Search Results - "Bozic, Josip"

Refine Results
  1. 1

    Planning-based security testing of web applications with attack grammars by Bozic, Josip, Wotawa, Franz

    Published in Software quality journal (01-03-2020)
    “…Web applications are deployed on machines around the globe and offer almost universal accessibility. These applications assure functional interconnectivity…”
    Get full text
    Journal Article
  2. 2

    Follow the Trail: Machine Learning for Fraud Detection in Fintech Applications by Stojanović, Branka, Božić, Josip, Hofer-Schmitz, Katharina, Nahrgang, Kai, Weber, Andreas, Badii, Atta, Sundaram, Maheshkumar, Jordan, Elliot, Runevic, Joel

    Published in Sensors (Basel, Switzerland) (25-02-2021)
    “…Financial technology, or Fintech, represents an emerging industry on the global market. With online transactions on the rise, the use of IT for automation of…”
    Get full text
    Journal Article
  3. 3

    APT-Attack Detection Based on Multi-Stage Autoencoders by Neuschmied, Helmut, Winter, Martin, Stojanović, Branka, Hofer-Schmitz, Katharina, Božić, Josip, Kleb, Ulrike

    Published in Applied sciences (01-07-2022)
    “…In the face of emerging technological achievements, cyber security remains a significant issue. Despite the new possibilities that arise with such development,…”
    Get full text
    Journal Article
  4. 4

    A Formal TLS Handshake Model in LNT by Bozic, Josip, Marsso, Lina, Mateescu, Radu, Wotawa, Franz

    “…Testing of network services represents one of the biggest challenges in cyber security. Because new vulnerabilities are detected on a regular basis, more…”
    Get full text
    Journal Article
  5. 5

    Ontology-based metamorphic testing for chatbots by Božić, Josip

    Published in Software quality journal (01-03-2022)
    “…Modern-day demands for services often require an availability on a 24/7 basis as well as online accessibility around the globe. For this sake, personalized…”
    Get full text
    Journal Article
  6. 6

    Robust Financial Fraud Alerting System Based in the Cloud Environment by Stojanović, Branka, Božić, Josip

    Published in Sensors (Basel, Switzerland) (03-12-2022)
    “…The digitalisation of finance influenced the emergence of new technological concepts for existing user needs. Financial technology, or fintech, provides…”
    Get full text
    Journal Article
  7. 7

    Threat Modelling and Beyond-Novel Approaches to Cyber Secure the Smart Energy System by Vallant, Heribert, Stojanović, Branka, Božić, Josip, Hofer-Schmitz, Katharina

    Published in Applied sciences (01-06-2021)
    “…Smart Grids (SGs) represent electrical power systems that incorporate increased information processing and efficient technological solutions. The integration…”
    Get full text
    Journal Article
  8. 8

    Planning-based security testing of web applications by Bozic, Josip, Wotawa, Franz

    “…Web applications are deployed on machines around the globe and offer almost universal accessibility. The systems ensure functional interconnectivity between…”
    Get full text
    Conference Proceeding
  9. 9

    Testing TLS using planning-based combinatorial methods and execution framework by Simos, Dimitris E., Bozic, Josip, Garn, Bernhard, Leithner, Manuel, Duan, Feng, Kleine, Kristoffer, Lei, Yu, Wotawa, Franz

    Published in Software quality journal (01-06-2019)
    “…The TLS protocol is the standard for secure Internet communication between two parties. Unfortunately, there have been recently successful attacks like DROWN,…”
    Get full text
    Journal Article
  10. 10

    Software Testing: According to Plan by Bozic, Josip, Wotawa, Franz

    “…Automated planning and scheduling represents a branch of classical artificial intelligence (AI) research. Although initially used in robotics and intelligent…”
    Get full text
    Conference Proceeding
  11. 11

    Chatbot Testing Using AI Planning by Bozic, Josip, Tazl, Oliver A., Wotawa, Franz

    “…Chatbots, i.e., systems that can interact with humans in a more appropriate way using natural language, have been of increasing importance. This is due the…”
    Get full text
    Conference Proceeding
  12. 12

    PURITY: A Planning-based secURITY Testing Tool by Bozic, Josip, Wotawa, Franz

    “…Despite sophisticated defense mechanisms security testing still plays an important role in software engineering. Because of their latency, security flaws in…”
    Get full text
    Conference Proceeding
  13. 13

    Ontology-driven Security Testing of Web Applications by Bozic, Josip, Li, Yihao, Wotawa, Franz

    “…Vulnerabilities in existing software systems represent a great challenge for security assurance, where well known attacks like cross-site scripting (XSS) or…”
    Get full text
    Conference Proceeding
  14. 14

    Ontology-based Testing: An Emerging Paradigm for Modeling and Testing Systems and Software by Wotawa, Franz, Bozic, Josip, Li, Yihao

    “…Model-based testing has been successfully applied for test case generation in practice. Its underlying idea is to utilize models of the system for obtaining…”
    Get full text
    Conference Proceeding
  15. 15

    Security Testing Based on Attack Patterns by Bozic, Josip, Wotawa, Franz

    “…Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet…”
    Get full text
    Conference Proceeding
  16. 16

    XSS pattern for attack modeling in testing by Bozic, Josip, Wotawa, Franz

    “…Security issues of web applications are still a current topic of interest especially when considering the consequences of unintended behaviour. Such services…”
    Get full text
    Conference Proceeding
  17. 17

    Planning-Based Security Testing of the SSL/TLS Protocol by Bozic, Josip, Kleine, Kristoffer, Simos, Dimitris E., Wotawa, Franz

    “…With a growing amount of transferred data in an interconnected world, the insurance of a secure communication between two peers becomes a critical task in the…”
    Get full text
    Conference Proceeding
  18. 18

    A Formal TLS Handshake Model in LNT by Bozic, Josip, Marsso, Lina, Mateescu, Radu, Wotawa, Franz

    Published 27-03-2018
    “…EPTCS 268, 2018, pp. 1-40 Testing of network services represents one of the biggest challenges in cyber security. Because new vulnerabilities are detected on a…”
    Get full text
    Journal Article
  19. 19

    Weighted Combinatorial Sequence Testing for the TLS Protocol by Garn, Bernhard, Simos, Dimitris E., Duan, Feng, Lei, Yu, Bozic, Josip, Wotawa, Franz

    “…In this paper, we apply the notion of weighted t-way sequences to derive sequence test cases for testing implementations of the TLS protocol version 1.2. The…”
    Get full text
    Conference Proceeding
  20. 20

    Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing by Bozic, Josip, Garn, Bernhard, Kapsalis, Ioannis, Simos, Dimitris, Winkler, Severin, Wotawa, Franz

    “…Security testing of web applications remains a major problem of software engineering. In order to reveal vulnerabilities, manual and automatic testing…”
    Get full text
    Conference Proceeding