Now showing items 1-12 of 12

    • Clone Detection In Matlab Stateflow Models 

      Chen, Jian (2014-09-02)
      Matlab Simulink is one of the leading tools for model based software development in the automotive industry. One extension to Simulink is Stateflow, which allows the user to embed Statecharts as components in a Simulink ...
    • Discovery of Patterns in Simulink Systems 

      de la Parra, Francisco
      Model-Driven Engineering tools and techniques have become mainstream aids in the development of embedded cyber-physical systems. The large-scale use of visual models is a powerful paradigm for designing reliable and ...
    • An Empirical Study of a Language - based Security Testing Technique 

      Aboelfotoh, Muhammad (2008-09-27)
      Application layer protocols have become sophisticated to the level that they have become languages in their own right. Security testing of network applications is indisputably an essential task that must be carried out ...
    • A Framework for Migrating Web Applications to Web Services 

      Almonaies, Asil (2013-04-01)
      Service Oriented Architecture (SOA) is an increasingly important software architecture, designed to flexibly connect separate components in response to rapid changes in the business environment. SOA focuses on the exchange ...
    • Ghost in the Shell: A Counter-intelligence Method for Spying while Hiding in (or from) the Kernel with APCs 

      Alexander, Jason (2012-10-18)
      Advanced malicious software threats have become commonplace in cyberspace, with large scale cyber threats exploiting consumer, corporate and government systems on a constant basis. Regardless of the target, upon successful ...
    • Log File Categorization and Anomaly Analysis Using Grammar Inference 

      Memon, Ahmed Umar (2008-05-28)
      In the information age of today, vast amounts of sensitive and confidential data is exchanged over an array of different mediums. Accompanied with this phenomenon is a comparable increase in the number and types of attacks ...
    • A Model for Run-time Measurement of Input and Round-off Error 

      Meng, Nicholas Jie (2012-09-25)
      For scientists, the accuracy of their results is a constant concern. As the programs they write to support their research grow in complexity, there is a greater need to understand what causes the inaccuracies in their ...
    • Normalizing Object-oriented Class Styles in JavaScript 

      Gama, Widd (2013-01-22)
      JavaScript is the most widely used client-side scripting language, and has become increasingly popular as a crucial component of the AJAX technology. JavaScript is a dynamic, weakly typed, multi-paradigm programming ...
    • A Protocol-Specific Constraint-Based Intrusion Detection System 

      Hasan, Md
      With the advancement of new technologies, the frequency of malicious attacks is also growing rapidly. Even networks without external connections cannot hide from these attacks. Constant monitoring of a network is vital for ...
    • Syntax-based Security Testing for Text-based Communication Protocols 

      Kam, Ben W. Y. (2010-04-30)
      We introduce a novel Syntax-based Security Testing (SST) framework that uses a protocol specification to effectively perform security testing on text-based communication protocols. A protocol specification of a particular ...
    • Taxonomy for JavaScript Attacks 

      Nourijelyani, Mohammad (2014-11-26)
      In the ubiquity era, each user has multiple devices; hence an attractive model is to have applications that execute in a client’s web browser instead of developing a native application for each device. JavaScript is the ...
    • A Verification Framework for Access Control in Dynamic Web Applications 

      Alalfi, Manar H. (2010-04-30)
      Current technologies such as anti-virus software programs and network firewalls provide reasonably secure protection at the host and network levels, but not at the application level. When network and host-level entry points ...