The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
Concurrent data structures are often tested under stress to detect bugs that can only be exposed by some rare interleavings of instructions. A typical stress test for a concurrent data structure creates a number of threads that repeatedly invoke methods of the target data structure. After a failure is detected by a stress test, developers need to localize the fault causing the failure. However, the...
Maintaining package-based Linux operating system distributions and addressing their evolution have always been a challenge. Since all packages that form a distribution of Linux Operating system interact with each other, it leads to complicated dependency relationships of each distribution. Current package managers only provide a local view of the dependency relationship. It is still a lack for distribution...
Attackers who designed malware seem to be so cautious that most of the malware are disguised as normal apps. This brings about huge difficulties to detect the malware. Similar with traditional PC testing, there are two main detection methods for Android malware: static analysis and dynamic monitoring. However, these methods inevitably face the challenge of code confusion performance cost. In this...
Constructing effective representations is a critical but challenging problem in multimedia understanding. The traditional handcraft features often rely on domain knowledge, limiting the performances of exiting methods. This paper discusses a novel computational architecture for general image feature mining, which assembles the primitive filters (i.e. Gabor wavelets) into compositional features in...
Self-similarity is one of the most important characteristics of real network traffic. Constructing an accurate model can reflect the real network environment precisely. It is also an effective measure to predict the upcoming network traffic, thus ensuring the quality and reliability of network service. In this paper, we present a cluster-based distributed system, which is based on FGN(Fraction Gaussian...
Induction motors are widely used in industry, and usually have a long life. To predict the life and reliability of the motors within a reasonable time, a simple and available accelerated degradation testing method is presented. To simulate the unbalanced load on the motor, the lamina with circular holes is mounted on the shaft of the motor eccentrically, and different unbalanced loads are obtained...
Because of the fast growth of Web application and relative technology, the automatic testing for Web has become more and more complexity. This paper proposed an automatic system for Web-app functional testing which based on a XML description and also integrated the web pagespsila structure analysis. It improved the traditional way of record, and it can auto-generate test data and test cases by the...
Rough Set Theory has been widely used in pattern recognition. In this paper, the rough set theory has been applied to the intrusion detection. An effective method based rough set for anomaly intrusion detection with low overhead and high efficiency has been presented. The method is based on Rough Set Theory to extract a set of detection rules with a minimal size as the normal behavior model from the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.