There is an increasing community of researchers trying to draw attention to the importance of evaluation issues. Some approaches can be followed to evaluate the quality of softwar...
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Test case generation is an expensive, tedious, and errorprone process in software testing. In this paper, test case generation is accomplished using an Extended Finite State Machi...
We propose an approach (based on Water Transformations) to migrate web applications between various web development frameworks. This migration process preserves the structure of t...