Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
The extensive use of mobile applications in terms of user’s number and size of diverse data has introduced additional security threats which make uncovering these vulnerabilities complex for testers. Testers use certain types of software security testing to detect software vulnerabilities, particula...
| Main Authors: | Al-Ahmad, Ahmad Salah, Kahtan, Hasan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
JATIT
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/28034/ http://umpir.ump.edu.my/id/eprint/28034/1/Test%20case%20selection%20for%20penetration.pdf |
Similar Items
Fuzz test case generation for penetration testing in mobile cloud computing applications
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Penetration testing model for mobile cloud computing applications / Ahmad Salah Mahmoud Al-Ahmad
by: Mahmoud Al-Ahmad, Ahmad Salah
Published: (2017)
by: Mahmoud Al-Ahmad, Ahmad Salah
Published: (2017)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A systematic mapping study on cloud-based mobile application testing
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
by: Badamasi, Imam Ya'au, et al.
Published: (2019)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Application of mobile cloud computing in emergency health care
by: Hameed, Shihab A., et al.
Published: (2019)
by: Hameed, Shihab A., et al.
Published: (2019)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz
by: Muhammad , Shiraz
Published: (2013)
by: Muhammad , Shiraz
Published: (2013)
Effective Mobile Applications Testing Strategies
by: Kim, Haeng Kon, et al.
Published: (2016)
by: Kim, Haeng Kon, et al.
Published: (2016)
A lightweight heterogeneous hybrid mobile cloud computing framework for compute-intensive mobile applications / Zohreh Sanaei Moghaddam
by: Moghaddam, Zohreh Sanaei
Published: (2014)
by: Moghaddam, Zohreh Sanaei
Published: (2014)
Towards Islamic ethics in professional penetration testing
by: Habaebi, Mohamed Hadi
Published: (2013)
by: Habaebi, Mohamed Hadi
Published: (2013)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Mobile Cloud Computing Solution for Visualization of Road Roughness
by: Lam, Chen Riang
Published: (2017)
by: Lam, Chen Riang
Published: (2017)
Study on Security Testing-as-a-Service (TaaS) in Cloud Environment
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)
by: Ejaz, Ahmed
Published: (2016)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
An implementation of JUnit Test Framework to support mobile application testing / Muhammad Afiq Mohamad Tahir
by: Mohamad Tahir, Muhammad Afiq
Published: (2015)
by: Mohamad Tahir, Muhammad Afiq
Published: (2015)
Mobile cloud computing for smartphones: Application development model and application piracy control / Atta Ur Rehman Khan
by: Khan, Atta Ur Rehman
Published: (2014)
by: Khan, Atta Ur Rehman
Published: (2014)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
A MOBILE APPLICATION FOR ANXIETY DISORDER TEST USING HRV
by: Ong, Ming Chen
Published: (2017)
by: Ong, Ming Chen
Published: (2017)
Bandwith conservation framework for mobile cloud computing: challenges and solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Integrated vector instruction translator and offloading framework for mobile cloud computing / Junaid Shuja
by: Junaid , Shuja
Published: (2017)
by: Junaid , Shuja
Published: (2017)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Comparative analysis for performance measurements of software testing between mobile applications and web applications
by: Hassan Muhamad, Zainab
Published: (2015)
by: Hassan Muhamad, Zainab
Published: (2015)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Measuring the efficiency of MFWA technique for prioritizing event sequences test cases
by: Johanna, Ahmad, et al.
Published: (2019)
by: Johanna, Ahmad, et al.
Published: (2019)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
by: Muhammad Habib , Ur Rehman
Published: (2016)
by: Muhammad Habib , Ur Rehman
Published: (2016)
Impatient job scheduling under cloud computing
by: Mahdi, Nawfal A.
Published: (2012)
by: Mahdi, Nawfal A.
Published: (2012)
Performance enhancement framework for cloudlet in mobile cloud computing / Md Whaiduzzaman
by: Md Whaiduzzaman, Abdullah
Published: (2016)
by: Md Whaiduzzaman, Abdullah
Published: (2016)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Similar Items
-
Fuzz test case generation for penetration testing in mobile cloud computing applications
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018) -
Penetration testing model for mobile cloud computing applications / Ahmad Salah Mahmoud Al-Ahmad
by: Mahmoud Al-Ahmad, Ahmad Salah
Published: (2017) -
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018) -
A systematic mapping study on cloud-based mobile application testing
by: Badamasi, Imam Ya'au, et al.
Published: (2019) -
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)