Web application security assessment by fault injection and behavior monitoring

YW Huang, SK Huang, TP Lin, CH Tsai - Proceedings of the 12th …, 2003 - dl.acm.org
As a large and complex application platform, the World Wide Web is capable of delivering a
broad range of sophisticated applications. However, many Web applications go through …

[图书][B] Neural networks: computational models and applications

H Tang, KC Tan, Z Yi - 2007 - books.google.com
Neural Networks: Computational Models and Applications covers a wealth of important
theoretical and practical issues in neural networks, including the learning algorithms of feed …

WCET (m) estimation in multi-core systems using single core equivalence

R Mancuso, R Pellizzoni, M Caccamo… - 2015 27th Euromicro …, 2015 - ieeexplore.ieee.org
Multi-core platforms represent the answer of the industry to the increasing demand for
computational capabilities. From a real-time perspective, however, the inherent sharing of …

A testing framework for web application security assessment

YW Huang, CH Tsai, TP Lin, SK Huang, DT Lee… - Computer Networks, 2005 - Elsevier
The rapid development phases and extremely short turnaround time of Web applications
make it difficult to eliminate their vulnerabilities. Here we study how software testing …

Recent advances in web testing

P Tonella, F Ricca, A Marchetto - Advances in Computers, 2014 - Elsevier
Web applications have become key assets of our society, which depends on web
applications for sectors like business, health-care, and public administration. Testing is the …

WARE: A tool for the reverse engineering of web applications

GA Di Lucca, AR Fasolino, F Pace… - Proceedings of the …, 2002 - ieeexplore.ieee.org
The development of Web sites and applications is increasing dramatically to satisfy the
market requests. The software industry is facing the new demand under the pressure of a …

Reverse engineering Web applications: the WARE approach

GA Di Lucca, AR Fasolino… - Journal of Software …, 2004 - Wiley Online Library
The rapid, progressive diffusion of Web applications in several productive contexts of our
modern society is laying the foundations of a renewed scenario of software development …

Multi-level logic optimization by redundancy addition and removal

KT Cheng, LA Entrena - … with the European Event in ASIC …, 1993 - ieeexplore.ieee.org
A multilevel logic optimization technique is presented that is a generalization of redundancy
removal and Boolean resubstitution. The network is optimized through iterative addition and …

Comprehending web applications by a clustering based approach

GA Di Lucca, AR Fasolino, F Pace… - Proceedings 10th …, 2002 - ieeexplore.ieee.org
The number and complexity of Web applications are increasing dramatically to satisfy
market needs, and the need of effective approaches for comprehending them is growing …

Refactoring legacy AJAX applications to improve the efficiency of the data exchange component

M Ying, J Miller - Journal of Systems and Software, 2013 - Elsevier
The AJAX paradigm encodes data exchange XML formats. Recently, JSON has also
become a popular data exchange format. XML has numerous benefits including human …