Search Results - "Bozic, Josip"
-
1
Planning-based security testing of web applications with attack grammars
Published in Software quality journal (01-03-2020)“…Web applications are deployed on machines around the globe and offer almost universal accessibility. These applications assure functional interconnectivity…”
Get full text
Journal Article -
2
Follow the Trail: Machine Learning for Fraud Detection in Fintech Applications
Published in Sensors (Basel, Switzerland) (25-02-2021)“…Financial technology, or Fintech, represents an emerging industry on the global market. With online transactions on the rise, the use of IT for automation of…”
Get full text
Journal Article -
3
APT-Attack Detection Based on Multi-Stage Autoencoders
Published in Applied sciences (01-07-2022)“…In the face of emerging technological achievements, cyber security remains a significant issue. Despite the new possibilities that arise with such development,…”
Get full text
Journal Article -
4
A Formal TLS Handshake Model in LNT
Published in Electronic proceedings in theoretical computer science (23-03-2018)“…Testing of network services represents one of the biggest challenges in cyber security. Because new vulnerabilities are detected on a regular basis, more…”
Get full text
Journal Article -
5
Ontology-based metamorphic testing for chatbots
Published in Software quality journal (01-03-2022)“…Modern-day demands for services often require an availability on a 24/7 basis as well as online accessibility around the globe. For this sake, personalized…”
Get full text
Journal Article -
6
Robust Financial Fraud Alerting System Based in the Cloud Environment
Published in Sensors (Basel, Switzerland) (03-12-2022)“…The digitalisation of finance influenced the emergence of new technological concepts for existing user needs. Financial technology, or fintech, provides…”
Get full text
Journal Article -
7
Threat Modelling and Beyond-Novel Approaches to Cyber Secure the Smart Energy System
Published in Applied sciences (01-06-2021)“…Smart Grids (SGs) represent electrical power systems that incorporate increased information processing and efficient technological solutions. The integration…”
Get full text
Journal Article -
8
Planning-based security testing of web applications
Published in 2018 IEEE/ACM 13th International Workshop on Automation of Software Test (AST) (28-05-2018)“…Web applications are deployed on machines around the globe and offer almost universal accessibility. The systems ensure functional interconnectivity between…”
Get full text
Conference Proceeding -
9
Testing TLS using planning-based combinatorial methods and execution framework
Published in Software quality journal (01-06-2019)“…The TLS protocol is the standard for secure Internet communication between two parties. Unfortunately, there have been recently successful attacks like DROWN,…”
Get full text
Journal Article -
10
Software Testing: According to Plan
Published in 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-04-2019)“…Automated planning and scheduling represents a branch of classical artificial intelligence (AI) research. Although initially used in robotics and intelligent…”
Get full text
Conference Proceeding -
11
Chatbot Testing Using AI Planning
Published in 2019 IEEE International Conference On Artificial Intelligence Testing (AITest) (01-04-2019)“…Chatbots, i.e., systems that can interact with humans in a more appropriate way using natural language, have been of increasing importance. This is due the…”
Get full text
Conference Proceeding -
12
PURITY: A Planning-based secURITY Testing Tool
Published in 2015 IEEE International Conference on Software Quality, Reliability and Security - Companion (01-08-2015)“…Despite sophisticated defense mechanisms security testing still plays an important role in software engineering. Because of their latency, security flaws in…”
Get full text
Conference Proceeding -
13
Ontology-driven Security Testing of Web Applications
Published in 2020 IEEE International Conference On Artificial Intelligence Testing (AITest) (01-08-2020)“…Vulnerabilities in existing software systems represent a great challenge for security assurance, where well known attacks like cross-site scripting (XSS) or…”
Get full text
Conference Proceeding -
14
Ontology-based Testing: An Emerging Paradigm for Modeling and Testing Systems and Software
Published in 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-10-2020)“…Model-based testing has been successfully applied for test case generation in practice. Its underlying idea is to utilize models of the system for obtaining…”
Get full text
Conference Proceeding -
15
Security Testing Based on Attack Patterns
Published in 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (01-03-2014)“…Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet…”
Get full text
Conference Proceeding -
16
XSS pattern for attack modeling in testing
Published in 2013 8th International Workshop on Automation of Software Test (AST) (01-05-2013)“…Security issues of web applications are still a current topic of interest especially when considering the consequences of unintended behaviour. Such services…”
Get full text
Conference Proceeding -
17
Planning-Based Security Testing of the SSL/TLS Protocol
Published in 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-03-2017)“…With a growing amount of transferred data in an interconnected world, the insurance of a secure communication between two peers becomes a critical task in the…”
Get full text
Conference Proceeding -
18
A Formal TLS Handshake Model in LNT
Published 27-03-2018“…EPTCS 268, 2018, pp. 1-40 Testing of network services represents one of the biggest challenges in cyber security. Because new vulnerabilities are detected on a…”
Get full text
Journal Article -
19
Weighted Combinatorial Sequence Testing for the TLS Protocol
Published in 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-04-2019)“…In this paper, we apply the notion of weighted t-way sequences to derive sequence test cases for testing implementations of the TLS protocol version 1.2. The…”
Get full text
Conference Proceeding -
20
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing
Published in 2015 IEEE International Conference on Software Quality, Reliability and Security (01-08-2015)“…Security testing of web applications remains a major problem of software engineering. In order to reveal vulnerabilities, manual and automatic testing…”
Get full text
Conference Proceeding