Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms

B Arasteh, B Aghaei, B Farzad, K Arasteh… - Neural Computing and …, 2024 - Springer
SQL injection is one of the important security issues in web applications because it allows
an attacker to interact with the application's database. SQL injection attacks can be detected …

Program source-code re-modularization using a discretized and modified sand cat swarm optimization algorithm

B Arasteh, A Seyyedabbasi, J Rasheed… - Symmetry, 2023 - mdpi.com
One of expensive stages of the software lifecycle is its maintenance. Software maintenance
will be much simpler if its structural models are available. Software module clustering is …

[HTML][HTML] A bioinspired discrete heuristic algorithm to generate the effective structural model of a program source code

B Arasteh, R Sadegi, K Arasteh, P Gunes… - Journal of King Saud …, 2023 - Elsevier
When the source code of a software is the only product available, program understanding
has a substantial influence on software maintenance costs. The main goal in code …

A novel metaheuristic based method for software mutation test using the discretized and modified forrest optimization algorithm

B Arasteh, FS Gharehchopogh, P Gunes… - Journal of Electronic …, 2023 - Springer
The number of detected bugs by software test data determines the efficacy of the test data.
One of the most important topics in software engineering is software mutation testing, which …

Blockchain technology as an enabler for digital trust in supply chain: evolution, issues and opportunities

V Sharma, R Agrawal, VK Manupati - International Journal of System …, 2024 - Springer
Blockchain has gained the attention of scholars and industry practitioners due to its
immutability, transparency, and operational features, which can improve overall supply …

A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing

B Arasteh, A Ghaffari - The Journal of Supercomputing, 2024 - Springer
The quality of software test data is assessed through mutation testing. This technique
involves introducing various modifications (mutants) to the original code of the program. The …

Efficient software mutation test by clustering the single-line redundant mutants

B Arasteh, A Ghaffari - Data Technologies and Applications, 2024 - emerald.com
Purpose Reducing the number of generated mutants by clustering redundant mutants,
reducing the execution time by decreasing the number of generated mutants and reducing …

A divide and conquer based development of gray wolf optimizer and its application in data replication problem in distributed systems

W Fan, B Arasteh, A Bouyer, V Majidnezhad - The Journal of …, 2023 - Springer
One of the main problems of big distributed systems, like IoT, is the high access time to data
objects. Replicating the data objects on various servers is a traditional strategy. Replica …

A discrete heuristic algorithm with swarm and evolutionary features for data replication problem in distributed systems

B Arasteh, T Allahviranloo, P Funes… - Neural Computing and …, 2023 - Springer
Availability and accessibility of data objects in a reasonable time is a main issue in
distributed systems like cloud computing services. As a result, the reduction of data-related …

LDSFI: A lightweight dynamic software-based fault injection

HA Ahmad, Y Sedaghat… - 2019 9th International …, 2019 - ieeexplore.ieee.org
Recently, numerous safety-critical systems have employed a variety of fault tolerance
techniques, which are considered an essential requirement to keep the system fault-tolerant …