Sciweavers

Share
ISSRE
2008
IEEE
10 years 4 months ago
Automated Fix Generator for SQL Injection Attacks
A critical problem facing today’s internet community is the increasing number of attacks exploiting flaws found in Web applications. This paper specifically targets input valida...
Fred Dysart, Mark Sherriff
ISSRE
2008
IEEE
10 years 4 months ago
Using Fault Modeling in Safety Cases
For many safety-critical systems a safety case is built as part of the certification or acceptance process. The safety case assembles evidence to justify that the design and imple...
Robyn R. Lutz, Ann Patterson-Hine
ISSRE
2008
IEEE
10 years 4 months ago
A QoS-Aware Middleware for Fault Tolerant Web Services
Reliability is a key issue of the Service-Oriented Architecture (SOA) which is widely employed in critical domains such as e-commerce and e-government. Redundancy-based fault tole...
Zibin Zheng, Michael R. Lyu
ISSRE
2008
IEEE
10 years 4 months ago
A Framework for Testing Peer-to-Peer Systems
Developing peer-to-peer (P2P) systems is hard because they must be deployed on a high number of nodes, which can be autonomous, refusing to answer to some requests or even unexpec...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...
ISSRE
2008
IEEE
10 years 4 months ago
Assessing the Effect of Software Failures on Trust Assumptions
The contribution of this paper is a technique to assess whether software failures during operational use can invalidate the trust assumptions and, hence, the adequacy of the softw...
Qian Feng, Robyn R. Lutz
ISSRE
2008
IEEE
10 years 4 months ago
The Effect of the Number of Defects on Estimates Produced by Capture-Recapture Models
Project managers use inspection data as input to capture-recapture (CR) models to estimate the total number of faults present in a software artifact. The CR models use the number ...
Gursimran Singh Walia, Jeffrey C. Carver
ISSRE
2008
IEEE
10 years 4 months ago
Cost Curve Evaluation of Fault Prediction Models
Prediction of fault prone software components is one of the most researched problems in software engineering. Many statistical techniques have been proposed but there is no consen...
Yue Jiang, Bojan Cukic, Tim Menzies
ISSRE
2008
IEEE
10 years 4 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
books