The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network attack graphs are a type of analysis tool that can be used to determine the impact that security vulnerabilities have on the network. It is important, then, for attack graphs to be able to represent enough information to aid this analysis. Moreover, they must be able to handle and integrate new vulnerabilities that are being discovered by the security community. We developed a prototype tool...
The number of software vulnerabilities discovered and publicly disclosed is increasing every year; however, only a small fraction of them is exploited in real-world attacks. With limitations on time and skilled resources, organizations often look at ways to identify threatened vulnerabilities for patch prioritization. In this paper, we present an exploit prediction model that predicts whether a vulnerability...
Malawi Children's Village (MCV) operates a secondary school of approximately 560 students in Mangochi, Malawi, and its strategic goal is to add computer studies into its curriculum. The first step to achieving this goal is for MCV to establish and sustain a teachers-only computer lab. This case study examines the process by which a team of volunteers identified this as the first step, the team's recommendations...
The aim of this paper is to introduce a semantic methodology using ontology in order to improve results of data mining in judicial decisions database. An intelligent and automatic method to search for sentences in lawsuits related to the one in trial is presented. A judicial ontology is built with and without rules from experts. The method can provide judiciary celerity, seeking to solve the yearning...
Prior work showed that in 2001 and 2003, workers in America who used spreadsheets or databases, and who did programming, earned 9 to 13% more than similar workers who did not use spreadsheets nor did programming. Such a fact, if still true, could help motivate workers to do programming and/or to create spreadsheets. This paper presents a study replicating these analyses using 2012 data. The results...
Opinions are key determinants to many of the activities related to software development. The perceptions of developers about an API, and the choices they make about whether and how they should use it, may, to a considerable degree, be conditioned upon how other developers see and evaluate the API. Given the plethora of APIs available for a given development task and the advent of developer forums...
The use of static analysis is clearly recommended in automotive safety standard ISO26262 to reduce software runtime errors. A comparative study of top performance tools is provided by analyzing production code of AUTOSAR application software components for an Instrument Panel Cluster. A quantitative analysis based on an alert classification model and performance metrics has been carried out. The goal...
Key Performance Indicators (KPIs) are used to inspect the performance and progress of businesses. This study introduces a new, integrated approach to manage KPIs in the context of decentralized information efficiently and to address the visual and managerial gaps existing in companies. The proposed Business Indicator Management (BIM) system is essential for any businesses to meet their needs in terms...
Program analysis is the process of gathering deeper insights about a source code and analysing them to resolve software problems of arbitrary complexity. The key challenge in program analysis is to keep it fast, precise and straightforward. This research focuses on three key objectives to achieve an efficient program analysis: (i) expressive data representation, (ii) optimised data structure and (iii)...
Malicious software poses a great risk to critical infrastructure. Researchers have proposed numerous ways to analyze malware behavior in order to understand and respond to this threat. However, only little attention has been paid to the organization of the malware analysis process itself. In this paper we present the Malware Analysis and Storage System (MASS), a novel framework for malware analysis...
In an iterative and incremental development environment software regression testing plays an important role; it helps to ensure the reliability in the building process of a software product. The optimization of a regression test depends on the size of the test suite to be executed. Regression testing helps to verify existing modifications (fixing bugs) or verify new features added to a software product...
Our research work aims to develop a monitoring and control system in potentially explosive environments using microcontrollers. The paper presents a micro-system designed and achieved within the Metrology Laboratory of S.C. SIP S.A. It describes the user interface software structure built and used with the acquisition and transfer modules as well as managing the signals received in a SQL SERVER 2008...
In this paper, a description of the software is provided that allows to obtain an automated objective quantitative assessment of the patient's speech quality. The evaluation is carried out in the process of speech rehabilitation after surgical treatment of oncological diseases of the organs of the speech-forming tract. The evaluation is obtained based on comparing patient records before the operation...
Existing software analysis methods for performanceand coverage are typically tied to the source code of software applications.In this work, we extend these methods to the Graphical User Interfaces (GUI) of applications, motivated by the desire to bring the user perspective into focus of software quality assurance and testing at the GUI level. We present and discuss various profiling procedures, their...
The issues of software and hardware development are considered of data logging into systems of testing complex objects. The describes the architecture of a system for testing complex scientific-technical objects. In the list of original elements of the concept of building highly reliable, fast-reconfigurable interactive test monitoring and control systems: — using of original technology of representation...
A method of PV pump system calculation for small irrigation is presented. The solar radiation calculation was performed with PVGIS software. The numerical example contains pump flow rates, pumped water volumes (daily, monthly and for all irrigation period)
In our daily life we develop many activities that result imperceptible for the majority of us because the null effort that they represent to develop them, however, when we most develop those activities with any type of restriction, they acquire a higher level of difficulty. One simple activity is the communication process; we develop it in an easy way during almost all day, however, for people with...
The field of non-biological ecosystem studies is riddled with different kind of ecosystems, connections and relations of which are rarely discussed. For example, the field of software ecosystems is influenced by both natural and business ecosystems, as studies have identified a strong inspiration from both. In this study, we survey the ecosystem literature and identify how different types of ecosystems...
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
The aim of this paper is to show the strengths and the weakness of process mining tools in post-delivery validation. This is illustrated on two use-cases from a real-world system. We also indicate what type of research has to be done to make process mining tools more usable for validation purposes.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.