °C on 16 May and at Aydin (Turkey)
Externí odkaz:
https://doaj.org/article/0cfde6fa9c8544678ca4cc8091ad6e46
Publikováno v:
Environmental Sciences Proceedings, Vol 26, Iss 1, p 42 (2023)
Greece experienced an unusual heat wave in mid-May 2020, since it was observed earlier than the common Mediterranean heat wave period. On May 16th, the maximum air temperature at Kalamata (southern Greece) was 40 °C, and at Aydin (western Turkey) it
Externí odkaz:
https://doaj.org/article/007c60fb421f41c4b010596b0616cf44
Publikováno v:
PeerJ Computer Science, Vol 3, p e136 (2017)
With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of
Externí odkaz:
https://doaj.org/article/7606c77eb4c64dd69f09fa18d3600240
Publikováno v:
ESEC/SIGSOFT FSE
Examining the characteristics of software vulnerabilities and the code that contains them can lead to the development of more secure software. We present a dataset (∼1.4 GB) containing vulnerable source code files together with the corresponding, p
Publikováno v:
International Journal of Information Security
Online personal data are rarely, if ever, effectively controlled by the users they concern. Worse, as demonstrated by the numerous leaks reported each week, the organizations that store and process them fail to adequately safeguard the required confi
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:188-203
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection, exploit vulnerabilities in web applications that may accept and process data of uncertain origin without proper validation or filtering, allowing the injection an
Autor:
Thodoris Sotiropoulos, Dimitris Mitropoulos, Diomidis Spinellis, Stefanos Chaliasos, Vaggelis Atlidakis
Publikováno v:
ICSE (Companion Volume)
The ICSE 2021 paper titled "Data-Oriented Differential Testing Object-Relational Mapping Systems" comes with areplication package, which has been awarded with the "Available" badge by the Artifact Evaluation Committee. The artifact contains scripts,
Autor:
Panos Louridas, Diomidis Spinellis, Thodoris Sotiropoulos, Dimitris Mitropoulos, Vitalis Salis
Publikováno v:
ICSE (Companion Volume)
The ICSE 2021 paper titled "PyCG: Practical Call Graph Generation in Python" comes with a replication package with the purpose of providing open access to (1) our prototype call graph generator, namely PyCG, and (2) the data and scripts that replicat
Autor:
Thodoris Sotiropoulos, Dimitris Mitropoulos, Vitalis Salis, Panos Louridas, Diomidis Spinellis
Publikováno v:
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)
ICSE
ICSE
Call graphs play an important role in different contexts, such as profiling and vulnerability propagation analysis. Generating call graphs in an efficient manner can be a challenging task when it comes to high-level languages that are modular and inc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c57ac9faa440361f09598fa308a86277
http://arxiv.org/abs/2103.00587
http://arxiv.org/abs/2103.00587
Autor:
Dimitris Mitropoulos, Stefanos Chaliasos, Vaggelis Atlidakis, Diomidis Spinellis, Thodoris Sotiropoulos
Publikováno v:
ICSE
We introduce, what is to the best of our knowledge, the first approach for systematically testing Object-Relational Mapping (ORM) systems. Our approach leverages differential testing to establish a test oracle for ORM-specific bugs. Specifically, we
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::62cfac3e9a4da8f549fd045e0b60bb3b