The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software engineering involves a lot of change as code artifacts are not only created once but maintained over time. In the last 25 years, major paradigms of program development have arisen – agile development with refactorings, software product lines, moving sequential code to multicore or cloud, etc. Each is centered on particular kinds of change; their conceptual foundations rely on transformations...
In this short position paper I consider the contributions that software engineering as a discipline can make to the development and implementation of government policy. It is intended to support the growing body of knowledge on scientific advice in government and to encourage software engineers to engage with policy and the policy community.
Massively Open Online Courses (MOOCs) provide a unique opportunity to reach out to students who would not normally be reached by alleviating the need to be physically present in the classroom. However, teaching software security coursework outside of a classroom setting can be challenging. What are the challenges when converting security material from an on-campus course to the MOOC format? The goal...
The main aim of this paper is to explain the various types of testing techniques, methods and levels(functional, unit) which are being used by many Software industries. These software industries use these techniques to find faults or bugs in the final software created by them. Here the software testers are experts in the IT Industry who act like customers and review the software to check whether it...
Fingerprint recognition of network equipment is closely related to network security. Router equipment, as one of the critical device in network, is the key object of study on the recognition of network equipment. Due to the biggest market shares of Cisco routers, which dominate the data exchange of internet, it's significant to study the recognition of Cisco routers for safeguarding network security...
Open source projects and the globalization of the software industry have been a driving force in reuse of system components across traditional system boundaries. As a result, vulnerabilities and security concerns are no longer only impact individual but now also global software ecosystems. Known vulnerabilities and security concerns are reported in specialized vulnerability databases, which often...
The prosperity of online rating system makes it an important place for malicious vendors to mislead public's online decisions, whereas the security related studies are lagging behind. In this work, we adopt a quantile regression model to investigate influential factors on online user choices and reveal the “self-exciting” property of online market. Inspired by these findings, we propose a novel iterative...
Over the last decade, a globalization of the software industry took place, which facilitated the sharing and reuse of code across existing project boundaries. At the same time, such global reuse also introduces new challenges to the software engineering community, with not only components but also their problems and vulnerabilities being now shared. For example, vulnerabilities found in APIs no longer...
Automated white-box testing is a major issue in software engineering. In previous work, we introduced LTest, a generic and integrated toolkit for automated white-box testing of C programs. LTest supports a broad class of coverage criteria in a unified way (through the label specification mechanism) and covers most major parts of the testing process – including coverage measurement, test generation...
The use of Internet of Things (IoT) devices has grown significantly in the past decade. While IoT is expected to improve life for many by enabling smart living spaces, the number of security risks that consumers and businesses will face is also increasing. A high number of vulnerable IoT devices are prone to attacks and easy exploit. Existing research has focused on security that must be implemented...
The paper is focused on increasing the security measures against malicious attacks by protecting hardware that exchange data. This is in contrast to studying or improving the existing methods that rely on only securing the data. We consider errors that may appear on a way between transmitting and receiving modules in different microelectronic devices and some of such errors may be injected by potential...
In order for an election system to be trusted, it needs to be verifiable. Methods must exist to check that the votes are cast as intended by the voters. There must be strong evidence that the machines function as they are supposed to function. Voters should feel confident that the election is conducted fairly and accurately. This paper first outlines the major concerns about election technologies...
Most curricula in Informatics and other sciences at the universities are in permanent change. An informatics foresight is useful to update the study programs and to develop and offer new study curricula tuned for the local needs. More of these types of studies are developed by governmental departments and specialized groups because of the number of variables to analyse, the complexity of scenarios,...
To provide reliable network and cloud services, it is necessary to perform precise monitoring and security analysis of cloud, ISP and local networks. Current SOHO (Small Office Home Office) devices have very limited resources and can not provide precise network security monitoring in local networks. Therefore we have designed small and low-power network probe which is able to analyse the network traffic...
Internet of things is a latest technology which has good number of benefits to its users. It's an emerging technology where we connect daily objects to the internet for sending and receiving data. For an example home automation system, various durable goods, vehicles (cars and trucks) sensors. We can combine all these with internet. We can send and receive information as per user's requirement. IoT...
Many studies analyze issue tracking repositories to understand and support software development. To facilitate the analyses, we share a Mozilla issue tracking dataset covering a 15-year history. The dataset includes three extracts and multiple levels for each extract. The three extracts were retrieved through two channels, a front-end (web user interface (UI)), and a back-end (official database dump)...
While the domain of big data is anticipated to affect many aspects of human endeavour, there are numerous challenges in building big data applications among which is how to address big data characteristics in quality requirements. In this paper, we propose a novel, unified, approach for specifying big data characteristics (e.g., velocity of data arrival) in quality requirements (i.e., those requirements...
A modern automotive design contains over a hundred microprocessors, several cyber-physical modules, connectivity to a variety of networks, and several hundred megabytes of software. The future is anticipated to see an even sharper rise in complexity of this electronics, with the imminence of driverless vehicles, the potential of connected automobiles within a few years, and work towards seamless integration...
The ever-increasing number of IoT devices necessitates a secure and scalable infrastructure to store and process generated data. Blockchain is an ideal choice with its decentralized, trustless architecture. However, low-power IoT end-devices do not possess enough horsepower to run a software client for intensive blockchain calculations. The purpose of this paper is to create a proof of concept to...
This demonstration is a proof of concept for the design of secure IoT frameworks using Secure Elements as trusted TLS/DTLS stack. It presents a connected plug built over a cheap Raspberry Pi board, whose data exchanges over TCP/IP are controlled by a javacard providing TLS server services. In a smart grid context it could be used by energy operators in order to authorize/monitor battery charging.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.