Sciweavers

28 search results - page 5 / 6
» A search-based approach for dynamically re-packaging downloa...
Sort
View
WWW
2010
ACM
14 years 1 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
JSS
2010
107views more  JSS 2010»
13 years 4 months ago
An empirical investigation into branch coverage for C programs using CUTE and AUSTIN
Automated test data generation has remained a topic of considerable interest for several decades because it lies at the heart of attempts to automate the process of Software Testi...
Kiran Lakhotia, Phil McMinn, Mark Harman
IJSNET
2008
126views more  IJSNET 2008»
13 years 6 months ago
Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks
: Interference from colocated networks operating over the same frequency range, becomes an increasingly severe problem as the number of networks overlapping geographically increase...
Razvan Musaloiu-Elefteri, Andreas Terzis
ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 23 days ago
Discovering Packet Structure through Lightweight Hierarchical Clustering
— The complexity of current Internet applications makes the understanding of network traffic a challenging task. By providing larger-scale aggregates for analysis, unsupervised ...
Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, ...
WCRE
2003
IEEE
13 years 11 months ago
GUI Ripping: Reverse Engineering of Graphical User Interfaces for Testing
Graphical user interfaces (GUIs) are important parts of today’s software and their correct execution is required to ensure the correctness of the overall software. A popular tec...
Atif M. Memon, Ishan Banerjee, Adithya Nagarajan