The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malicious software has become a major threat to modern society, not only due to the increased complexity of the malware itself but also due to the exponential increase of new malware each day. This study tackles the problem of analyzing and classifying a high amount of malware in a scalable and automatized manner. We have developed a distributed malware testing environment by extending Cuckoo Sandbox...
Malicious software has become a major threat to modern society, not only due to the increased complexity of the malware itself but also due to the exponential increase of new malware each day. This study tackles the problem of analyzing and classifying a high amount of malware in a scalable and automatized manner. We have developed a distributed malware testing environment by extending Cuckoo Sandbox...
Number of security vulnerabilities in web application has grown with the tremendous growth of web application in last two decades. As the domain of Web Applications is maturing, large number of empirical studies has been reported in web applications to address the solution of vulnerable web application. However, before advancing towards finding new approaches of web applications security vulnerability...
Congenital malformations (CM) are abnormalities of structures arising during the prenatal development and hampering body functions later in life. Causes of CM can be genetic, environmental or any kind of drug exposure during the pregnancy. CM is one of the most important causes of infant mortality in the developing countries. In Pakistan 6–9% of the perinatal deaths are attributed to CM, but a comprehensive...
In today's ever increasing demand on loosely coupled systems, software providers need to produce solutions that are flexible enough to be configured at runtime, yet maintaining high quality. One way to address the quality of such systems is through testing. Software testing provides software providers and their clients with techniques to characterize the internal and external quality of their systems,...
Improvement of classification accuracy is importance in data analysis problems. Enhancement of techniques have been proposed previously to address the problems as regard to classification performance, however, the issues of misclassification and noise elimination in the early stage of processing have been ignored by many researchers. If these problems were addressed, the performance of the classification...
One important factor for the patients in a postoperative recovery is hypothermia. The doctor must decide whether the patients should be sent to another place with better medical therapy. We therefore adopt the proposed PSO (particle swarm optimization) based Fuzzy classifier to retrieve the crisp rules from the postoperative given medical data from UCI machine learning database, where the rules can...
A large part of Web traffic on e-commerce sites is generated not by human users but by Internet robots: search engine crawlers, shopping bots, hacking bots, etc. In practice, not all robots, especially the malicious ones, disclose their identities to a Web server and thus there is a need to develop methods for their detection and identification. This paper proposes the application of a Bayesian approach...
We are now living in the age of Big Data. The amount of data being generated every single second is beyond comprehensible. Human capacity for manual data analysis is nowhere near the rate at which new data is being captured. Video data is one of the major contributors to this data flood. The sheer size of this data makes it impossible to store it on an independent node, let alone classify it. This...
There is much enthusiasm around web services in today's world. Web Services take the advantage of internet to communicate between two electronic devices connected via a network. Testing a Web Service is a challenge as the Service Requester does not have the source code and somehow needs to fully test the impact of changes on his application. Regression testing verifies the integrity of the application...
Financial fraud is a criminal act, which violates the law, rules or policy to gain unauthorized financial benefit. The major consequences are loss of billions of dollars each year, investor confidence or corporate reputation. A study area called Financial Fraud Detection (FFD) is obligatory, in order to prevent the destructive results caused by financial fraud. In this study, we propose a new method...
When enterprises outsource maintenance of IT systems to service providers, thorough knowledge acquisition is critical to the success of the engagement. Program comprehension contributes significantly to acquiring knowledge of the IT systems. It is a common practice to execute test scripts to identify critical scenarios in the system and then trace these as flows in the programs. Instead of executing...
Software code review is a well-established software quality practice. Recently, Modern Code Review (MCR) has been widely adopted in both open source and proprietary projects. To evaluate the impact that characteristics of MCR practices have on software quality, this paper comparatively studies MCR practices in defective and clean source code files. We investigate defective files along two perspectives:...
Build systems contain a lot of configuration knowledge about a software system, such as under which conditions specific files are compiled. Extracting such configuration knowledge is important for many tools analyzing highly-configurable systems, but very challenging due to the complex nature of build systems. We design an approach, based on SYMake, that symbolically evaluates Make files and extracts...
Component-based software development (CBSD)has proved to be a highly useful way of developing software using re-usable components, especially within a short time frame. The biggest challenge faced during development (specially testing) of component-based software is that the source-code of components is not available. Due to this, the traditional testing techniques cannot be applied directly while...
Abstract- Many engineers are exposed to binary data. These can be files or data exchanged over network links. When involved in the verification and validation of systems that deal with specific protocols or binary data storage, it is often tedious to analyse the hexadecimal dumps in order to find specific parameters of interest. Despite detailed protocol specifications, it takes a lot of manual effort...
This paper identifies three problems when testing software that uses Hadoop-based big data techniques. First, processing big data takes a long time. Second, big data is transferred and transformed among many services. Do we need to validate the data at every transition point? Third, how should we validate the transferred and transformed data? We are developing a novel big data test framework to address...
The effort and expertise required for manually crafting the models for model-based testing (MBT) is a major obstacle slowing down its industrial adoption. For implemented and executable systems, there are approaches to automate some part or even the whole process of creating the models for MBT. Recently, using extracted models for testing graphical user interface (GUI) applications has been a popular...
The process of testing Integrated Circuits involves a huge amount of data: electrical circuit measurements, information from wafer process monitors, spatial location of the dies, wafer lot numbers, etc. In addition, the relationships between faults, process variations and circuit performance are likely to be very complex and non-linear. Test (and its extension to diagnosis) should be considered as...
In this growing world, technologies and methodologies are very vast and are growing at faster pace. Industries and customers prefer to work on high quality product in a very short time and with more efficiency. Customers prefer project that are not prone to faults and work effectively. In order to develop any project, several phases are involved in their development, but approximately half of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.