Defining fitness function for search based assessment of grammar reachability
Certain generalized graph nodes reachability problems, such as data dependency flow, have been reformulated as Context Free Grammar (CFG) nonterminals reachability problems, and addressed using grammar reachability analysis. The reformulation efforts could be extended by reformulating such problems...
| Main Authors: | Umar, Kabir, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty, Abdullah @ Selimun, Mohd Taufik |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publishers
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/64716/ http://psasir.upm.edu.my/id/eprint/64716/1/Defining%20fitness%20function%20for%20search%20based%20assessment%20of%20grammar%20reachability.pdf |
Similar Items
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Gap analysis in specifying porting requirements for mobile application
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
Safe & robust reachability analysis of hybrid systems
by: Moggi, Eugenio, et al.
Published: (2018)
by: Moggi, Eugenio, et al.
Published: (2018)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)
by: Hydara, Isatou, et al.
Published: (2014)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Real time server alert system using port scanning and reachability test functions
by: Muhammad Hafiz, Muhamad Hendri
Published: (2013)
by: Muhammad Hafiz, Muhamad Hendri
Published: (2013)
A Code generator tool for the gamma design patterns / Novia Indriaty Admodisastro
by: Novia Indriaty, Admodisastro
Published: (2003)
by: Novia Indriaty, Admodisastro
Published: (2003)
A general approach to the eigenstructure assignment for reachability and stabilizability subspaces
by: Ntogramatzidis, Lorenzo, et al.
Published: (2017)
by: Ntogramatzidis, Lorenzo, et al.
Published: (2017)
Construction of reachable sets for irreversible positive linear discrete dynamical systems
by: Dixon, Tony, et al.
Published: (2008)
by: Dixon, Tony, et al.
Published: (2008)
Mathematics base for navigation mobile robot using reachability petri net
by: Gunardi, Yudhi, et al.
Published: (2018)
by: Gunardi, Yudhi, et al.
Published: (2018)
On the computation of reachability, stabilisability and output-nulling subspaces using the Rosenbrock system matrix
by: Ntogramatzidis, Lorenzo, et al.
Published: (2012)
by: Ntogramatzidis, Lorenzo, et al.
Published: (2012)
An architecture analysis approach for supporting black-box software development.
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML : a process-pluggable ADL for supporting architectural analysis in component-based systems.
by: Admodisastro, Novia Indriaty, et al.
by: Admodisastro, Novia Indriaty, et al.
Usability requirements for architectural analysis tool to support CBD
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML: a process-pluggable ADL for supporting architectural analysis in component-based systems
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
A code generator tool for the gamma design patterns
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
The robust software metric data model defined in XML.
by: Ng , Keng Yap, et al.
Published: (2008)
by: Ng , Keng Yap, et al.
Published: (2008)
Applying evolution programming search based software engineering (SBSE) in selecting the best open source software maintainability metrics
by: Bakar, Abubakar Diwani, et al.
Published: (2012)
by: Bakar, Abubakar Diwani, et al.
Published: (2012)
Computation of regular friends for output-nulling and reachability subspaces of linear time-invariant descriptor systems
by: Kazantzidou, C., et al.
Published: (2018)
by: Kazantzidou, C., et al.
Published: (2018)
A dynamic reconfiguration model of web services in service-oriented architecture
by: Ilahi, Rahmat, et al.
Published: (2017)
by: Ilahi, Rahmat, et al.
Published: (2017)
A systematic mapping of quality models for AI systems, software and components
by: Ali, Mohamed Abdullahi, et al.
Published: (2022)
by: Ali, Mohamed Abdullahi, et al.
Published: (2022)
Improving data reliability assessment in ETL processes through quality scoring technique in data analytics
by: Atika Razali, Nor Famiera, et al.
Published: (2024)
by: Atika Razali, Nor Famiera, et al.
Published: (2024)
On defining the incomplete gamma function
by: Fisher, Brian, et al.
Published: (2003)
by: Fisher, Brian, et al.
Published: (2003)
Class diagram critic: a design critic tool for UML class diagram
by: Abdulkareem, Soran Mahmood, et al.
Published: (2017)
by: Abdulkareem, Soran Mahmood, et al.
Published: (2017)
Systematic literature review : the important factors in assessing the trustworthiness of OSS.
by: Md. Sultan, Abu Bakar, et al.
Published: (2013)
by: Md. Sultan, Abu Bakar, et al.
Published: (2013)
Hybrid Genetic Algorithms and Line Search Method for Industrial Production Planning with Nonlinear Fitness Function
by: Vasant, P., et al.
Published: (2008)
by: Vasant, P., et al.
Published: (2008)
Searching for spatial data resources by fitness for use
by: Ivanova, Ivana, et al.
Published: (2013)
by: Ivanova, Ivana, et al.
Published: (2013)
Defining the links between paternal diet, metabolic health, and reproductive fitness in mice
by: Eid, Nader
Published: (2024)
by: Eid, Nader
Published: (2024)
Grammar teaching for grammar learning
by: Ellis, Rod
Published: (2014)
by: Ellis, Rod
Published: (2014)
Similar Items
-
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014) -
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018) -
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016) -
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)