Spotting problematic code lines using nonintrusive programmers' biofeedback
Recent studies have shown that programmers' cognitive load during typical code
development activities can be assessed using wearable and low intrusive devices that …
development activities can be assessed using wearable and low intrusive devices that …
Mitigating virtualization failures through migration to a co-located hypervisor
Many organizations are moving their systems to the cloud, where providers consolidate
multiple clients using virtualization, which creates challenges to business-critical …
multiple clients using virtualization, which creates challenges to business-critical …
[Retracted] Data Protection Software for Civil Aviation Control Flight Information System Based on FPE Algorithm
J Lu - Security and Communication Networks, 2022 - Wiley Online Library
This study is aimed in order to study the data protection software of civil aviation
management flight information system based on FPE algorithm. The author established the …
management flight information system based on FPE algorithm. The author established the …
Fault injection acceleration using failure models on a virtualized fault-tolerant system
B Graça, F Cerveira, H Madeira - 2024 19th European …, 2024 - ieeexplore.ieee.org
Fault Injection (FI) is an experimental technique used to evaluate system behavior under
faults. It provides a significant speed-up over natural fault occurrence, condensing years of …
faults. It provides a significant speed-up over natural fault occurrence, condensing years of …
Evaluating and improving cloud computing dependability
FMD Cerveira - 2021 - estudogeral.uc.pt
Cloud computing has become the preferred choice by the large majority of organizations to
obtain computing resources. Despite the various advantages of cloud computing, it has …
obtain computing resources. Despite the various advantages of cloud computing, it has …
[HTML][HTML] Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems
A Smrčka, B Sangchoolie, E Mingozzi… - Open Research …, 2023 - ncbi.nlm.nih.gov
Verification and validation (V&V) are complex processes combining different approaches
and incorporating many different methods including many activities. System engineers …
and incorporating many different methods including many activities. System engineers …
The most frequent programming mistakes that cause software vulnerabilities
All computer programs have flaws, some of which can be exploited to gain unauthorized
access to computer systems. We conducted a field study on publicly reported vulnerabilities …
access to computer systems. We conducted a field study on publicly reported vulnerabilities …
Software verification aimed at security vulnerabilities
LMA Gonçalo - 2019 - estudogeral.uc.pt
Software testing is an activity aimed at the identification and later correction of faults capable
of reducing the software quality. This activity is essential because the occurrence of mistakes …
of reducing the software quality. This activity is essential because the occurrence of mistakes …