A hitchhiker's guide to statistical tests for assessing randomized algorithms in software engineering

A Arcuri, L Briand - Software Testing, Verification and Reliability, 2014 - Wiley Online Library
Randomized algorithms are widely used to address many types of software engineering
problems, especially in the area of software verification and validation with a strong …

Incident-centered information security: Managing a strategic balance between prevention and response

R Baskerville, P Spagnoletti, J Kim - Information & management, 2014 - Elsevier
Abstract Information security strategies employ principles and practices grounded in both the
prevention and response paradigms. The prevention paradigm aims at managing predicted …

Detecting and removing web application vulnerabilities with static analysis and data mining

I Medeiros, N Neves, M Correia - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Although a large research effort on web application security has been going on for more
than a decade, the security of web applications continues to be a challenging problem. An …

Automatic detection and correction of web application vulnerabilities using data mining to predict false positives

I Medeiros, NF Neves, M Correia - Proceedings of the 23rd international …, 2014 - dl.acm.org
Web application security is an important problem in today's internet. A major cause of this
status is that many programmers do not have adequate knowledge about secure coding, so …

Reverse engineering of protocols from network traces

J Antunes, N Neves, P Verissimo - 2011 18th Working …, 2011 - ieeexplore.ieee.org
Communication protocols determine how network components interact with each other.
Therefore, the ability to derive a specification of a protocol can be useful in various contexts …

Detecting software security vulnerabilities via requirements dependency analysis

W Wang, F Dumont, N Niu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber attacks targeting software applications have a tremendous impact on our daily life. For
example, attackers have utilized vulnerabilities of web applications to steal and gain …

Chaos engineering for enhanced resilience of cyber-physical systems

C Konstantinou, G Stergiopoulos… - 2021 Resilience …, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPS) incorporate the complex and large-scale engineered systems
behind critical infrastructure operations, such as water distribution networks, energy delivery …

Message format and field semantics inference for binary protocols using recorded network traffic

G Ládi, L Buttyán, T Holczer - 2018 26th International …, 2018 - ieeexplore.ieee.org
Protocol specifications describe the interaction between different entities by defining
message formats and message processing rules. Having access to such protocol …

Learning embedding space for clustering from deep representations

P Dahal - 2018 IEEE International Conference on Big Data (Big …, 2018 - ieeexplore.ieee.org
Clustering is one of the most fundamental unsupervised tasks in machine learning and is
elementary in the exploration of high volume data. Recent works propose using deep neural …

Program-aware fuzzing for MQTT applications

LG Araujo Rodriguez, D Macêdo Batista - Proceedings of the 29th ACM …, 2020 - dl.acm.org
Over the last few years, MQTT applications have been widely exposed to vulnerabilities
because of their weak protocol implementations. For our preliminary research, we …