Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
Causal inference of server- and client-side code smells in web apps evolution
Empirical Software Engineering (KLU-EMSE), Volume 29, Issue 5https://doi.org/10.1007/s10664-024-10478-0AbstractContextCode smells (CS) are symptoms of poor design and implementation choices that may lead to increased defect incidence, decreased code comprehension, and longer times to release. Web applications and systems are seldom studied, probably due to ...
- research-articleJuly 2024
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1523–1538https://doi.org/10.1145/3634737.3661137Coverage-guided fuzz testing has received significant attention from the research community, with a strong focus on binary applications, greatly disregarding other targets, such as web applications. The importance of the World Wide Web in everyone's life ...
- research-articleFebruary 2024
The Potential of Digitalization to Improve the Skills of Agri-Food Market Participants: Technical and Economic Opportunities of Multicasting and Internet Television
Automatic Documentation and Mathematical Linguistics (SPADML), Volume 57, Issue 6Pages 309–332https://doi.org/10.3103/S0005105523060031AbstractThis article deals with the potential of digitalization to improve participants’ skills in the agri-food market. The topic of improving technical mechanisms and software technologies aimed at the qualitative development of e-education in Russia is ...
- research-articleFebruary 2024
Tagging EEG features within exam reports to quickly generate databases for research purposes
- Lucio Marinelli,
- Corrado Cabona,
- Irene Pappalardo,
- Anna Bellini,
- Alessandra Ferrari,
- Elisa Micalizzi,
- Daniela Audenino,
- Flavio Villani
Computer Methods and Programs in Biomedicine (CBIO), Volume 242, Issue Chttps://doi.org/10.1016/j.cmpb.2023.107836Highlights- EEG features classification is useful for clinical and research purposes but can be time-consuming.
- EEG report parser is a customizable script to quickly insert and extract feature tags from EEG reports.
- Being free and open-source ...
assess the effectiveness of a new method for classifying EEG recording features through the use of tags within reports. We present feature prevalence in a sample of patients with toxic-metabolic encephalopathy and discuss the advantages ...
-
- research-articleNovember 2023
Development of a multi-node monitoring system for analyzing plant growth and indoor environment interactions: An empirical study on a plant factory
Computers and Electronics in Agriculture (COEA), Volume 214, Issue Chttps://doi.org/10.1016/j.compag.2023.108311Highlights- A system was developed to monitor multi-node environments in a plant factory.
- Applied monitoring system, collected data at 13 nodes in a plant factory.
- Proved non-uniform indoor environments in the growing space and analyzed ...
In plant factories, multi-layered shelves are used to maximize production per unit area by densely growing plants. The large number of plants placed in a spacious area leads to complex interactions between the plants and the growing environment, ...
- research-articleSeptember 2023
LightGBM: Next Point of Interest Location Prediction Using Ensemble Machine Learning
AbstractAs soon as students enter the university campus, from morning until evening, it is crucial to pay attention to where they are. As a result, students will use various campus buildings, including the cafeteria and library, regularly. Numerous ...
- research-articleJune 2023
PHP code smells in web apps: Evolution, survival and anomalies
Journal of Systems and Software (JSSO), Volume 200, Issue Chttps://doi.org/10.1016/j.jss.2023.111644Abstract Context:Code smells are symptoms of poor design, leading to future problems, such as reduced maintainability. Therefore, it becomes necessary to understand their evolution and how long they stay in code. This paper presents ...
Highlights- PHP web apps CS density trend: mostly stable with variations, correlated with team.
- research-articleMay 2023
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code
AbstractInsecurity Refactoring is a change to the internal structure of software to inject a vulnerability without changing the observable behavior in a normal use case scenario. An implementation of Insecurity Refactoring is formally explained to inject ...
- research-articleJanuary 2023
Developing an online information portal for enhancing society awareness of RPTRA (A case study RPTRA MAYA ASRI 13)
Procedia Computer Science (PROCS), Volume 216, Issue CPages 144–150https://doi.org/10.1016/j.procs.2022.12.121AbstractThe long COVID-19 pandemic has limited the activities of Ruang Publik Terpadu Ramah Anak (RPTRA) such as environment cleaning, repair of RPTRA infrastructure, learning and others, as well as the lack of public awareness about the existence and ...
- research-articleJune 2021
On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution
Symbolic execution has been widely applied in detecting vulnerabilities in web applications. Modeling language-specific built-in functions is essential for symbolic execution. Since built-in functions tend to be complicated and are typically ...
- research-articleJune 2021
LChecker: Detecting Loose Comparison Bugs in PHP
WWW '21: Proceedings of the Web Conference 2021Pages 2721–2732https://doi.org/10.1145/3442381.3449826Weakly-typed languages such as PHP support loosely comparing two operands by implicitly converting their types and values. Such a language feature is widely used but can also pose severe security threats. In certain conditions, loose comparisons can ...
- research-articleMarch 2021
A Decision Support System for Subject Area Selection for Students Transiting from Junior Secondary School to Senior Secondary School
AbstractThe majority of Junior Secondary School (JSS 3) students find it extremely challenging to select the most appropriate subject area for Senior Secondary School 1(SSS 1) due to diverse conflicting decision criteria such as friends and parents' ...
- research-articleSeptember 2020
A Web Application for Company Reports Management System
ICEMIS'20: Proceedings of the 6th International Conference on Engineering & MIS 2020Article No.: 79, Pages 1–5https://doi.org/10.1145/3410352.3410815Electronic management is administrative strategy in age of the information for achieving best services to the people and institutions by using information resources and reducing time, cost and effort. In this research we converted a paper work system ...
- ArticleJune 2020
On the Diffusion and Impact of Code Smells in Web Applications
AbstractWeb applications (web apps) have become one of the largest parts of the current software market over years. Modern web apps offer several business benefits over other traditional and standalone applications. Mainly, cross-platform compatibility ...
- research-articleDecember 2019
Cubismo: decloaking server-side malware via cubist program analysis
ACSAC '19: Proceedings of the 35th Annual Computer Security Applications ConferencePages 430–443https://doi.org/10.1145/3359789.3359821Malware written in dynamic languages such as PHP routinely employ anti-analysis techniques such as obfuscation schemes and evasive tricks to avoid detection. On top of that, attackers use automated malware creation tools to create numerous variants with ...
- research-articleNovember 2019
MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis
- Abbas Naderi-Afooshteh,
- Yonghwi Kwon,
- Anh Nguyen-Tuong,
- Ali Razmjoo-Qalaei,
- Mohammad-Reza Zamiri-Gourabi,
- Jack W. Davidson
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1849–1866https://doi.org/10.1145/3319535.3363199This paper presents MalMax, a novel system to detect server-side malware that routinely employ sophisticated polymorphic evasive runtime code generation techniques. When MalMax encounters an execution point that presents multiple possible execution ...
- ArticleSeptember 2019
Difficult XSS Code Patterns for Static Code Analysis Tools
AbstractWe present source code patterns that are difficult for modern static code analysis tools. Our study comprises 50 different open source projects in both a vulnerable and a fixed version for XSS vulnerabilities reported with CVE IDs over a period of ...
- ArticleSeptember 2019
The Design and Application of an Web-Based Online Examination System
AbstractOnline examination has been used more and more widely in the education and other fields due to its advantages of efficiency, convenience, and fairness. This paper proposes a new web-based online examination system, which utilizes PHP, Ajax and ...
- ArticleSeptember 2019
Design of MicroLearning Course of Dynamic Web Pages’ Basics in LMS with Interactive Code Testing Units
AbstractMicroLearning (ML) was identified as one of the trends that can profile e-Learning now or in the near future. The author already conducted two experiments, where he tested newly created MicroLearning courses in comparison with “classic” e-Learning ...