Volume 6, Issue 2

 

ارسال های اخیر

  • CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption 

    Hashemzade, Bahare؛ Abdolrazzagh-Nezhad, Majid (University of Isfahan & Iranian Society of Cryptology, 2019-07-01)
    Obfuscation, as one invasive strategy, is considered to ...

  • BLProM: A black-box approach for detecting business-layer processes in the web applications 

    Alidoosti, Mitra؛ Nowroozi, Alireza؛ Nickabadi, Ahmad (University of Isfahan & Iranian Society of Cryptology, 2019-07-01)
    Web application vulnerability scanners cannot detect business logic vulnerabilities (vulnerabilities related to logic) because they are not able to understand the business logic of the web application. To identify the ...

  • eXtreme Modeling: an approach to agile model-based development 

    Kolahdouz Rahimi, Shekoufeh؛ Lano, Kevin؛ Alfraihi, Hessa؛ P.Haughton, Howard (University of Isfahan & Iranian Society of Cryptology, 2019-07-01)
    Model-based development (MBD) is the development of software systems using graphical and textual models such as UML class diagrams. MBD and related approaches such as Model-driven development (MDD) have had some success ...

  • Vol. 6, No. 2, 2019 

    پدیدآور نامشخص (University of Isfahan & Iranian Society of Cryptology, 2019-07-01)
    Vol. 6, No. 2, 2019