期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Security Test Case Prioritization through Ant Colony Optimization Algorithm
1
作者 Abdulaziz Attaallah Khalil al-Sulbi +5 位作者 Areej Alasiry Mehrez Marzougui mohd Waris Khan mohd faizan Alka Agrawal Dhirendra Pandey 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期3165-3195,共31页
Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems.One of the challenges in software security testin... Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems.One of the challenges in software security testing is test case prioritization,which aims to reduce redundancy in fault occurrences when executing test suites.By effectively applying test case prioritization,both the time and cost required for developing secure software can be reduced.This paper proposes a test case prioritization technique based on the Ant Colony Optimization(ACO)algorithm,a metaheuristic approach.The performance of the ACO-based technique is evaluated using the Average Percentage of Fault Detection(APFD)metric,comparing it with traditional techniques.It has been applied to a Mobile Payment Wallet application to validate the proposed approach.The results demonstrate that the proposed technique outperforms the traditional techniques in terms of the APFD metric.The ACO-based technique achieves an APFD of approximately 76%,two percent higher than the second-best optimal ordering technique.These findings suggest that metaheuristic-based prioritization techniques can effectively identify the best test cases,saving time and improving software security overall. 展开更多
关键词 CONFIDENTIALITY INTEGRITY AUTHENTICATION NON-REPUDIATION RESILIENCE AUTHORIZATION Ant Colony Optimization algorithm
下载PDF
Evaluating the Impact of Software Security Tactics: A Design Perspective
2
作者 Mamdouh Alenezi Abhishek Kumar Pandey +5 位作者 Richa Verma mohd faizan Shalini Chandra Alka Agrawal Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第3期2283-2299,共17页
Design architecture is the edifice that strengthens the functionalities as well as the security of web applications.In order to facilitate architectural security from the web application’s design phase itself,practit... Design architecture is the edifice that strengthens the functionalities as well as the security of web applications.In order to facilitate architectural security from the web application’s design phase itself,practitioners are now adopting the novel mechanism of security tactics.With the intent to conduct a research from the perspective of security tactics,the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution(AHP-TOPSIS)method for selecting and assessing multi-criteria decisions.The adopted methodology is a blend of fuzzy analytic hierarchy process(fuzzy AHP)and fuzzy technique for order preference by similarity ideal solution(fuzzy TOPSIS).To establish the efficacy of this methodology,the results are obtained after the evaluation have been tested on fifteen different web application projects(Online Quiz competition,Entrance Test,and others)of the Babasaheb Bhimrao Ambedkar University,Lucknow,India.The tabulated outcomes demonstrate that the methodology of the Multi-Level Fuzzy Hybrid system is highly effective in providing accurate estimation for strengthening the security of web applications.The proposed study will help experts and developers in developing and managing security from any web application design phase for better accuracy and higher security. 展开更多
关键词 Web application software security security tactics fuzzy AHP fuzzy TOPSIS
下载PDF
A Link Analysis Algorithm for Identification of Key Hidden Services
3
作者 Abdullah Alharbi mohd faizan +5 位作者 Wael Alosaimi Hashem Alyami mohd Nadeem Suhel Ahmad Khan Alka Agrawal Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第7期877-886,共10页
The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities.The network has ... The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities.The network has unfortunately become a means to perpetuate crimes like illegal drugs and firearm trafficking,violence and terrorist activities among others.The government and law enforcement agencies are working relentlessly to control the misuse of Tor network.This is a study in the similar league,with an attempt to suggest a link-based ranking technique to rank and identify the influential hidden services in the Tor dark web.The proposed method considers the extent of connectivity to the surface web services and values of the centrality metrics of a hidden service in the web graph for ranking.The modified PageRank algorithm is used to obtain the overall rankings of the hidden services in the dataset.Several graph metrics were used to evaluate the effectiveness of the proposed technique with other commonly known ranking procedures in literature.The proposed ranking technique is shown to produce good results in identifying the influential domains in the tor network. 展开更多
关键词 Dark web Tor hidden services RANKING link analysis
下载PDF
An Ensemble Approach to Identify Firearm Listing on Tor Hidden-Services
4
作者 Hashem Alyami mohd faizan +5 位作者 Wael Alosaimi Abdullah Alharbi Abhishek Kumar Pandey Md Tarique Jamal Ansari Alka Agrawal Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2021年第8期141-149,共9页
The ubiquitous nature of the internet has made it easier for criminals to carry out illegal activities online.The sale of illegal firearms and weaponry on dark web cryptomarkets is one such example of it.To aid the la... The ubiquitous nature of the internet has made it easier for criminals to carry out illegal activities online.The sale of illegal firearms and weaponry on dark web cryptomarkets is one such example of it.To aid the law enforcement agencies in curbing the illicit trade of firearms on cryptomarkets,this paper has proposed an automated technique employing ensemble machine learning models to detect the firearms listings on cryptomarkets.In this work,we have used partof-speech(PoS)tagged features in conjunction with n-gram models to construct the feature set for the ensemble model.We studied the effectiveness of the proposed features in the performance of the classification model and the relative change in the dimensionality of the feature set.The experiments and evaluations are performed on the data belonging to the three popular cryptomarkets on the Tor dark web from a publicly available dataset.The prediction of the classification model can be utilized to identify the key vendors in the ecosystem of the illegal trade of firearms.This information can then be used by law enforcement agencies to bust firearm trafficking on the dark web. 展开更多
关键词 Dark web FIREARMS pistols rifles cryptomarkets vendors
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部