Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Mai, Xuan Phu"'
Autor:
Mai, Xuan Phu
Motivation and Context. Modern Internet-based services (e.g., home-banking, personal-training, healthcare) are delivered through Web-oriented software systems which run on multiple and different devices including computers, mobile devices, wearable d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::5a8539059355974bae790b80319d9981
http://orbilu.uni.lu/handle/10993/44344
http://orbilu.uni.lu/handle/10993/44344
Publikováno v:
info:eu-repo/grantAgreement/EC/H2020/694277
We present a metamorphic testing tool that alleviates the oracle problem in security testing. The tool enables engineers to specify metamorphic relations that capture security properties of Web systems. It automatically tests Web systems to detect vu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::0ec37994ff557a0c179deb74e487e9cb
http://orbilu.uni.lu/handle/10993/43205
http://orbilu.uni.lu/handle/10993/43205
Publikováno v:
info:eu-repo/grantAgreement/EC/H2020/694277
We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious users). MCP relies on Natural Language Processin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::64fe70a43578135fe157997755a95225
http://orbilu.uni.lu/handle/10993/39603
http://orbilu.uni.lu/handle/10993/39603
Publikováno v:
info:eu-repo/grantAgreement/EC/H2020/694277
To facilitate communication among stakeholders, software security requirements are typically written in natural language and capture both positive requirements (i.e., what the system is supposed to do to ensure security) and negative requirements (i.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::c2d4f6bcd5db6d9e94d82855eb62f9e4
http://orbilu.uni.lu/handle/10993/36301
http://orbilu.uni.lu/handle/10993/36301
Defining and addressing security and privacy requirements in mobile apps is a significant challenge due to the high level of transparency regarding users' (private) information. In this paper, we propose, apply, and assess a modeling method that supp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::678e0c6267d2fda806adae6582d51f5d
http://orbilu.uni.lu/handle/10993/31653
http://orbilu.uni.lu/handle/10993/31653
Publikováno v:
CISDA
Malware is a program used to disrupt computer operation or to gather the sensitive information or to gain access to private computer system. Malware detection methods can only work well on some specific types of malware. For example, API/function bas
Publikováno v:
Lecture Notes in Computer Science
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM)
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.688-700, ⟨10.1007/978-3-662-45237-0_62⟩
Computer Information Systems and Industrial Management ISBN: 9783662452363
CISIM
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM)
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.688-700, ⟨10.1007/978-3-662-45237-0_62⟩
Computer Information Systems and Industrial Management ISBN: 9783662452363
CISIM
Part 9: Various Aspects of Computer Security; International audience; Nowadays, malware is growing rapidly through the last few years and becomes more and more sophisticated as well as dangerous. A striking malware is obfuscation malware that is very
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a0bf4f29178e73fb30ca37b8b6b2fbe4
https://hal.inria.fr/hal-01405667/file/978-3-662-45237-0_62_Chapter.pdf
https://hal.inria.fr/hal-01405667/file/978-3-662-45237-0_62_Chapter.pdf