{"title":"A review of applications of search based software engineering techniques in last decade","authors":"P. Gupta, Ishani Arora, A. Saha","doi":"10.1109/ICRITO.2016.7785022","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785022","url":null,"abstract":"Optimization and testing in software engineering using traditional techniques has become a tedious task now-a-days. In order to fasten this process, search based-software engineering (SBSE) techniques are introduced to solve real world large scale problems efficiently. Also, previous researches have shown a significant contribution of SBSE techniques in the domain of software testing, reliability, cost and effort estimation. This work reviews the application of five major SBSE methods and the issues solved by different practitioners in the last decade. It also addresses the problems in the implementation of these techniques which are still open for further research.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125849859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security issues in M-commerce for online transaction","authors":"Deepak Kumar, Nivesh Goyal","doi":"10.1109/ICRITO.2016.7784990","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7784990","url":null,"abstract":"M-commerce is defined as carrying a business or a service on an internet-enabled mobile based application for making a transaction over the mobile devices for any monetary value. It can be used for buying product online, paying bills, sending money to someone, booking accommodation, getting your favorite dishes from nearby restaurants, etc. Today all our devices are connected through the internet and mobile phones. It has become necessity for all the humans in todays world. This paper undertakes a thorough examination of the security issues involved in the field of M-commerce. Due to the transaction over the internet, M-Commerce creates more security concerns than the traditional E-Commerce. In this paper, security measures in M-Commerce, wireless security, and the application of key generation, authentication and SSL Layer and its issue while making transactions will be discussed. Issues in online transaction are also being discusses in M-Commerce.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115239932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}