2018 14th European Dependable Computing Conference (EDCC)最新文献

筛选
英文 中文
Analyzing the Shared Information in Social Networks 分析社交网络中的共享信息
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00042
Bogdan Aman, Gabriel Ciobanu
{"title":"Analyzing the Shared Information in Social Networks","authors":"Bogdan Aman, Gabriel Ciobanu","doi":"10.1109/EDCC.2018.00042","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00042","url":null,"abstract":"We use a concise stochastic calculus to describe the interactions among the participants in web-based social networks. The stochastic nature of these interactions is given by the fact that the duration of the interaction can be represented by a stochastic rate of an exponential distribution. To ensure a more secure sharing of information in the systems described by our stochastic calculus, we use a probabilistic model checker to verify various (quantitative) properties of their dynamics.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124446129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Strategy for Model Composition in the Möbius Modeling Environment Möbius建模环境中一种有效的模型组合策略
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00029
Giulio Masetti, S. Chiaradonna, F. Giandomenico, B. Feddersen, W. Sanders
{"title":"An Efficient Strategy for Model Composition in the Möbius Modeling Environment","authors":"Giulio Masetti, S. Chiaradonna, F. Giandomenico, B. Feddersen, W. Sanders","doi":"10.1109/EDCC.2018.00029","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00029","url":null,"abstract":"Möbius is well known as a modeling and evaluation environment for performance and dependability indicators. One of Möbius' key features is the modular and compositional approach to model definition and analysis. In particular, the modeler can define submodels using several formalisms and compose them to form the overall model of the system under analysis. The current algorithm for model composition in Möbius revealed performance issues when large systems are considered (such as in the modeling of realistic segments of energy or transportation infrastructures), due to the chosen data flow scheme. In this paper, a new algorithm for the same composition mechanism is proposed to improve efficiency. A case study is also developed to demonstrate the performance enhancements.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Message from SERENE 2018 Workshop Program Chairs 来自SERENE 2018研讨会项目主席的信息
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/edcc.2018.00011
{"title":"Message from SERENE 2018 Workshop Program Chairs","authors":"","doi":"10.1109/edcc.2018.00011","DOIUrl":"https://doi.org/10.1109/edcc.2018.00011","url":null,"abstract":"","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools 使用各种静态分析工具查找SQL注入和跨站点脚本漏洞
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00020
Areej Algaith, P. Nunes, J. Fonseca, Ilir Gashi, M. Vieira
{"title":"Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools","authors":"Areej Algaith, P. Nunes, J. Fonseca, Ilir Gashi, M. Vieira","doi":"10.1109/EDCC.2018.00020","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00020","url":null,"abstract":"The use of Static Analysis Tools (SATs) is mandatory when developing secure software and searching for vulnerabilities in legacy software. However, the performance of the various SATs concerning the detection of vulnerabilities and false alarm rate is usually unknown and depends on many factors. The simultaneous use of several tools should increase the detection capabilities, but also the number of false alarms. In this paper, we study the problem of combining several SATs to best meet the developer needs. We present results of analyzing the performance of diverse static analysis tools, based on a previously published dataset that resulted from the use of five diverse SATs to find two types of vulnerabilities, namely SQL Injections (SQLi) and Cross-Site Scripting (XSS), in 132 plugins of the WordPress Content Management System (CMS). We present the results based on well-established measures for binary classifiers, namely sensitivity and specificity for all possible diverse combinations that can be constructed using these 5 SAT tools. We then provide empirically supported guidance on which combinations of SAT tools provide the most benefits for detecting vulnerabilities with low false positive rates.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"29 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114034954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信