Results 61 to 70 of about 5,960 (196)
A Comprehensive Framework for Testing Goal‐Oriented NFPs in Software Product Lines
Testing non‐functional properties (NFPs) is often underprioritized in software product line engineering (SPLE), leading to significant quality risks. This paper introduces a comprehensive framework utilizing goal models for testing NFPs in software product lines developed with the feature and goal model approach. The framework offers solutions to three
Ibtesam Bashir Gwasem
wiley +1 more source
XSS-FP: Browser Fingerprinting using HTML Parser Quirks [PDF]
There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting.
Abgrall, Erwan +5 more
core +3 more sources
QuantumNetSec: Quantum Machine Learning for Network Security
ABSTRACT As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security ...
Diego Abreu +3 more
wiley +1 more source
A PU‐learning based approach for cross‐site scripting attacking reality detection
Cross‐site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with ...
Wenbo Wang, Peng Yi, Huikai Xu
doaj +1 more source
Retroactive auditing is a new approach for detecting past intrusions and vulnerability exploits based on security patches. It works by spawning two copies of the code that was patched, one with and one without the patch, and running both of them on the ...
Kaashoek, M. Frans +2 more
core +3 more sources
A Fuzzy Classifier-Based Penetration Testing for Web Applications [PDF]
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space.
Alhassan, J. K. +5 more
core +1 more source
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source
Web Security Detection Tool [PDF]
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core +1 more source
Search Multiple Types of Research Assets From Jupyter Notebook
ABSTRACT Objective Data science and machine learning methodologies are essential to address complex scientific challenges across various domains. These advancements generate numerous research assets such as datasets, software tools, and workflows, which are shared within the open science community. Concurrently, computational notebook environments like
Na Li, Siamak Farshidi, Zhiming Zhao
wiley +1 more source
Abstract The Benefit‐Finding Intervention, a face‐to‐face psychoeducation program with a focus on the positive meanings of caregiving, has been found to reduce depressive symptoms and burden in dementia caregivers. The program was revamped into a computer‐delivered web‐based program to enable 24/7 access without location restriction.
Sheung‐Tak Cheng, Peter H. F. Ng
wiley +1 more source

