The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we proposed a framework for detecting network's intrusions using Genetic Algorithm (GA) with multiple criteria. First of all, we build an intrusion detection system (IDS) using a pure GA with multiple selection methods. Then, we proposed one of the few hybrid algorithms in the literature, which is hybridized using a GA and a Tabu search (TS) algorithm. The proposed hybrid algorithm...
Despite the fact that wireless systems are overwhelming most of nowadays applications, wiring networks are still forming a pivotal anchor in many controls and security units. Thus, ensuring the reliable operation of such networks necessitates investing in techniques dedicated for their protection. A vast majority of such methods rely on the presence of a reference model of the network. In this paper,...
The systems and the software in the domain of industrial trucks are becoming increasingly complex due to the rapidly increasing demand for more functionality. This leads to an even faster rising effort for manual verification activities. Therefore, automated testing techniques need to be introduced into the verification process.In this work, a search-based test generation technique has been adapted...
Testing and fixing Web Application Firewalls (WAFs) are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases, i.e., attacks. Once vulnerabilities have been identified, the WAF needs to be fixed by augmenting its rule set to filter attacks without blocking legitimate requests....
Combinatorial testing is a promising technique for testing highly-configurable systems. Software systems become larger and more complex every day, and due to the time and cost limitations, it is infeasible to test everything in a software with a large configuration space, or a graphical user interface with many settings and events. Combinatorial testing generates an interaction test suite to discover...
Testing of software is a worthwhile aspect of software development life cycle. Effective and efficient test cases must be designed to test the software which will reduce the testing cost, time and effort. Nowadays, testing an aspect-oriented program is becoming a challenge for the testers. This paper proposes a novel approach to generate test case scenarios for an aspect oriented program derived from...
Nowadays applications need to deal with a large number of concurrent requests. These systems must be stress tested to ensure that they can function correctly under a load. In this context, a research field called Search-based Software Testing has become increasingly important. Most of the search-based test methods are based on single objective optimization. In the case of multi-objective optimization...
Distribution has a large portion of the total cost of sales of goods or product. It cause high cost transport and risk to the quality of the goods which are distributed, especially perishable product. Perishable product quality is greatly influenced by distribution, thus when the distribution not optimal, it will risk very big deal of broken product. In connection with this matter, the distribution...
To validate whether RESTful Web service systemscould provide available services, it is indispensable to perform efficient and effective functional testing before their large-scale deployment, where the pivotal and first step is to automatically generate valid test data. In this paper, we develop a parallelized and automated test data generation tool based on the Hadoop, where mutation testing and...
Hyper-heuristics are advanced high-level search methodologies that solve hard computational problems indirectly via low-level heuristics. Choice function based hyper-heuristics are selection and acceptance hyper-heuristics that use statistical information to rank low-level heuristics for selection. In this paper, we describe a choice function based hyper-heuristic called Pairwise Choice Function based...
It is becoming increasingly important to make possible constitutive modelling and simulation of material behaviour for the prediction of possible failures in material. This can allow to the optimization of design of highly loaded engineering components. In order to achieve that goal, material parameters should be accurately determined for the chosen material model. The major step in material parameters...
Swarm robotic systems are often considered to be dependable. However, there is little empirical evidence or theoretical analysis showing that dependability is an inherent property of all swarm robotic system. Recent literature has identified potential issues with respect to dependability within certain types of swarm robotic algorithms. There appears to be a dearth of literature relating to the testing...
Mutation testing is a method used to assess and improve the fault detection capability of a test suite by creating faulty versions, called mutants, of the system under test. Evolutionary Mutation Testing (EMT), like selective mutation or mutant sampling, was proposed to reduce the computational cost, which is a major concern when applying mutation testing. This technique implements an evolutionary...
Regression testing is a process used to measure the validity of the system during software maintenance. Regression testing process is very expensive and must be introduced each time a modification occurs in software to ensure that the system still work and that the new modification doesn't cause any bugs, this process depends on selecting test cases from a test suite. Selection of test cases is very...
The advancement of information technology and research in finance have recently led to flash decision making and actions by computer algorithms in order to respond to fast events occurring in the stock markets. This new area of technology involves the implementation of high-speed trading strategies which have generated significant amount of activity and information for financial research. In this...
During software evolution, the source code of a system frequently changes due to bug fixes or new feature requests. Some of these changes may accidentally degrade performance of a newly released software version. A notable problem of regression testing is how to find problematic changes (out of a large number of committed changes) that may be responsible for performance regressions under certain test...
In this paper, a novel method to do feature selection to detect botnets at their phase of Command and Control (C&C) is presented. A major problem is that researchers have proposed features based on their expertise, but there is no a method to evaluate these features since some of these features could get a lower detection rate than other. To this aim, we find the feature set based on connections...
Extended Finite State Machines (EFSMs) are widely used to model the behavior of a system. Testing from EFSMs is expressed in terms of generating transition paths and then deriving test data to trigger these paths. However, a transition path may be infeasible, thus it is impossible to generate test data to execute it. In this paper, after generating a set of transition paths that satisfy the requirement-based...
Systems are frequently regression tested for frequently occurring changes due to corrective, preventive, adaptive or perfective actions. Regression testing is used to prevent the undesired effect of these changes on the previously tested version. Due to these changes, new test cases become part of the test suite making it huge and inefficient for ‘retest all’ strategy. The ultimate solution of this...
Artificial immune system (AIS) is considered as an adaptive computational intelligence method that could be used for detecting and preventing current computer network threats. AIS generates Antibodies (self) competent in recognizing Antigen (non-self), which is considered as an anomaly technique. This paper aims to develop artificial immune system (AIS) that consists of two levels. Level one is developed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.