Towards Understanding Trust in Self-adaptive Systems

D Van Landuyt, D Halász, S Verreydt… - Proceedings of the 19th …, 2024 - dl.acm.org
Self-adaptive systems (SASs) can change their structures autonomously and dynamically
adapt their behaviors aiming at (i) attaining longer-term system goals and (ii) coping with …

Patterns of Applied Control for Public Health Measures on Transportation Services under Epidemic

K Johnson, S Madanian, C Trubiani - Proceedings of the 19th …, 2024 - dl.acm.org
The recent trend of uncontrolled spread of infectious diseases has resulted in severe
disruption to society on a worldwide scale. One of the causes is represented by public …

Brigadier: A Datalog-based IAST framework for Node. js Applications

ALS Pupo, J Nicolay, EG Boix - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The NODE. JS runtime, in combination with Node Package Manager (NPM), is a popular
ecosystem for building server-side web applications. Both JavaScript's flexible and dynamic …

The self, emotion, & regulation model of giving and receiving constructive feedback

V Ulichney, J Jarcho, C Helion - Faculty/Researcher …, 2021 - scholarshare.temple.edu
We must often give and receive constructive feedback in various contexts. Constructive
feedback offers unique benefits including improvements in performance, goal-pursuit, self …

[PDF][PDF] Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer.

M Alidoosti, A Nowroozi, A Nickabadi - ISeCure, 2022 - sid.ir
Parallel execution of multiple threads of a web application will result in server-side races if
the web application is not synchronized correctly. Server-side race is susceptible to flaws in …

Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications

A Willerton, R Gustafsson - 2022 - diva-portal.org
Background. Web applications are a more significant part of our digital experience, and the
number of users keeps continuously growing. Social media alone accounts for more than …

Systematic Approach for Web Protection Runtime Tools' Effectiveness Analysis

T Sureda Riera, JR Bermejo Higuera… - 2022 - reunir.unir.net
Web applications represent one of the principal vehicles by which attackers gain access to
an organization's network or resources. Thus, different approaches to protect web …