Results 61 to 70 of about 5,960 (196)

A Comprehensive Framework for Testing Goal‐Oriented NFPs in Software Product Lines

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 10, October 2025.
Testing non‐functional properties (NFPs) is often underprioritized in software product line engineering (SPLE), leading to significant quality risks. This paper introduces a comprehensive framework utilizing goal models for testing NFPs in software product lines developed with the feature and goal model approach. The framework offers solutions to three
Ibtesam Bashir Gwasem
wiley   +1 more source

XSS-FP: Browser Fingerprinting using HTML Parser Quirks [PDF]

open access: yes, 2012
There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting.
Abgrall, Erwan   +5 more
core   +3 more sources

QuantumNetSec: Quantum Machine Learning for Network Security

open access: yesInternational Journal of Network Management, Volume 35, Issue 4, July/August 2025.
ABSTRACT As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security ...
Diego Abreu   +3 more
wiley   +1 more source

A PU‐learning based approach for cross‐site scripting attacking reality detection

open access: yesIET Networks
Cross‐site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with ...
Wenbo Wang, Peng Yi, Huikai Xu
doaj   +1 more source

Retroactive auditing [PDF]

open access: yes, 2011
Retroactive auditing is a new approach for detecting past intrusions and vulnerability exploits based on security patches. It works by spawning two copies of the code that was patched, one with and one without the patch, and running both of them on the ...
Kaashoek, M. Frans   +2 more
core   +3 more sources

A Fuzzy Classifier-Based Penetration Testing for Web Applications [PDF]

open access: yes, 2018
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space.
Alhassan, J. K.   +5 more
core   +1 more source

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

Web Security Detection Tool [PDF]

open access: yes, 2008
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core   +1 more source

Search Multiple Types of Research Assets From Jupyter Notebook

open access: yesSoftware: Practice and Experience, Volume 55, Issue 5, Page 946-965, May 2025.
ABSTRACT Objective Data science and machine learning methodologies are essential to address complex scientific challenges across various domains. These advancements generate numerous research assets such as datasets, software tools, and workflows, which are shared within the open science community. Concurrently, computational notebook environments like
Na Li, Siamak Farshidi, Zhiming Zhao
wiley   +1 more source

Positive dementia caregiving in 30 days (PDC30): Study protocol of a randomized controlled trial of a self‐guided automated online training program

open access: yesApplied Psychology: Health and Well-Being, Volume 17, Issue 1, Page 1-15, 25 February 2025.
Abstract The Benefit‐Finding Intervention, a face‐to‐face psychoeducation program with a focus on the positive meanings of caregiving, has been found to reduce depressive symptoms and burden in dementia caregivers. The program was revamped into a computer‐delivered web‐based program to enable 24/7 access without location restriction.
Sheung‐Tak Cheng, Peter H. F. Ng
wiley   +1 more source

Home - About - Disclaimer - Privacy