Описание: This book constitutes the refereed proceedings of the 13th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2019, held in Copenhagen, Denmark, in July 2019. The 7 revised full papers, 3 short papers, and 6 work-in-progress papers presented were carefully reviewed and selected from 32 submissions.
Описание: This book constitutes the refereed proceedings of the 16th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2020, held in Innopolis, Russia, in May 2020.* The 12 revised full papers and 8 short papers presented were carefully reviewed and selected from 42 submissions.
Описание: This open access book constitutes the refereed proceedings of the 15th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2019, held in Montreal, Quebec, Canada, in May 2019. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 35 submissions.
Описание: This book constitutes the refereed proceedings of the 16th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2020, held in Innopolis, Russia, in May 2020.* The 12 revised full papers and 8 short papers presented were carefully reviewed and selected from 42 submissions.
Описание: This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems.
Описание: Model-Based Testing.- Using Model Learning for the Generation of Mock Components.- Interrogating Virtual Agents: In Quest of Security Vulnerabilities.- Giving a Model-based Testing Language a Formal Semantics via Partial MAX-SAT.- Learning Abstracted Non-Deterministic Finite State Machines.- Security Testing.- APPregator: a large-scale platform for mobile security analysis.- Vulsploit: a module for semi-automatic exploitation of vulnerabilities.- About the Robustness and Looseness of Yara Rules.- Measurement-based analysis of a DoS Defense Module for an Open Source Web Server.- Trust is in the air: a new adaptive method to evaluate mobile wireless networks.- Enabling Next-Generation Cyber Ranges with Mobile Security Components.- Testing Methods and Applications.- A Technique for Parallel GUI Testing of Android Applications.- Trigger Alarm A Smart NFC Sniffer for High-Precision Measurements.- Methods for Live Testing of Cloud Services.- Testing Methods and Automation.- Automated Transition Coverage in Behavioural Conformance Testing.- An Executable Mechanised Formalisation of an Adaptive State Counting Algorithm.- Automatic Fairness Testing of Machine Learning Models.- Inspecting Code Churns to Prioritize Test Cases.- Short Contributions.- Using an SMT solver for checking the completeness of FSM-based tests.- Hacking Goals: a goal-centric attack taxonomy in computer systems.- A Comparative Study on Combinatorial and Random Testing for Highly Configurable Systems.- Architecture based on keyword driven testing with domain specific language for a testing system.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru