Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Static analysis of Java enterprise applications: frameworks and caches, the elephants in the room
Enterprise applications are a major success domain of Java, and Java is the default setting
for much modern static analysis research. It would stand to reason that high-quality static …
for much modern static analysis research. It would stand to reason that high-quality static …
Defect-based testing
A Pretschner - Dependable Software Systems Engineering, 2015 - ebooks.iospress.nl
Defect-Based Testing Page 1 Defect-Based Testing Alexander Pretschner Department of
Informatics, Technische Universität München, Germany Abstract. What is a good test case …
Informatics, Technische Universität München, Germany Abstract. What is a good test case …
Testing for integrity flaws in web sessions
Web sessions are fragile and can be attacked at many different levels. Classic attacks like
session hijacking, session fixation and cross-site request forgery are particularly dangerous …
session hijacking, session fixation and cross-site request forgery are particularly dangerous …
Knowledge-based security testing of web applications by logic programming
This article introduces a new method for knowledge-based security testing by logic
programming and the related tool implementation for model-based non-functional security …
programming and the related tool implementation for model-based non-functional security …
MobSTer: A model‐based security testing framework for web applications
Web applications have become one of the preferred means for users to perform a number of
crucial and security‐sensitive operations such as selling and buying goods or managing …
crucial and security‐sensitive operations such as selling and buying goods or managing …
Model-based detection of CSRF
Abstract Cross-Site Request Forgery (CSRF) is listed in the top ten list of the Open Web
Application Security Project (OWASP) as one of the most critical threats to web security. A …
Application Security Project (OWASP) as one of the most critical threats to web security. A …
The SPaCIoS project: secure provision and consumption in the internet of services
L Vigano - 2013 IEEE Sixth International Conference on …, 2013 - ieeexplore.ieee.org
We describe the SPaCIoS project, illustrating its main objectives, the results obtained so far
and those that we expect to achieve, in particular, the development of the SPaCIoS Tool, an …
and those that we expect to achieve, in particular, the development of the SPaCIoS Tool, an …
[PDF][PDF] Evaluating & engineering: an approach for the development of secure web applications
M Busch - 2016 - d-nb.info
On a regular basis, we learn about well-known online services that have been misused or
compromised by data theft. As insecure applications pose a threat to the users' privacy as …
compromised by data theft. As insecure applications pose a threat to the users' privacy as …
Jmodex: Model extraction for verifying security properties of web applications
Detecting security vulnerabilities in web applications is an important task before taking them
on-line. We present JMODEX, a tool that analyzes the code of web applications to extract …
on-line. We present JMODEX, a tool that analyzes the code of web applications to extract …
A formal and automated approach to exploiting multi-stage attacks of web applications
F De Meo, L Viganò - Journal of Computer Security, 2020 - journals.sagepub.com
We propose a formal and automated approach that allows one to (i) reason about
vulnerabilities of web applications and (ii) combine multiple vulnerabilities for the …
vulnerabilities of web applications and (ii) combine multiple vulnerabilities for the …