International Journal of Open Source Software and Processes最新文献

筛选
英文 中文
A Resourceful Approach in Security Testing to Protect Electronic Payment System Against Unforeseen Attack 一种保护电子支付系统免受意外攻击的安全测试方法
International Journal of Open Source Software and Processes Pub Date : 2017-07-01 DOI: 10.4018/IJOSSP.2017070102
Rajat Kumar Behera, A. Sahoo, A. Jena
{"title":"A Resourceful Approach in Security Testing to Protect Electronic Payment System Against Unforeseen Attack","authors":"Rajat Kumar Behera, A. Sahoo, A. Jena","doi":"10.4018/IJOSSP.2017070102","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017070102","url":null,"abstract":"This article describes how electronic payments are financial transactions made over the internet for goods or services. In the digital era, the e-commerce industry has gone beyond the traditional in-store service due to the wide spread of internet-based shopping. Developed countries are greatly relying on e-commerce business and a sizable number of countries have shown concern in regard to the online payment cards such as credit cards, debit cards, e-cash, e-cheques, e-wallets and smart card security. The main downsides are concerns over privacy or a malicious attack and hence safeguard mechanisms are required to protect personal information from falling into the hands of intruders. Before commercializing electronic payment systems (EPS), security tests play a significant role in the software development life cycle to check whether the system is secure and it is safe to use. A resourceful approach covering security policies, secure coding, security attack prevention methodology, security testing tool, security testing metrics, security test case prioritization techniques and a model for effective project management methodology are presented in this article. Early detection and resolution of security weaknesses can be achieved with the authors' proposed approach and would certainly reduce the time, effort and cost of a project. The proposed approach is likely the best-fit implementation of the payment industry, covering channels like B2C (Business to Consumer), C2C (Consumer to Consumer), C2B (Consumer to Business), B2B (Business to Business), People to People (P2P), G2C (Government to Citizen) and C2G (Citizen to Government).","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"88 1","pages":"24-48"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79166305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel UML Based Approach for Early Detection of Change Prone Classes 一种新的基于UML的易变化类的早期检测方法
International Journal of Open Source Software and Processes Pub Date : 2017-07-01 DOI: 10.4018/IJOSSP.2017070101
Deepa Bura, A. Choudhary, R. K. Singh
{"title":"A Novel UML Based Approach for Early Detection of Change Prone Classes","authors":"Deepa Bura, A. Choudhary, R. K. Singh","doi":"10.4018/IJOSSP.2017070101","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017070101","url":null,"abstract":"This article describes how predicting change-prone classes is essential for effective development of software. Evaluating changes from one release of software to the next can enhance software quality. This article proposes an efficient novel-based approach for predicting changes early in the object-oriented software. Earlier researchers have calculated change prone classes using static characteristics such as source line of code e.g. added, deleted and modified. This research work proposes to use dynamic metrics such as execution duration, run time information, regularity, class dependency and popularity for predicting change prone classes. Execution duration and run time information are evaluated directly from the software. Class dependency is obtained from UML2.0 class and sequence diagrams. Regularity and popularity is acquired from frequent item set mining algorithms and an ABC algorithm. For classifying the class as change-prone or non-change-prone class an Interactive Dichotomizer version 3 ID3 algorithm is used. Further validation of the results is done using two open source software, OpenClinic and OpenHospital.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"22 1","pages":"1-23"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79070980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Anti-Obfuscation Model for Detecting Malicious Code 一种新的检测恶意代码的抗混淆模型
International Journal of Open Source Software and Processes Pub Date : 2017-04-01 DOI: 10.4018/IJOSSP.2017040102
Yuehan Wang, Tong Li, Yongquan Cai, Zhenhu Ning, Fei Xue, Di Jiao
{"title":"A Novel Anti-Obfuscation Model for Detecting Malicious Code","authors":"Yuehan Wang, Tong Li, Yongquan Cai, Zhenhu Ning, Fei Xue, Di Jiao","doi":"10.4018/IJOSSP.2017040102","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017040102","url":null,"abstract":"In this article, the authors present a new malicious code detection model. The detection model improves typical n-gram feature extraction algorithms that are easy to be obfuscated. Specifically, the proposed model can dynamically determine obfuscation features and then adjust the selection of meaningful features to improve corresponding machine learning analysis. The experimental results show that the feature database, which is built based on the proposed feature selection and cleaning method, contains a stable number of features and can automatically get rid of obfuscation features. Overall, the proposed detection model has features of long timeliness, high applicability and high accuracy of identification.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"46 1","pages":"25-43"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84651279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heuristic Guided Selective Path Exploration for Loop Structure in Coverage Testing 覆盖测试中回路结构的启发式引导选择路径探索
International Journal of Open Source Software and Processes Pub Date : 2017-04-01 DOI: 10.4018/IJOSSP.2017040104
Xuzhou Zhang, Yunzhan Gong, Yawen Wang
{"title":"Heuristic Guided Selective Path Exploration for Loop Structure in Coverage Testing","authors":"Xuzhou Zhang, Yunzhan Gong, Yawen Wang","doi":"10.4018/IJOSSP.2017040104","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017040104","url":null,"abstract":"Static program analysis is a strong technique for analyzing program behavior, but suffers from scalabilityproblem,suchaspathexplosionwhichiscausedbythepresenceofloopsandfunction calls.This article applies the selective executionmechanismandheuristic strategyonexploring pathsthroughloops.Thiscombinatorialstrategytriestoalleviatethepathexplosionproblemfrom threeaspects:1)exploringloopswithdifferentapproachesaccordingtotheirrelativepositiontoa specifictarget;2)combiningstaticanalysis,dynamicexecution,andsymbolicexecutiontodealwith theseparatedprogram;3)applyingaheuristicstrategyonofferingguidanceforthepathexploration. Theseapproachesareintegratedtoautomaticallygeneratepathsforspecifiedtargetsinloopstructure. Experimentalresultsshowthattheauthors’proposedstrategyisavailableforcombinationofdifferent loops.Itoutperformssomeexistingtechniquesonachievingbettercoverageforprogramscontaining loops,andisapplicableinengineering. KEywORdS Heuristic Strategy, Hybrid Strategy, Path Generation, Program Analysis, Symbolic Execution","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"33 1","pages":"59-75"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80111212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Non-Trivial Software Clone Detection Using Program Dependency Graph 非平凡的软件克隆检测使用程序依赖图
International Journal of Open Source Software and Processes Pub Date : 2017-04-01 DOI: 10.4018/IJOSSP.2017040101
Pratiksha Gautam, H. Saini
{"title":"Non-Trivial Software Clone Detection Using Program Dependency Graph","authors":"Pratiksha Gautam, H. Saini","doi":"10.4018/IJOSSP.2017040101","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017040101","url":null,"abstract":"Codeclonesarecopiedfragmentsthatoccuratdifferentlevelsofabstractionandmayhavedifferent originsinasoftwaresystem.Thisarticlepresentsanapproachwhichshowsthesignificantpartsof sourcecode.Further,byusingsignificantpartsofasourcecode,acontrolflowgraphcanbegenerated. Thiscontrolflowgraphrepresents thestatementsofacode/programintheformofbasicblocks ornodesandtheedgesrepresentthecontrolflowbetweenthosebasicblocks.Ahybridapproach, namedtheProgramDependenceGraph(PDG)isalsopresentedinthisarticleforthedetectionof non-trivialcodeclones.Theprogramdependencygraphapproachconsistsoftwoapproachesasa controldependencygraphandadatadependencygraph.Thecontroldependencygraphisgeneratedby usingacontrolflowgraph.Thisarticleproposesanapproachwhichcaneasilygeneratecontrolflow graphsandbyusingcontrolflowgraphandreducedflowgraphapproach,thetrivialsoftwareclone,a similartextualstructure,canbedetected.Theproposedapproachisbasedonatokenizationconcept. KeywORDS Control Flow, Cyclomatic Complexity, Graph Software Clones, Program Dependency Graph","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"5 1","pages":"1-24"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88146203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lock-Free Binary Search Tree Based on Leaf Search 基于叶搜索的无锁二叉搜索树
International Journal of Open Source Software and Processes Pub Date : 2017-04-01 DOI: 10.4018/IJOSSP.2017040103
Yang Zhang, Xin Yu, Dongwen Zhang, Mengmeng Wei, Yanan Liang
{"title":"Lock-Free Binary Search Tree Based on Leaf Search","authors":"Yang Zhang, Xin Yu, Dongwen Zhang, Mengmeng Wei, Yanan Liang","doi":"10.4018/IJOSSP.2017040103","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017040103","url":null,"abstract":"Binary search tree is one of the most important data structures in program design. This article proposesanovellock-freealgorithm,whichcanimplementthelock-freeoperations,suchassearch, insertanddelete,usingcompareandswap(CAS).Unlikethepreviousstudiesofhandlingtheinside nodeinatree,theauthors’algorithmhandlestheinsertanddeleteoperationsbyconsideringofthe subtree.Thisarticlepresentsthedetailsofthelock-freealgorithm,whichcaneffectivelyreducethe contentionbetweentheupdateoperations.Theexperimentcomparesthealgorithmwithothertwo lock-freealgorithmsbythroughput.Evaluationresultsshowthatthethroughputofthealgorithm outperformsthatoftheothertwoconcurrentBSTswhenthenumberofthreadsismorethan4.The authors’algorithmwillbecompetitivewhentheconcurrencyishigh. KeywORdS Binary Search Tree, CAS, Concurrent Data Structure, Lock-Free","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"33 1","pages":"44-58"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82277173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Maintainability of Open Source Software: A Case Study 评估开源软件的可维护性:一个案例研究
International Journal of Open Source Software and Processes Pub Date : 2017-01-01 DOI: 10.4018/IJOSSP.2017010101
Feras Hanandeh, A. Saifan, Mohammed Akour, Noor Khamis Al-Hussein, K. Shatnawi
{"title":"Evaluating Maintainability of Open Source Software: A Case Study","authors":"Feras Hanandeh, A. Saifan, Mohammed Akour, Noor Khamis Al-Hussein, K. Shatnawi","doi":"10.4018/IJOSSP.2017010101","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017010101","url":null,"abstract":"Maintainability is one of the most important quality attribute that affect the quality of software. There are four factors that affect the maintainability of software which are: analyzability, changeability, stability, and testability. Open source software OSS developed by collaborative work done by volunteers through around the world with different management styles. Open source code is updated and modified all the time from the first release. Therefore, there is a need to measure the quality and specifically the maintainability of such code. This paper discusses the maintainability for the three domains of the open source software. The domains are: education, business and game. Moreover, to observe the most effective metrics that directly affects the maintainability of software. Analysis of the results demonstrates that OSS in the education domain is the most maintainable code and cl_stat number of executable statements metric has the highest degree of influence on the calculation of maintenance in all three domains.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"37 1","pages":"1-20"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86853428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigating the Effect of Sensitivity and Severity Analysis on Fault Proneness in Open Source Software 研究开源软件中灵敏度和严重性分析对故障倾向的影响
International Journal of Open Source Software and Processes Pub Date : 2017-01-01 DOI: 10.4018/IJOSSP.2017010103
D. Mala
{"title":"Investigating the Effect of Sensitivity and Severity Analysis on Fault Proneness in Open Source Software","authors":"D. Mala","doi":"10.4018/IJOSSP.2017010103","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017010103","url":null,"abstract":"Fault prone components in open source software leads to huge loss and inadvertent effects if not properly identified and rigorously tested. Most of the reported studies in the literature have applied design metrics alone, to identify such critical components. But in reality, some of the components' criticality level can be identified only by means of dynamic code analysis; as some of the components seem to be normal but still have higher level of impact on the other components. This leads to an insight on the need of a rigorous analysis based on how sensitive a component is and how severe will be the impact of it on other components in the system. To achieve this, an efficient mechanism of evaluating the criticality index of each component by means of sensitivity and severity analysis using the static design metrics and dynamic source code metrics has been proposed. Then, testing is conducted rigorously on these components using both unit testing and pair-wise integration testing.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"9 1","pages":"42-66"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82243177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Data Mining-Based Framework to Test Case Prioritization Using Software Defect Prediction 基于数据挖掘的软件缺陷预测测试用例优先级划分框架
International Journal of Open Source Software and Processes Pub Date : 2017-01-01 DOI: 10.4018/IJOSSP.2017010102
E. Alsukhni, A. Saifan, Hanadi Alawneh
{"title":"A New Data Mining-Based Framework to Test Case Prioritization Using Software Defect Prediction","authors":"E. Alsukhni, A. Saifan, Hanadi Alawneh","doi":"10.4018/IJOSSP.2017010102","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017010102","url":null,"abstract":"Testcasesdonothavethesameimportancewhenusedtodetectfaultsinsoftware;therefore,itis moreefficienttotestthesystemwiththetestcasesthathavetheabilitytodetectthefaults.This researchproposesanewframeworkthatcombinesdataminingtechniquestoprioritizethetestcases. Itenhancesfaultpredictionanddetectionusingtwodifferenttechniques:1)thedataminingregression classifierthatdependsonsoftwaremetricstopredictdefectivemodules,and2)thek-meansclustering techniquethatisusedtoselectandprioritizetestcasestoidentifythefaultearly.Ourapproachof testcaseprioritizationyieldsgoodresultsincomparisonwithotherstudies.Theauthorsusedthe AveragePercentageofFaultsDetection(APFD)metrictoevaluatetheproposedframework,which resultsin19.9%forallsystemmodulesand25.7%fordefectiveones.Ourresultsgiveusanindication thatitiseffectivetostartthetestingprocesswiththemostdefectivemodulesinsteadoftestingall modulesarbitraryarbitrarily. KeywORDS Data Mining, Software Defect Prediction, Software Testing, Test Case Prioritization","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"15 1","pages":"21-41"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84765108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Software Reliability Prediction Using Cuckoo Search Optimization, Empirical Mode Decomposition, and ARIMA Model: CS-EEMD-ARIMA Based SRGM 基于杜鹃搜索优化、经验模态分解和ARIMA模型的软件可靠性预测:CS-EEMD-ARIMA的SRGM
International Journal of Open Source Software and Processes Pub Date : 2016-10-01 DOI: 10.4018/IJOSSP.2016100103
Ankur Choudhary, A. Baghel
{"title":"Software Reliability Prediction Using Cuckoo Search Optimization, Empirical Mode Decomposition, and ARIMA Model: CS-EEMD-ARIMA Based SRGM","authors":"Ankur Choudhary, A. Baghel","doi":"10.4018/IJOSSP.2016100103","DOIUrl":"https://doi.org/10.4018/IJOSSP.2016100103","url":null,"abstract":"Thedemandofhighlyreliableandsuperiorqualityopensourcesoftware’sareincreasing daybyday.Thisdemandforcesoftwaredeveloperstoimprovisethereliabilityoftheir software’s.Authorshaveproposedseveralparametricandnon-parametricsoftware reliabilitymodelsbuttheyhavetheirownlimitations,likeparametricmodelsuffer fromunrealisticmodelassumptions,operatingenvironmentconditiondependencies. Incontrasttoparametric,non-parametricmodelsovercometheseissuesbuttheyare computationallycostlier.So,thescopeofoptimizationordevelopmentofnewreliable model still exists. This paper presents an effective software reliability modeling based on Cuckoo Search optimization, Ensemble Empirical Mode Decomposition andARIMAmodelingoftimeseriestoprovidemoreaccurateprediction.Extensive experimentson5realdatasetsisconductedandresultsarecollected.Theanalysisof resultsindicatesthesuperiorityofproposedtechniqueoverexistingparametricand non-parametricmodelsforopensourcesoftware’sandproprietysoftware’s. KEywORDS ARIMA, Cuckoo Search Optimization, EEMD, Software Reliability Growth Model, Time Series Model","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"52 1","pages":"39-54"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90418993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信