software-defined n etworking (SDN) is a promising technology for future smart grid (SG) systems, since SGs heavily rely on communication networks. With SDN, communication network part of SGs becomes programmable by ab...
详细信息
During the explosion process of a certain type of explosive, shock waves and pulse noise can cause damage to the hearing system. COMSOL software was used for simulation to convert shock waves into sound pressure value...
详细信息
lit a previous publication, we presented the results of an assessment aimed at understanding whether bachelor students in computerscience (CS) enrolled in a software Technologies for the Web (STW) course were equippe...
详细信息
ISBN:
(纸本)9798400704987
lit a previous publication, we presented the results of an assessment aimed at understanding whether bachelor students in computerscience (CS) enrolled in a software Technologies for the Web (STW) course were equipped to manage security concerns in the development of (e-commerce) web apps. The gathered evidence highlighted that students enrolled in this course in a.y. (academic year) 2021-22 were not equipped to develop secure web apps, although they devised security as a relevant development aspect. We then delineated a training plan to fill this gap. In this paper, we present the results from the enactment of this plan and the gained experience. In particular, our training plan involved (CS) bachelor students enrolled in the STW course in the a.y. 2022-23, and one of the implemented actions consisted of asking these students (who were different from those enrolled in the a.y. 2021-22) to use in their development pipeline a Static Analysis Tool (SAT), namely SonarCloud, to detect security concerns. The students were asked to use SonarCloud, but not forced to remove detected security concerns. One of the most important results, deriving from the enactment of our intervention, was that the number of security concerns in the web apps developed in a.y. 2022-23 was significantly less than those developed in a.y. 2021-22. Since software security is nowadays of primary relevance, we must train the next generation of developers to develop secure web apps and let them experience, in university courses, the use of tools to support the development of secure software.
Maintaining software is cumbersome when method argument constraints are undocumented. To reveal them, previous work learned preconditions from exemplary valid and invalid method arguments. In practice, it would be hig...
详细信息
ISBN:
(纸本)9783031572586;9783031572593
Maintaining software is cumbersome when method argument constraints are undocumented. To reveal them, previous work learned preconditions from exemplary valid and invalid method arguments. In practice, it would be highly beneficial to know class invariants, too, because functionality added during software maintenance must not break them. Even more so than method preconditions, class invariants are rarely documented and often cannot completely be inferred automatically, especially for objects exhibiting complex state such as dynamic data structures. This paper presents a novel dynamic approach to learning class invariants, thereby complementing related work on learning method preconditions. We automatically synthesize assertions from an adjustable assertion grammar to distinguish valid and invalid objects. While random walks generate valid objects, a combination of bounded-exhaustive testing techniques and behavioral oracles yield invalid objects. The utility of our approach for code comprehension and software maintenance is demonstrated by comparing our learned invariants to documented invariant validation methods found in real-world Java classes and to the invariants detected by the Daikon tool.
Automated Driving Systems (ADS) require extensive safety testing before receiving a road permit. To gain public trust, ADSs must be as safe as a Human Driven Vehicle (HDV) or even safer. Simulationbased safety testing...
详细信息
In order to overcome defects resulted from replacing the photo background color, an improved method is proposed for background replacement. The α-values in the alpha matte are transformed to enhance the details in th...
详细信息
The software industry is characterized by an environment of uncertainty, high volatility, and constant change. This context has shaped the industry, its components, and actors, generating methodologies capable of meet...
详细信息
This study investigates the factors influencing the attitudes of software developers and IT professionals towards Green Information Technology (GIT) in Bangladeshi IT/software firms and examines their impact on engage...
详细信息
This paper reviews security testing, covering the concepts and notions essential to the discipline. The following analysis uses an inverted funnel approach to reduce the broad topic of software testing into its consti...
详细信息
software security is a concern due to software's pervasiveness and how rapid software's are developed. Although studies have emphasized the importance of addressing security requirements during the early phase...
详细信息
暂无评论