Books 2012(1 publication) [publication]Wolter, K. and Avritzer, A. and Marco Vieira and Moorsel, A.v. , "Resilience Assessment and Evaluation of Computing Systems", vol. 1, 2012 2010(1 publication) [publication]Marco Vieira , "Dependability Benchmarking for OLTP Systems: A Mandatory Path", 2010 Journal Articles 2020(1 publication) [publication]Casaleiro, R. and Paulo Silva and Simões, P. and Boavida, F. and Edmundo Monteiro and Marilia Curado and Tiago Cruz and Nuno Antunes and Marco Vieira and Riccio, G.M. and Verzillo, M.P. and Marek, P. and Goncalves, L. and Bagnato, A. and Valentini, A. and Intonti, B. and Manzo, R. and Posta, V.D. and Zampolini, L. and Rooij, J.v. and Houf, R. and Rios, E. and Iturbe, E. and Gutierrez, I. and Anguita, S. and Gomez, C. and Echevarria, J. and Houf, H. and Nicoletti, L. and Lotti, R. and Natale, D. and Pizzo, L.d. and Pane, F. and Schiavo, F. , "Protection and control of personal identifiable information: The PoSeID-on approach", Journal of Data Protection & Privacy, vol. 3, 2020 2019(6 publications) [publication]Alic, A.S. and Almeida, J. and Aloisio, G. and Andrade, N. and Nuno Antunes and Ardagna, D. and Badia, R.M. and Basso, T. and Blanquer, I. and Braz, T. and Brito, A. and Elia, D. and Fiore, S. and Guedes, D. and Lattuada, M. and Lezzi, D. and Maciel, M. and Jr, W.M. and Mestre, D. and Moraes, R. and Morais, F. and Pires, C.E. and Kozievitchi, N.P. and Santos, W.d. and Paulo Silva and Marco Vieira , "BIGSEA: A Big Data analytics platform for public transportation information", Future Generation Computer Systems, 2019 [publication]Oliveira, R.A.C.d and Raga, M.M. and Laranjeiro, N. and Marco Vieira , "An approach for benchmarking the security of web service frameworks", Future Generation Computer Systems, 2019 [publication]Braga, A.M. and Dahab, R. and Nuno Antunes and Laranjeiro, N. and Marco Vieira , "Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software", IEEE Transactions on Reliability, 2019 [publication]João R. Campos and Costa, E. and Marco Vieira , "Improving Failure Prediction by Ensembling the Decisions of Machine Learning Models: A Case Study", IEEE Access, vol. 7, pp. 177661-177674, 2019 [publication]Matheus Torquato and Maciel, P. and Marco Vieira , "A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling", IEEE Access, vol. 7, pp. 138315-138326, 2019 [publication]Nunes, P. and Medeiros, I. and José Fonseca and Neves, N. and Correia, M. and Marco Vieira , "An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios", Computing, vol. 101, pp. 161-185, 2019 2018(3 publications) [publication]Karima Velasquez and David Perez Abreu and Assis, M.R. and Senna, C. and Aranha, D.F. and Bittencourt, L. and Laranjeiro, N. and Marilia Curado and Marco Vieira and Edmundo Monteiro and Madeira, E. , "Fog orchestration for the Internet of Everything: state-of-the-art and research challenges", Journal of Internet Services and Applications, vol. 9, 2018 [publication]Paulo Silva and Basso, T. and Nuno Antunes and Moraes, R. and Marco Vieira and Simões, P. and Edmundo Monteiro , "A Europe-Brazil Context for Secure Data Analytics in the Cloud", IEEE Security & Privacy, vol. 16, pp. 52-60, 2018 [publication]José Fonseca and Nunes, P. and Marco Vieira and Medeiros, I. and Neves, N. and Correia, M. , "Benchmarking Static Analysis Tools for Web Security", IEEE Transactions on Reliability, vol. 67, pp. 1159-1175, 2018 2017(4 publications) [publication]Javier Cámara and Lemos, R.d. and Laranjeiro, N. and Ventura, R.S. and Marco Vieira , "Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems", IEEE Transactions on Dependable and Secure Computing, 2017 [publication]Rodrigues, D. and Pires, R.d.M. and Marconato, E.A. and Areias, C. and Cunha, J.C. and Branco, K. and Marco Vieira , "Service-Oriented Architectures for a Flexible and Safe Use of Unmanned Aerial Vehicles", IEEE Intelligent Transportation Systems Magazine , vol. 9, pp. 97-109, 2017 [citation][year=2020]Siddhartha Gupta and Umut Durak, RESTful Software Architecture for ROS-based Onboard Mission System for Drones, AIAA Scitech 2020 Forum, 6-10 January 2020, Orlando, FL, https://doi.org/10.2514/6.2020-0239 [citation][year=2019]Matthieu Carre, Ernesto Expósito, Javier Ibañez-Guzman. Methodology And Architecture For Safety Management. 9th International Conference on Computer Science, Engineering and Applications (ICCSEA 2019), Dec 2019, Dubai, United Arab Emirates. ff10.5121/csit.2019.91801ff. ffhal-02416468f [citation][year=2018]Chuanlong Li, Xingming Sun, A Novel Meteorological Sensor Data Acquisition Approach Based on Unmanned Aerial Vehicle, International Journal of Sensor Networks Vol. 28, No. 2, 2018 DOI: 10.1504/IJSNET.2017.10013468 [citation][year=2018]J. Castagno, C. Ochoa and E. Atkins, "Comprehensive Risk-based Planning for Small Unmanned Aircraft System Rooftop Landing," 2018 International Conference on Unmanned Aircraft Systems (ICUAS), Dallas, TX, 2018, pp. 1031-1040. doi: 10.1109/ICUAS.2018.8453483 [citation][year=2018]M. Carré, E. Exposito and J. Ibanez-Guzman, "Challenges for the Self-Safety in Autonomous Vehicles," 2018 13th Annual Conference on System of Systems Engineering (SoSE), Paris, 2018, pp. 181-188. doi: 10.1109/SYSOSE.2018.8428718 [citation][year=2018]A. Mukherjee, S. Misra and N. S. Raghuwanshi, "SPA: A sense-predict-actuate TDMA latency reduction scheme in networked quadrotors," 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, 2018, pp. 1-6. doi: 10.1109/WCNC.2018.8377091 [citation][year=2018]McDonough, K., Castagno J.D., Player, J., Atkins, E.M. (2018). RANGR: Risk Aware Navigation and Guidance for Resilience. AUVSI XPONENTIAL 2018 [citation][year=2018]Vannini, V., Da Silva Arantes, J., Mattei, A.P., Figueira, N., Da Silva Arantes, M., Toledo, C.F.M., Júnior, O.T., De Saqui-Sannes, P., Service-oriented architecture to integrate flight safety and mission management subsystems into UAVs (2018) 31st Congress of the International Council of the Aeronautical Sciences, ICAS 2018 [publication]Silva, N. and Cunha, J.C. and Marco Vieira , "A field study on root cause analysis of defects in space software", Reliability Engineering & System Safety, vol. 158, pp. 213-229, 2017 [citation][year=2020]Samrat Chatterjee, Shital Thekdi, An iterative learning and inference approach to managing dynamic cyber vulnerabilities of complex systems, Reliability Engineering & System Safety, Volume 193, 2020, 106664, ISSN 0951-8320, https://doi.org/10.1016/j.ress.2019.106664. (http://www.sciencedirect.com/science/article/pii/S0951832018314558) [citation][year=2020]João Agnelo, Nuno Laranjeiro, Jorge Bernardino, Using Orthogonal Defect Classification to characterize NoSQL database defects, Journal of Systems and Software, Volume 159, 2020, 110451, ISSN 0164-1212, https://doi.org/10.1016/j.jss.2019.110451. (http://www.sciencedirect.com/science/article/pii/S0164121219302250) [citation][year=2020]Knutsen, Eric E., Detecting Failures and Locating Faults in Global Scale Online Services Using Bayesian Networks, The George Washington University, ProQuest Dissertations Publishing, 2020. 27544911. [citation][year=2019]Seunghwa Jung, Jihwan P. Choi, Predicting system failure rates of SRAM-based FPGA on-board processors in space radiation environments, Reliability Engineering & System Safety, Volume 183, 2019, Pages 374-386, ISSN 0951-8320, https://doi.org/10.1016/j.ress.2018.09.015. (http://www.sciencedirect.com/science/article/pii/S0951832018304459) [citation][year=2019]Santoso, S., Bakhri, S., & Situmorang, J. (2019). A Bayesian Network Approach to Estimating Software Reliability of RSG-GAS Reactor Protection System. Atom Indonesia, 45(1), 43-49. doi:http://dx.doi.org/10.17146/aij.2019.775 [citation][year=2017]Sobel, Karen. "Root Cause Analysis: Parsing Complex Challenges in Academic Libraries." The Journal of Academic Librarianship (2017). [citation][year=2017]Gallina, B., R. Natella, D. Cotroneo, L. De Simone, S. Rosiello, H. Madeira, A. Lanzaro et al. "Journal special issues." Reliability Engineering & System Safety (Elsevier) 158 (2017): 152-253. [publication]Mendes, J. and Laranjeiro, N. and Marco Vieira , "Toward Characterizing HTML Defects on the Web", Software: Practice and Experience, 2017 2016(2 publications) [publication]Vecchiato, D. and Martins, E. and Marco Vieira , "The Devils behind Android Security Configuration", IEEE Computer, 2016 [publication]Nuno Antunes and Marco Vieira , "Designing vulnerability testing tools for web services: approach, components, and tools", International Journal of Information Security, pp. 1-23, 2016 2015(7 publications) [publication]Nuno Antunes and Marco Vieira , "Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples", IEEE Transactions on Services Computing, 2015 [citation][year=2016]V. Chang, Y.-H. Kuo, and M. Ramachandran, “Cloud computing adoption framework: A security framework for business clouds,” Future Generation Computer Systems, vol. 57, pp. 24–41, 2016. [citation][year=2015]Y. Wu, F. He, D. Zhang, and X. Li, “Service-Oriented Feature-Based Data Exchange for Cloud-Based Design and Manufacturing,” IEEE Transactions on Services Computing, pp. 1–1, 2015. [publication]Veras, P.C. and Villani, E. and Ambrósio, A.M. and Marco Vieira and Madeira, H. , "A Benchmarking Process to Assess Software Requirements Documentation for Space Applications", Journal of Systems and Software (JSS), vol. 100, 2015 [publication]Ivano Alessandro Elia and Laranjeiro, N. and Marco Vieira , "A Practical Approach towards Automatic Testing of Web Services Interoperability", International Journal of Web Services Research, 2015 [publication]Oliveira, R.A.C.d and Laranjeiro, N. and Marco Vieira , "Assessing the security of web service frameworks against denial of service attacks", Journal of Systems and Software, 2015 [publication]Lourenço, J.R. and Bruno Cabral and Carreiro, P. and Marco Vieira and Jorge Bernardino , "Choosing the right NoSQL database for the job: a quality attribute evaluation", Journal of Big Data 2015, vol. 2, 2015 [publication]Lourenço, J.R. and Bruno Cabral and Jorge Bernardino and Marco Vieira , "Comparing NoSQL with a Relational Database: Performance and Space", International Journal of Big Data, vol. 2, pp. 1-14, 2015 [publication]Milenkoski, A. and Marco Vieira and Kounev, S. and Avritzer, A. and Payne, B.D. , "Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices", ACM Comput. Surv., vol. 48, 2015 2014(6 publications) [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "A Technique for Deploying Robust Web Services", IEEE Transactions on Services Computing, vol. 47, 2014 [publication]José Fonseca and Seixas, N. and Marco Vieira and Madeira, H. , "Analysis of Field Data on Web Security Vulnerabilities", IEEE Transactions on Dependable and Secure Computing, vol. 11, 2014 [publication]José Fonseca and Marco Vieira and Madeira, H. , "Evaluation of Web Security Mechanisms using Vulnerability & Attack Injection", IEEE Transactions on Dependable and Secure Computing, vol. 11, 2014 [publication]Javier Cámara and Lemos, R.d. and Laranjeiro, N. and Ventura, R.S. and Marco Vieira , "Testing the Robustness of Controllers for Self-Adaptive Systems", Journal of the Brazilian Computer Society (JBCS), 2014 [publication]Nuno Antunes and Marco Vieira , "Penetration Testing for Web Services", IEEE Computer, vol. 47, pp. 30-36, 2014 [citation][year=2015]T. Aghariya, “Security Testing on Web Application,” MSc Thesis, Charles Darwin University, Darwin, 2015. [citation][year=2015]T. Fertig and P. Braun, “Model-driven Testing of RESTful APIs,” in Proceedings of the 24th International Conference on World Wide Web Companion, Republic and Canton of Geneva, Switzerland, 2015, pp. 1497–1502. [citation][year=2014]C. T. Phong and W. Q. Yan, “An Overview of Penetration Testing,” International Journal of Digital Crime and Forensics (IJDCF), vol. 6, no. 4, pp. 50–74, 2014. [citation][year=2014]T. P. Chiem, “A study of penetration testing tools and approaches,” MSc Thesis, Auckland University of Technology, Auckland, New Zealand, 2014. [citation][year=2014]I. Mukhopadhyay, “Web Penetration Testing using Nessus and Metasploit Tool,” IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 3, pp. 126–129, 2014. [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "Approaches and Challenges in Database Intrusion Detection", ACM SIGMOD Record, vol. 43, pp. 36-47, 2014 2013(2 publications) [publication]Javier Cámara and Lemos, R.d. and Marco Vieira and Raquel Almeida and Ventura, R.S. , "Architecture-Based Resilience Evaluation for Self-Adaptive Systems", Computing: Special Issue on Software Architecture for Code Testing and Analysis, 2013 [publication]Margarido, I.L. and Faria, J.P. and Marco Vieira and Vidal, R.M. , "Challenges in Implementing CMMI® High Maturity: Lessons Learned and Recommendations", Software Quality Professional, vol. 15, 2013 2012(3 publications) [publication]Nuno Antunes and Marco Vieira , "Defending against Web Application Vulnerabilities", Computer, vol. 45, pp. 66-72, 2012 [citation][year=2015]W. Zhenhui, W. Zhenduo, X. Yingbai, and Z. Kanmai, “Research And Design Of Xml-Based Web Database Security Middleware,” Computer Applications and Software, vol. 32, no. 8, pp. 38–42, 2015. [citation][year=2015]R. Jourmand and S. E. Alavi, “Detection of Anomalous users in Web Applications using Fuzzy Logic,” International Journal of Research and Review, vol. 2, no. 7, 2015. [citation][year=2015]S. Kak, “Security basics for web application developers,” International Journal of Information Technology & Computer Sciences Perspectives, vol. 4, no. 1, 2015. [citation][year=2015]D. Gol and N. Shah, “Web Application security tool to identify the different Vulnerabilities using RUP model.” [citation][year=2015]A. K. Shrestha, P. S. Maharjan, and S. Paudel, “Identification and Illustration of Insecure Direct Object References and their Countermeasures,” International Journal of Computer Applications, vol. 114, no. 18, 2015. [citation][year=2014]A.-S. K. Pathan and D. A. Kindy, “Lethality of SQL injection against current and future internet technologies,” International Journal of Computational Science and Engineering, vol. 9, no. 4, pp. 386–394, 2014. [citation][year=2014]A. Thankachan, R. Ramakrishnan, and M. Kalaiarasi, “A survey and vital analysis of various state of the art solutions for web application security,” in 2014 International Conference on Information Communication and Embedded Systems (ICICES), 2014, pp. 1–9. [citation][year=2014]A. Patil, R. Pandit, and S. Patel, “Implementation of security framework for multiple web applications,” in 2014 International Conference on Computer Communication and Informatics (ICCCI), 2014, pp. 1–7. [citation][year=2014]W. He, A. Kshirsagar, A. Nwala, and Y. Li, “Teaching Information Security with Workflow Technology–A Case Study Approach,” Journal of Information Systems Education, vol. 25, no. 3, p. 201, 2014. [citation][year=2014]C. T. Phong and W. Q. Yan, “An Overview of Penetration Testing,” International Journal of Digital Crime and Forensics (IJDCF), vol. 6, no. 4, pp. 50–74, 2014. [citation][year=2014]M. Kumar, “Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network,” in 2014 International Conference on Information Technology (ICIT), 2014, pp. 58–62. [citation][year=2014]A. AIT OUAHMAN, “SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING,” Journal of Defense Resources Management (JoDRM), no. 02, pp. 99–108, 2014. [citation][year=2014]T. P. Chiem, “A study of penetration testing tools and approaches,” MSc Thesis, Auckland University of Technology, Auckland, New Zealand, 2014. [citation][year=2014]S. George, “An Imperative Analysis of diverse State of Art Solutions for Internet and Web Application Security,” presented at the International conference on Computer Science and Information Systems (ICSIS’2014), Dubai, 2014. [citation][year=2014]D. G. Kumar and M. Chatterjee, “Detection Block Model for SQL Injection Attacks,” International Journal of Computer Network and Information Security(IJCNIS), vol. 6, no. 11, pp. 56–63, 2014. [citation][year=2014]P. D. Buck, Q. Shi, and B. Zhou, “Monitoring and Testing Web Services,” in The 15th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNET 2014), Liverpool, UK, 2014. [citation][year=2014]K. A. Varunkumar, M. Prabakaran, A. Kaurav, S. S. Chakkaravarthy, S. Thiyagarajan, and P. Venkatesh, “Various Database Attacks and its Prevention Techniques.” [citation][year=2014]R. B. Kalaati and B. J. Chelliah, “SQL Injection: Attacking & Prevention Techniques,” International Journal of Innovative Research and Development, 2014. [citation][year=2014]I. M. Khalil, A. Khreishah, and M. Azeem, “Cloud Computing Security: A Survey,” Computers, vol. 3, no. 1, pp. 1–35, Feb. 2014. [citation][year=2013]A. Razzaq, K. Latif, H. F. Ahmad, A. Hur, Z. Anwar, and P. C. Bloodsworth, “Semantic security against web application attacks,” Information Sciences, Aug. 2013. [citation][year=2013]H. Shahriar, S. North, and W.-C. Chen, “EARLY DETECTION OF SQL INJECTION ATTACKS,” International Journal of Network Security & Its Applications (IJNSA), vol. 5, no. 4, pp. 53–65, Jul. 2013. [citation][year=2013]H. Shahriar, S. North, and W.-C. Chen, “Client-Side Detection of SQL Injection Attack,” in Advanced Information Systems Engineering Workshops, 2013, pp. 512–517. [citation][year=2013]Y. Hongyu, B. In, and X. Lixia, “Three-dimensional spherical model based XML communication protocols security evaluation method,” Journal on Communications, vol. 34, no. 3, pp. 183–191, 2013. [citation][year=2013]M. H. Abd. Rahim, “Information security management metrics in web application,” MSc Thesis, Universiti Teknologi Malaysia, Faculty of Computing, Malaysia, 2013. [citation][year=2013]A. Sadeghian, M. zamani, and S. Ibrahim, “SQL Injection Is Still Alive: A Study on SQL Injection Signature Evasion Techniques,” in 2013 International Conference on Informatics and Creative Multimedia (ICICM), 2013, pp. 265–268. [citation][year=2012]M. S. Parate and M. S. M. Nirkhi, “A Review of Network Forensics Techniques for the Analysis of Web Based Attack,” International Journal of Advanced Computer Research, vol. 2, no. 6, pp. 114–119, Dec. 2012. [citation][year=2012]H. Shahriar and M. Zulkernine, “Information-Theoretic Detection of SQL Injection Attacks,” in 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE), Omaha, NE, USA, 2012, pp. 40 –47. [citation][year=2012]T. Dehling and A. Sunyaev, “Information Security of Patient-Centred Services Utilising the German Nationwide Health Information Technology Infrastructure,” in 3rd USENIX Workshop on Heath Security and Privacy (HealthSec ’12), Bellevue, WA, 2012. [citation][year=2012]K. S. Han, T. Kim, K. Y. Han, J. M. Lim, and C. Pyo, “An Improvement of the Guideline of Secure Software Development for Korea E-Government,” Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 5, pp. 1179–1189, 2012. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "A Robustness Testing Approach for SOAP Web Services", Journal of Internet Services and Applications (JISA), 2012 [publication]Raquel Almeida and Vieira, J. and Marco Vieira and Madeira, H. and Jorge Bernardino , "Cost-Effective Data Allocation in Data Warehouse Striping", International Journal of Database Management Systems (IJDMS), ISSN: 0975-5705 (online) - 0975-5985 (print), vol. 4, 2012 2011(2 publications) [publication]Araújo Neto, A.C.d. and Marco Vieira , "Selecting Secure Web Applications Using Trustworthiness Benchmarking", International Journal of Dependable and Trustworthy Information Systems , vol. 2, pp. 1-16, 2011 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support", International Journal of Secure Software Engineering, vol. 2, pp. 42-62, 2011 2010(1 publication) [publication]Araújo Neto, A.C.d. and Marco Vieira , "Benchmarking Untrustworthiness: An Alternative to Security Measurement", International Journal of Dependable and Trustworthy Information Systems, vol. 1, pp. 32-54, 2010 [citation][year=2013]S. Zonouz, R. Berthier, H. Khurana, W. Sanders, T. Yardley, "Seclius: An Information Flow-based, Consequence-centric Security Metric", IEEE Transactions on Parallel and Distributed Systems, vol.PP, no.99, 2013. [citation][year=2010]Ming Li, B. Alessio, Wanlei Zhou, "OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security", 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China, December 2010. 2008(2 publications) [publication]Pintér, G. and Madeira, H. and Marco Vieira and Majzik, I. and Pataricza, A. , "Integration of OLAP and Data Mining for Analysis of Results from Dependability Evaluation Experiments", in International Journal of Knowledge Management Studies (IJKMS), Volume 2 Issue 4, 2008 [citation][year=2010]1. F. Bourennani, G.M. Rizvi, D. Ross, D., "Plastic color mismatch causes identification using OLAP and data mining", 2010 Fifth International Conference on Digital Information Management, ICDIM 2010, Thunder Bay, Ontario, Canada, July 2010. [citation][year=2010]2. Piotr Gawkowski, Monika A. Kuczy?ska, Agnieszka Komorowska, "Fault Effects Analysis and Reporting System for Dependability Evaluation", Seventh International Conference on Rough Sets and Current Trends in Computing, RSCTC 2010, Warsaw, Poland, June 2010. [publication]Laranjeiro, N. and Marco Vieira , "Deploying Fault Tolerant Web Service Compositions", International Journal of Computer Systems Science and Engineering (CSSE), Special Issue on Engineering Fault Tolerant Systems (EFTS), vol. 23, 2008 [citation][year=2012]Andreas Schönberger and Guido Wirtz, “Configurable analysis of sequential multi-party choreographies,” Computer Systems: Science & Engineering 27, no. 2, March 2012. [citation][year=2012]Andreas Schönberger, “The CHORC Approach: How to Model B2Bi Choreographies for Orchestration Execution”, PhD Thesis, University of Bamberg, Germany, July 2012. [citation][year=2011]Yuhui Chen, Anatoliy Gorbenko, Vyacheslav Kharchenko, and Alexander Romanovsky, “Measuring and Dealing with the Uncertainty of SOA Solutions,” Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, ed by. Valeria Cardellini, Emiliano Casalichio, Kalinka Castelo Branco, Júlio Cezar Estrella, and Francisco José Monaco, 265–294, IGI Global, ISBN: 1609607945, July 2011. 2005(1 publication) [publication]Marco Vieira and Joao Duraes and Madeira, H. , "Especificação e Validação de Benchmarks de Confiabilidade para Sistemas Transaccionais (How to Specify and Validate Dependability Benchmarks for Transactional Systems)", Revista IEEE América Latina (IEEE Latin America Transactions), ISSN 1548-0992, 2005 [citation][year=2007]1. José Maria Monteiro, Sérgio Lifschitz, Ângelo Brayner, “Extraindo Metadados de SGBDs”, Monografias em Ciência da Computação n° XX/07, ISSN 0103-9741, Departamento de Informática, Pontifícia Universidade Católica do Rio De Janeiro, December 2007. [citation][year=2007]2. Nádia Félix Felipe da Silva, “Armazenamento de Dados XML: Técnicas de Benchmark para avaliação”, Final Project, Bachelor in Computer Science, Universidade Federal de Goiás, Brazil, 2007. [citation][year=2006]1. Ricardo Czelusniak da Silva, “Benchmark em Banco de Dados Multimídia: Análise de Desempenho em Recuperação de Objetos Multimídia”, MSc Thesis, Federal University of Paraná, Curitiba, Brazil, 2006. 2004(1 publication) [publication]Marco Vieira and Madeira, H. , "Joint Evaluation of Recovery and Performance of a COTS DBMS in the Presence of Operator Faults", Performance Evaluation Journal, 2004 [citation][year=2013]Madhu Jain, "Availability prediction of imperfect fault coverage system with reboot and common cause failure", International Journal of Operational Research, Vol. 17 Issue 3, June 2013. [citation][year=2007]1. Salvatore Orlando, “Software Aging Analysis of Off The Shelf Software Items”, PhD Thesis, “FEDERICO II” University of Naples, Naples, Italy, October 2007. Conference Articles 2020(1 publication) [publication]João R. Campos and Costa, E. and Marco Vieira , "On Configuring a Testbed for Dependability Experiments: Guidelines and Fault Injection Case Study", in Computer Safety, Reliability, and Security, 2020 2019(7 publications) [publication]João R. Campos and Marco Vieira and Costa, E. , "Propheticus: Machine Learning Framework for the Development of Predictive Models for Reliable and Secure Software", in International Symposium on Software Reliability Engineering (ISSRE), 2019 [publication]Matheus Torquato and Marco Vieira , "Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense", in Student Forum paper of the 15th European Dependable Computing Conference (EDCC 2019), 2019 [publication]Matheus Torquato and Guedes, E. and Maciel, P. and Marco Vieira , "A Hierarchical Model for Virtualized Data Center Availability Evaluation", in 2019 15th European Dependable Computing Conference (EDCC), 2019 [publication]Matheus Torquato and Marco Vieira , "An Experimental Study of Software Aging and Rejuvenation in Dockerd", in 15th European Dependable Computing Conference (EDCC), 2019 [publication]José D'Abruzzo Pereira and João R. Campos and Marco Vieira , "An Exploratory Study of the Combination of Static Analysis Tools Alerts for Vulnerability Detection using Machine Learning", in IX Latin-American Symposium on Dependable Computing (LADC 2019), 2019 [publication]Matheus Torquato and Torquato, L. and Maciel, P. and Marco Vieira , "IaaS Cloud Availability Planning using Models and Genetic Algorithms", in IX Latin-American Symposium on Dependable Computing (LADC 2019), November 2019, 2019 [publication]Lemes, C.I. and Naessens, V. and Marco Vieira , "Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices", in 2019 International Symposium on Software Reliability Engineering (ISSRE), 2019 2018(5 publications) [publication]Medeiros, N.P.d.S. and Naghmeh Ivaki and Costa, P. .N.d. and Marco Vieira , "An Approach for Trustworthiness Benchmarking using Software Metrics", in The 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018), 2018 [publication]Alic, A.S. and Almeida, J. and Jr, W.M. and Guedes, D. and Santos, W.d. and Blanquer, I. and Fiore, S. and Kozievitchi, N.P. and Andrade, N. and Braz, T. and Brito, A. and Pires, C.E. and Nuno Antunes and Marco Vieira and Paulo Silva and Ardagna, D. and Fonseca, K. and Lezzi, D. and Elia, D. and Moraes, R. and Basso, T. and Cavassin, W.H. , "GIS and Data: Three applications to enhance Mobility", in GeoInfo 2018, 2018 [publication]João R. Campos and Marco Vieira and Costa, E. , "Exploratory Study of Machine Learning Techniques for Supporting Failure Prediction", in 2018 14th European Dependable Computing Conference (EDCC), 2018 [publication]José Fonseca and Marco Vieira and Nunes, P. and Algaith, A. and Gashi, I. , "Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools", in 2018 14th European Dependable Computing Conference (EDCC), 2018 [publication]Matheus Torquato and Marco Vieira , "Interacting SRN models for Availability Evaluation of VM Migration as rejuvenation on a system under varying workload", in 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2018 2017(7 publications) [publication]Silva, N. and Marco Vieira and Cunha, J.C. and Chillarege, R. , "Evaluating a Corpus of Root Causes and Measures to guide RCA processes in Critical Software", in IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), 2017 [publication]Medeiros, N.P.d.S. and Naghmeh Ivaki and Costa, P. .N.d. and Marco Vieira , "Towards an Approach for Trustworthiness Assessment of Software as a Service", in IEEE International Conference on EDGE Computing (EDGE 2017), 2017 [publication]Martins, B. and Laranjeiro, N. and Marco Vieira , "INTENSE: INteroperability TEstiNg as a SErvice", in 24th IEEE International Conference on Web Services (ICWS 2017), 2017 [publication]Medeiros, N.P.d.S. and Naghmeh Ivaki and Costa, P. .N.d. and Marco Vieira , "Software Metrics as Indicators of Security Vulnerabilities", in 28th IEEE International Symposium on Software Reliability Engineering (ISSRE), 2017, 2017 [publication]Ivano Alessandro Elia and Nuno Antunes and Laranjeiro, N. and Marco Vieira , "An Analysis of OpenStack Vulnerabilities", in 13th European Dependable Computing Conference (EDCC), 2017 [publication]Braga, A.M. and Dahab, R. and Nuno Antunes and Laranjeiro, N. and Marco Vieira , "Practical Evaluation of Static Code Analysis Tools for Cryptography: Benchmarking Method and Case Study", in The IEEE 28th International Symposium on Software Reliability Engineering (ISSRE 2017), 2017 [publication]José Fonseca and Nunes, P. and Marco Vieira and Medeiros, I. and Neves, N. and Correia, M. , "On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study", in 2017 13th European Dependable Computing Conference (EDCC), 2017 2016(5 publications) [publication]Ricardo Jorge Santos and Marco Vieira and Jorge Bernardino , "XSX: Lightweight encryption for data warehousing environments", in International Conference on Big Data Analytics and Knowledge Discovery, DaWaK 2016, 2016 [publication]Silva, N. and Marco Vieira , "Software for Embedded Systems: A Quality Assessment Based on Improved ODC Taxonomy", in 31st Annual ACM Symposium on Applied Computing, 2016 [publication]Vecchiato, D. and Marco Vieira and Martins, E. , "Risk Assessment of User-Defined Security Configurations for Android Devices", in International Symposium on Software Reliability Engineering (ISSRE) , 2016 [publication]Milenkoski, A. and Jayaram, K.R. and Nuno Antunes and Marco Vieira and Kounev, S. , "Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments", in International Symposium on Software Reliability Engineering (ISSRE) , 2016 [publication]Silva, N. and Marco Vieira , "Adapting the Orthogonal Defect Classification Taxonomy to the Space Domain", in International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2016), 2016 2015(15 publications) [publication]Ivano Irrera and Joao Duraes and Marco Vieira , "Adaptive Failure Prediction for Computer Systems: a Framework and a Case Study", in HASE 2015 - 16th IEEE International Symposium on High Assurance Systems Engineering , 2015 [publication]Oliveira, R.A.C.d and Laranjeiro, N. and Marco Vieira , "Characterizing the Performance of Web Service Frameworks under Security Attacks", in The 30th ACM/SIGAPP Symposium On Applied Computing (SAC 2015), 2015 [publication]Ivano Alessandro Elia and Laranjeiro, N. and Marco Vieira , "Test-based Interoperability Certification for Web Services", in The 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2015), 2015 [publication]Ivano Irrera and Marco Vieira , "Towards assessing representativeness of fault injection-generated Failure Data for Online Failure Prediction", in 1st Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE 2015) at DSN 2015, 2015 [publication]Lourenço, J.R. and Abramova, V. and Marco Vieira and Bruno Cabral and Jorge Bernardino , "NoSQL Databases: A Software Engineering Perspective", in WorldCIST'15, 2015 [publication]Lourenço, J.R. and Abramova, V. and Bruno Cabral and Jorge Bernardino and Carreiro, P. and Marco Vieira , "No SQL in Practice: A Write-Heavy Enterprise Application", in 2015 IEEE International Congress on Big Data (BigData Congress), 2015 [publication]Areias, C. and Marco Vieira and Cunha, J.C. , "Studying the Propagation of Failures in SOAs", in International Workshop on Recent Advances in the Dependability Assessment of Complex Systems (RADIANCE’2015), 2015 [citation][year=2018]Jones, T.B., Ackley, D.H., Damage reduction via white-box failure shaping (2018) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11036 LNCS, pp. 213-228. DOI: 10.1007/978-3-319-99241-9_11 [citation][year=2017]White, Gary, Andrei Palade, Christian Cabrera, and Siobhán Clarke. "Quantitative evaluation of qos prediction in iot." In Dependable Systems and Networks Workshop (DSN-W), 2017 47th Annual IEEE/IFIP International Conference on, pp. 61-66. IEEE, 2017. [citation][year=2016]Jones, Thomas B., and David H. Ackley. "Scalable Robustness." Dependable Systems and Networks Workshop, 2016 46th Annual IEEE/IFIP International Conference on. IEEE, 2016. [publication]Milenkoski, A. and Payne, B.D. and Nuno Antunes and Marco Vieira and Kounev, S. and Avritzer, A. and Luft, M. , "Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection", in 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, 2015 [publication]Nuno Antunes and Marco Vieira , "On the Metrics for Benchmarking Vulnerability Detection Tools", in Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on, 2015 [publication]Nunes, P. and José Fonseca and Marco Vieira , "phpSAFE: A Security Analysis Tool for OOP Web Application Plugins", in Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on, 2015 [publication]Silva, N. and Marco Vieira and Ricci, D. and Cotroneo, D. , "Consolidated View on Space Software Engineering Problems – An empirical study", in The International Space System Engineering Conference, DASIA 2015, 2015 [publication]Vecchiato, D. and Marco Vieira and Martins, E. , "A Security Configuration Assessment for Android Devices", in Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015 [publication]Basso, T. and Moraes, R. and Jino, M. and Marco Vieira , "Requirements, Design and Evaluation of a Privacy Reference Architecture for Web Applications and Services", in Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015 [publication]Silva, N. and Marco Vieira and Ricci, D. and Cotroneo, D. , "Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV Issues", in Dependable Systems and Networks Workshops (DSN-W), 2015 IEEE International Conference on, 2015 [publication]Braz, A. and Rubira, C.M.F. and Marco Vieira , "Development of Complex Software with Agile Method", in Agile Conference (AGILE), 2015, 2015 2014(14 publications) [publication]Ivano Irrera and Joao Duraes and Marco Vieira , "On the need for training Failure Prediction algorithms in evolving software systems", in 15th IEEE International Symposium on High Assurance Systems Engineering, HASE 2014, 2014 [publication]Javier Cámara and Lemos, R.d. and Laranjeiro, N. and Ventura, R.S. and Marco Vieira , "Robustness Evaluation of the Rainbow Framework for Self-Adaptation", in 29th Symposium on Applied Computing (SAC 2014), 2014 [publication]Ivano Alessandro Elia and Laranjeiro, N. and Marco Vieira , "Understanding Interoperability Issues of Web Service Frameworks", in Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014), 2014 [citation][year=2015]IA Elia, N Laranjeiro, M Vieira, A Practical Approach Towards Automatic Testing of Web Services Interoperability, International Journal of Web Services …, 2015 [citation][year=2014]IA Elia, N Laranjeiro, M Vieira, A Field Perspective on the Interoperability of Web Services, Services Computing (SCC), …, 2014 [citation][year=2014]IA Elia, N Laranjeiro, M Vieira, ITWS: An Extensible Tool for Interoperability Testing of Web Services, Web Services (ICWS), 2014 …, 2014 [publication]Ivano Alessandro Elia and Laranjeiro, N. and Marco Vieira , "A Field Perspective on the Interoperability of Web Services", in 11th IEEE International Conference on Services Computing (SCC 2014), 2014 [publication]Ivano Alessandro Elia and Laranjeiro, N. and Marco Vieira , "ITWS: An Extensible Tool for Interoperability Testing of Web Services", in 21th IEEE International Conference on Web Services (ICWS 2014), 2014 [publication]Ivano Irrera and Marco Vieira , "A Practical Approach for Generating Failure Data for Assessing and Comparing Failure Prediction Algorithms", in PRDC 2014 - The 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014 [publication]Milenkoski, A. and Payne, B.D. and Nuno Antunes and Marco Vieira and Kounev, S. , "An Analysis of Hypercall Handler Vulnerabilities ", in 2014 IEEE 25th International Symposium on Software Reliability Engineering (ISSRE), 2014 [citation][year=2015]R. J. Masti, C. Marforio, K. Kostiainen, C. Soriente, and S. Capkun, “Logical Partitions on Many-Core Platforms,” in Proceedings of the 31st Annual Computer Security Applications Conference, New York, NY, USA, 2015, pp. 451–460. [publication]Javier Cámara and Correia, P.G.R. and Lemos, R.d. and Marco Vieira , "Empirical resilience evaluation of an architecture-based self-adaptive software system", in QoSA '14 Proceedings of the 10th international ACM Sigsoft conference on Quality of software architectures, 2014 [publication]Silva, N. and Marco Vieira , "Orthogonal Classification of Safety Critical Issues", in The 25th IEEE International Symposium on Software Reliability Engineering - ISSRE 2014, 2014 [publication]José Fonseca and Marco Vieira , "A Practical Experience on the Impact of Plugins in Web Security", in The 33rd IEEE Symposium on Reliable Distributed Systems - SRDS 2014, 2014 [publication]Azevedo, D.R. and Ambrósio, A.M. and Marco Vieira , "Towards a Resilience Benchmarking Description Language for the Context of Satellite Simulators (short paper)", in Tenth European Dependable Computing Conference - EDCC 2014, 2014 [publication]Silva, N. and Marco Vieira , "Towards Making Safety-Critical Systems Safer: Learning from Mistakes", in The 25th IEEE International Symposium on Software Reliability Engineering – Student Forum (ISSRE 2014), 2014 [publication]Santos, L.E. and Marilia Curado and Marco Vieira , "A Research Agenda for Benchmarking the Resilience of Software Defined Networks", in The 25th IEEE International Symposium on Software Reliability Engineering – Student Forum (ISSRE 2014), 2014 [publication]Basso, T. and Piardi, L. and Moraes, R. and Jino, M. and Nuno Antunes and Marco Vieira , "A Framework for Expressing and Enforcing Purpose-Based Privacy Policies", in XVI Workshop de Testes e Tolerância a Falhas, WTF 2015, 2014 2013(13 publications) [publication]Javier Cámara and Lemos, R.d. and Laranjeiro, N. and Ventura, R.S. and Marco Vieira , "Robustness Evaluation of Controllers in Self-Adaptive Software Systems", in Latin-American Symposium on Dependable Computing (LADC 2013), 2013 [publication]Nuno Antunes and Marco Vieira , "SOA-Scanner: An Integrated Tool to Detect Vulnerabilities in Service-Based Infrastructures", in 10th IEEE International Conference on Services Computing (SCC 2013), 2013 [citation][year=2015]J. Thome, L. K. Shar, and L. Briand, “Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities,” in 26th IEEE International Symposium on Software Reliability Engineering, Washington, D.C., 2015. [citation][year=2015]M.-A. Laverdiere, B. J. Berger, and E. Merloz, “Taint analysis of manual service compositions using Cross-Application Call Graphs,” in 2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015, pp. 585–589. [publication]Naghmeh Ivaki and Laranjeiro, N. and Marco Vieira , "Towards Evaluating the Impact of Data Quality on Service Applications", in Workshop on Reliability and Security Data Analysis (RSDA 2013) co-located with the The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013), 2013 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "A Specific Encryption Solution for Data Warehouses", in DASFAA 2013 - International Conference on Database Systems for Advanced Applications, 2013 [publication]Ivano Irrera and Joao Duraes and Marco Vieira and Madeira, H. , "Assessing the Impact of Virtualization on the Generation of Failure Prediction Data ", in Sixth Latin-American Symposium on Dependable Computing (LADC), 2013, 2013 [publication]Ivano Irrera and Pereira, C. and Marco Vieira , "The Time Dimension in Predicting Failures: A Case Study ", in Sixth Latin-American Symposium on Dependable Computing (LADC), 2013, 2013 [publication]Raquel Almeida and Araújo Neto, A.C.d. and Marco Vieira , "SCoRe: An Across-the-Board Metric for Computer Systems Resilience Benchmarking", in 1st Workshop on Systems Resilience (WSR 2013), 2013 [publication]Areias, C. and Nuno Antunes and Cunha, J.C. and Marco Vieira , "Towards Runtime V&V for Service Oriented Architectures", in Sixth Latin-American Symposium on Dependable Computing, 2013 [publication]Silva, N. and Barbosa, R. and Cunha, J.C. and Marco Vieira , "A View on the Past and Future of Fault Injection (Fast Abstract)", in The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks , 2013 [citation][year=2020]Junyou Shi, Qingjie He, Zili Wang, Integrated Stateflow-based simulation modelling and testability evaluation for electronic built-in-test (BIT) systems, Reliability Engineering & System Safety, Volume 202, 2020, 107066, ISSN 0951-8320, https://doi.org/10.1016/j.ress.2020.107066. [citation][year=2019]Yanping Gong, Fengyu Qian, and Lei Wang. 2019. Probabilistic Evaluation of Hardware Security Vulnerabilities. ACM Trans. Des. Autom. Electron. Syst. 24, 2, Article 14 (January 2019), 20 pages. DOI: https://doi.org/10.1145/3290405 [citation][year=2019]L. Zhang and M. Monperrus, "TripleAgent: Monitoring, Perturbation and Failure-Obliviousness for Automated Resilience Improvement in Java Applications," 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Berlin, Germany, 2019, pp. 116-127. [citation][year=2019]Gong, Yanping, "Towards Embedded System Hardware Security Design and Analysis" (2019). Doctoral Dissertations. 2354. University of Connecticut - Storrs https://opencommons.uconn.edu/dissertations/2354 [citation][year=2018]Long Zhang and Martin Monperrus, TripleAgent: Monitoring, Perturbation And Failure-obliviousness for Automated Resilience Improvement in Java Applications, arXiv:1812.10706 [cs.SE] Dec 2018. [citation][year=2017]S. Azimi, A. Moramarco and L. Sterpone, "Reliability evaluation of heterogeneous systems-on-chip for automotive ECUs," 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), Edinburgh, 2017, pp. 1291-1296. [citation][year=2016]Cui, Y., Shi, J., and Wang, Z. (2016) Analog circuits fault diagnosis using multi-valued Fisher's fuzzy decision tree (MFFDT). Int. J. Circ. Theor. Appl., 44: 240–260. [citation][year=2016]Yiqian Cui, Junyou Shi, Zili Wang, Analog circuit fault diagnosis based on Quantum Clustering based Multi-valued Quantum Fuzzification Decision Tree (QC-MQFDT), Measurement, Volume 93, 2016, Pages 421-434 [citation][year=2015]Piper, Thorsten. Assessing and Enhancing Functional Safety Mechanisms for Safety-Critical Software Systems. Diss. Technische Universität Darmstadt, 2015 [citation][year=2015]Pintard, Ludovic, et al. "Using Fault Injection to Verify an AUTOSAR Application According to the ISO 26262." SAE 2015 World Congress & Exhibition. SAE International, 2015. [citation][year=2015]Pintard, Ludovic. From safety analysis to experimental validation by fault injection-Case of automotive embedded systems. Diss. INP Toulouse, 2015. [citation][year=2015]Piper, Thorsten, et al. "On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms." Dependable Computing Conference (EDCC), 2015 Eleventh European. IEEE, 2015. [citation][year=2014]L. Pintard, J. C. Fabre, M. Leeman, K. Kanoun and M. Roy, "From Safety Analyses to Experimental Validation of Automotive Embedded Systems," 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing, Singapore, 2014, pp. 125-134. [citation][year=2014]J. D. Park, C. H. Yi, K. H. Kwon and J. W. Jeon, "Method of fault injection for medical device based on ISO 26262," The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014), JeJu Island, 2014, pp. 1-2. [publication]Basso, T. and Nuno Antunes and Moraes, R. and Marco Vieira , "An XML-based Policy Model for Access Control in Web Applications", in 24th International Conference on Database and Expert Systems Applications (DEXA '13), 2013 [publication]Nuno Antunes and Brancati, F. and Ceccarelli, A. and Bondavalli, A. and Marco Vieira , "A Monitoring and Testing Framework for Critical Off-The-Shelf Applications and Services", in 3rd IEEE International Workshop on Software Certification (WoSoCer2013) co-located with the 24rd IEEE International Symposium on Software Reliability Engineering (ISSRE 2013), 2013 [publication]Azevedo, D.R. and Ambrósio, A.M. and Marco Vieira , "HLA Middleware Robustness and Scalability Evaluation in the context of Satellite Simulators", in The 19th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2013, 2013 [publication]Milenkoski, A. and Payne, B.D. and Nuno Antunes and Marco Vieira and Kounev, S. , "HInjector: Injecting Hypercall Attacks for Evaluating VMI-based Intrusion Detection Systems", in Poster Paper, The 2013 Annual Computer Security Applications Conference (ACSAC 2013), 2013 [citation][year=2015]M. A. Hakamian and A. M. Rahmani, “Evaluation of isolation in virtual machine environments encounter in effective attacks against memory,” Security Comm. Networks, vol. 8, no. 18, pp. 4396–4406, 2015. 2012(14 publications) [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "Leveraging 24/7 Availability and Performance for Distributed Real-Time Data Warehouses", in COMPSAC 2012 - IEEE Signature Conference on Computer Software & Applications, 2012 [publication]Oliveira, R.A.C.d and Laranjeiro, N. and Marco Vieira , "Experimental Evaluation of Web Service Frameworks in the Presence of Security Attacks", in IEEE 9th International Conference on Services Computing (SCC 2012), 2012 [citation][year=2013]Andreas Falkenberg, Christian Mainka, Juraj Somorovsky, and Jorg Schwenk, “A new Approach towards DoS Penetration Testing on Web Services,” IEEE 20th International Conference on Web Services (ICWS 2013), Santa Clara, California, USA: IEEE Computer Society, 27 July 2013. [citation][year=2013]Ludwig Stage, “Entwurf einer Methodik zum Testen der Sicherheit von Web-Service-basierten Systemen”, MSc Thesis, Universität Stuttgart, Germany, 10 December 2013. [publication]Oliveira, R.A.C.d and Laranjeiro, N. and Marco Vieira , "WSFAggressor: An Extensible Web Service Framework Attacking Tool", in ACM/IFIP/USENIX 13th International Conference on Middleware (Middleware 2012), 2012 [citation][year=2013]Ludwig Stage, “Entwurf einer Methodik zum Testen der Sicherheit von Web-Service-basierten Systemen”, MSc Thesis, Universität Stuttgart, Germany, 10 December 2013. [publication]Nuno Antunes and Marco Vieira , "Evaluating and Improving Penetration Testing in WebServices", in 23rd IEEE International Symposium on Software Reliability Engineering (ISSRE 2012), 2012 [citation][year=2015]S. Karumanchi and A. Squicciarini, “A Large Scale Study of Web Service Vulnerabilities,” Journal of Internet Services and Information Security (JISIS), vol. 5, no. 1, pp. 53–69, 2015. [citation][year=2014]J. Upadhyaya, N. Panda, and A. A. Acharya, “Attack Generation and Vulnerability Discovery in Penetration Testing using Sql Injection,” 2014. [citation][year=2014]S. Karumanchi and A. C. Squicciarini, “In the Wild: a Large Scale Study of Web Services Vulnerabilities,” presented at the 29th Symposium On Applied Computing, Gyeongju, Republic of Korea, 2014. [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective", in DAWAK 2012 - International Conference on Data Warehousing and Knowledge Discovery, 2012 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "DBMS Application Layer Intrusion Detection for Data Warehouses", in ISD 2012 - Information Systems Development, 2012 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "Securing Data Warehouses from Web-Based Intrusions", in WISE 2012 - International Conference on Web Information Systems Engineering, 2012 [citation][year=2013]Elisa Costante, Sokratis Vavilis, Sandro Etall, Milan Petkovic, Nicola Zannone, "Database Anomalous Activities: Detection and Quantification", 10th International Conference on Security and Cryptography, SECRYPT 2013, Reykjavík, Iceland, July 29-31, 2013. [publication]Wyatt, L. and Caufield, B. and Marco Vieira and Poess, M. , "Incorporating Recovery from Failures into a Data Integration Benchmark", in Fourth TPC Technology Conference on Performance Evaluation & Benchmarking, TPCTC 2012 (jointly organized with the 36th International Conference on Very Large Databases, VLDB12), 2012 [publication]Raquel Almeida and Marco Vieira , "Changeloads for Resilience Benchmarking of Self-Adaptive Systems: A Risk-Based Approach", in 9th European Dependable Computing Conference, EDCC 2012, 2012 [citation][year=2013]Miquel Martínez, Jesús Friginal, David de Andrés, Juan-Carlos Ruiz, "Open Challenges in the Resilience Evaluation of Ad Hoc Networks", 14th European Workshop on Dependable Computing, EWDC 2013, Coimbra, Portugal, May 14-15, 2013. [publication]Azevedo, D.R. and Ambrósio, A.M. and Marco Vieira , "Applying Data Mining for Detecting Anomalies in Satellites", in 9th European Dependable Computing Conference, EDCC 2012, 2012 [publication]Margarido, I.L. and Faria, J.P. and Vidal, R.M. and Marco Vieira , "Towards a Framework to Evaluate and Improve the Quality of Implementation of CMMI® Practices", in 13th International Conference on Product-Focused Software Development and Process Improvement, PROFES 2012, 2012 [publication]Margarido, I.L. and Vidal, R.M. and Marco Vieira , "Lessons Learnt in the Implementation of CMMI® Maturity Level 5", in 8th International Conference on the Quality of Information and Communications Technology, QUATIC 2012, 2012 [publication]Raquel Almeida and Marco Vieira , "Changeloads: a Fundamental Piece on the SASO Systems Benchmarking Puzzle", in International Workshop on Evaluation for Self-Adaptive and Self-Organizing Systems (Eval4SASO), 2012 [publication]Nuno Antunes and Marco Vieira , "Detecting Vulnerabilities in Service Oriented Architectures", in IEEE 23rd International Symposium on Software Reliability Engineering – Student Forum (ISSRE 2012), 2012 2011(20 publications) [publication]Carrozza, G. and Napolitano, A. and Laranjeiro, N. and Marco Vieira , "WSRTesting: Hands-on Solution to Improve Web Services Robustness Testing", in Fifth Latin-American Symposium on Dependable Computing, 2011 [publication]Oliveira, R.A.C.d and Laranjeiro, N. and Marco Vieira , "A Composed Approach for Automatic Classification of Web Services Robustness.", in The 8th International Conference on Services Computing, 2011 [publication]Nuno Antunes and Marco Vieira , "Enhancing Penetration Testing with Attack Signatures and Interface Monitoring for the Detection of Injection Vulnerabilities in Web Services", in IEEE 8th International Conference on Services Computing (SCC 2011), 2011 [citation][year=2016]Y.-C. Cho, “Implementation and analysis of website security mining system, applied to universities’ academic networks,” Tehnicki vjesnik - Technical Gazette, vol. 22, no. 2, pp. 279–287, 2015. [citation][year=2016]S. Utsai and R. B. Joshi, “DOS Attack Reduction by using Web Service Filter,” International Journal of Computer Applications, vol. 105, no. 14, 2014. [citation][year=2016]S. H. Ghotbi, “A declarative and fine-grained policy language for the web application domain,” Ph.D. Thesis, University of Southampton, Southampton, UK, 2014. [citation][year=2016]S. Utsai and R. B. Joshi, “DoS Attack Mitigation by Web Service Filter,” in Proceedings of Third Post Graduate Conference on “Computer Engineering“, 2014, vol. 4. [citation][year=2016]M. Anisetti, C. A. Ardagna, E. Damiani, and N. El Ioini, “Trustworthy Cloud Certification: A Model-Based Approach,” in Data-Driven Process Discovery and Analysis, Springer, 2014, pp. 107–122. [citation][year=2016]P. D. Buck, Q. Shi, and B. Zhou, “Monitoring and Testing Web Services,” in The 15th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNET 2014), Liverpool, UK, 2014. [citation][year=2013]C. Schanes, A. Hubler, F. Fankhauser, and T. Grechenig, “Generic Approach for Security Error Detection Based on Learned System Behavior Models for Automated Security Tests,” presented at the Fourth International Workshop on Security Testing, Luxembourg, 2013. [citation][year=2013]L. Stage, “Entwurf einer Methodik zum Testen der Sicherheit von Web-Service-basierten Systemen,” University of Stuttgart, 2013. [citation][year=2013]Y.-C. Cho and J.-Y. Pan, “Vulnerability Assessment of IPv6 Websites to SQL Injection and other Application Level Attacks,” The Scientific World Journal, vol. 2013, 2013. [citation][year=2013]D. A. Franco, J. L. Perea, and L. C. Tovar, “Herramienta para la Detección de Vulnerabilidades basada en la Identificación de Servicios,” Información tecnológica, vol. 24, no. 5, pp. 13–22, 2013. [citation][year=2012]A. Andrekanic and R. Gamble, “Architecting Web Service Attack Detection Handlers,” in 2012 IEEE 19th International Conference on Web Services (ICWS 2012), Honolulu, Hawaii, USA, 2012, pp. 130 –137. [publication]Cunha, J.C. and Marco Vieira and Cruz, S. and Costa, M. and Rodrigues, A.R. , "Implementing Software Effort Estimation in a Medium-sized Company", in 34th Annual IEEE Software Engineering Workshop, 2011 [citation][year=2020]Nora Khaled AlGhanmi, Nor Shahida Mohd Jamail, “Software Cost Estimation Using Expert Judgement, COCOMO and Function Points”, IJAST, vol. 29, no. 9s, pp. 1158 - 1166, May 2020. [citation][year=2019]Cristina T. Cerdeiral, Gleison Santos, Software project management in high maturity: A systematic literature mapping, Journal of Systems and Software, Volume 148, 2019, Pages 56-87, ISSN 0164-1212, https://doi.org/10.1016/j.jss.2018.10.002. (http://www.sciencedirect.com/science/article/pii/S0164121218302218) [citation][year=2016]Raheem, Raufu Oluwatoyin. "Workflow Development Effort Estimation as Applied to Web Human Resource Management." Global Journal of Flexible Systems Management 17.1 (2016): 77-100. [citation][year=2014]Rao, BVANSS Prabhakar, and P. Seetharamaiah. "Organizational strategies and social interaction influence in software development effort estimation." Journal of Computer Engineering 2 (2014): 29-40. [citation][year=2014]Silva, João Luís Sacramento Salgueiro da. "A solution for estimates in software development projects." Universidade Nova, Faculdade de Ciências e Tecnologia, Departamento de Informática, Dissertações de Mestrado., 2014. [publication]Marco Vieira and Madeira, H. and Cruz, S. and Costa, M. and Cunha, J.C. , "Integrating GQM and Data Warehousing for the Definition of Software Reuse Metrics", in 34th Annual IEEE Software Engineering Workshop, 2011 [citation][year=2019]Nawfal El Moukhi, Ikram El Azami, Abdelaaziz Mouloudi, Abdelali ElMounadi, Requirements-based approach for multidimensional design, Procedia Computer Science, Volume 148, 2019, Pages 333-342, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2019.01.041. (http://www.sciencedirect.com/science/article/pii/S1877050919300419) [citation][year=2018]N. El Moukhi, I. El Azami, A. Mouloudi and A. El Mounadi, "Requirements-driven modeling for decision-making systems," 2018 International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), Kenitra, 2018, pp. 1-7. doi: 10.1109/ICECOCS.2018.8610523 [citation][year=2016]Nicholas D.J. Crossley, Troy R. Dugger, David J. Honey, Samuel Sung-Ok Lee, Schuyler B. Matthews, Darcy L. Wiborg Weber, "Managing reusable artifacts using placeholders ", US patent US9275089 B2, 2016 [citation][year=2016]Nicholas D. J. Crossley, Troy R. Dugger, David J. Honey, Samuel Sung-Ok Lee, Schuyler B. Matthews, Darcy L. Wiborg Weber, "Versioning for configurations of reusable artifacts", US patent US9483505 B2, 2016 [citation][year=2015]Uma Pavan Kumar, Lakshma Reddy and Sreedevi.s.erady. Article: Improvement of Query Processing Speed in Data Warehousing with the Usage of Components-Bitmap Indexing, Iceberg and Uncertain Data. International Conference on Current Trends in Advanced Computing (ICCTAC-2015) ICCTAC 2015(1):27-31, May 2015 [citation][year=2014]Uma Pavan Kumar Kethavarapu And S.Saraswathi, "Integration Of Iceberg, Uncertain Data Processing With Bitmap Indexing Techniques In Data Warehousing For Better Performance", International Journal of Applied Engineering Research (IJAER), Volume 9, Number 20 (2014), pp.4459-4463 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "A Survey on Data Security in Data Warehousing", in EUROCON 2011 - International Conference on Computer as a Tool, 2011 [citation][year=2013]Amritpal Singh, Nitin Umesh, "Implementing Log Based Security in Data Warehouse", International Journal of Advanced Computer Research, Vol. 3 No 1 Issue 8, March 2013. [citation][year=2013]N. V. Blamah, A. O. Adewumi, M. O. Olusanya, "A secured agent-based framework for data warehouse management", 2013 IEEE International Conference on Industrial Technology, ICIT 2013, Cape Town, South Africa, February 25-28, 2013. [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "24/7 Real-Time Data Warehousing: A Tool for Continuous Actionable Knowledge", in COMPSAC 2011 - IEEE Signature Conference on Computer Software & Applications, 2011 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "A Data Masking Technique for Data Warehouses", in IDEAS 2011 - International Database Engineering & Applications Symposium, 2011 [citation][year=2012]Saurabh Kulkarni, Siddhaling Urolagin, "Review of Attacks on Databases and Database Security Techniques", International Journal of Emerging Technology and Advanced Engineering (IJETAE), Vol. 2 Issue 11, November 2012. [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses", in TRUSTCOM 2011 - IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2011 [citation][year=2013]N. V. Blamah, A. O. Adewumi, M. O. Olusanya, "A secured agent-based framework for data warehouse management", 2013 IEEE International Conference on Industrial Technology, ICIT 2013, Cape Town, South Africa, February 25-28, 2013. [publication]Raquel Almeida and Marco Vieira , "Benchmarking the Resilience of Self-adaptive Software Systems: Perspectives and Challenges", in 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'11), 2011 [citation][year=2013]Alain Tchana, Noel De Palma, Ahmed El-Rheddane, Bruno Dillenseger, Xavier Etchevers, Ibrahim Safieddine, "A Scalable Benchmark as a Service Platform", 13th IFIP WG 6.1 International Conference, DAIS 2013, Florence, Italy, June 3-5, 2013. [citation][year=2013]Soguy M. Gueye, Ahmed El Rheddane, Alain Tchana, Bruno Dillenseger, Xavier Etchevers, Noel De Palma, "Plateforme de test auto-scalable", Conférence en Parallélisme, Architecture et Système, ComPAS’2013, Grenoble, France, January 16-18, 2013. [citation][year=2012]Henry W. Bushey, “Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits", MSc Thesis, Air Force Institute Of Technology, Ohio, USA, March 2012. [citation][year=2012]Deb Bodeau, Rich Graubart, Len LaPadula, Peter, Kertzner, Arnie Rosenthal, Jay Brennan, "Cyber Resiliency Metrics, Version 1.0, Rev. 1", The MITRE Corporation, MP1 20053, Rev. 1, 2012. [publication]Araújo Neto, A.C.d. and Marco Vieira , "Trustworthiness Benchmarking of Web Applications Using Static Code Analysis", in Sixth International Conference on Availability, Reliability and Security (ARES), 2011 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Selecting Software Packages for Secure Database Installations", in Sixth International Conference on Availability, Reliability and Security (ARES), 2011 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Towards benchmarking the trustworthiness of web applications code", in 13th European Workshop on Dependable Computing (EWDC 2011), 2011 [publication]Araújo Neto, A.C.d. and Marco Vieira , "TO BEnchmark or NOT TO BEnchmark security: That is the question", in IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops. (HotDep 2011), 2011 [citation][year=2012]1. Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri, "Quantitative Assessment of Cloud Security Level Agreements - A Case Study", 9th nternational Conference on Security and Cryptography, SECRYPT 2012, Rome, Italy, July 2012. [citation][year=2012]Jesus Luna Garcia, Robert Langenberg, Neeraj Suri, "Benchmarking cloud security level agreements using quantitative policy trees", 2012 ACM Workshop on Cloud computing security workshop, CCSW '12, Raleigh, NC, USA, October 19, 2012. [publication]Ceccarelli, A. and Marco Vieira and Bondavalli, A. , "A Service Discovery Approach for Testing Dynamic SOAs", in 2nd IEEE Workshop on Self-Organizing Real-Time Systems, SORT 2011 (joint organized with the 14th IEEE International Symposium on Object/Component/Service-oriented Real-time Distributed Computing, ISORC 2011), 2011 [publication]Ceccarelli, A. and Marco Vieira and Bondavalli, A. , "A Testing Service for Lifelong Validation of Dynamic SOA", in The 13th IEEE International High Assurance Systems Engineering Symposium, HASE 2011, 2011 [publication]Rodrigues, D. and Pires, R.d.M. and Estrella, J. and Marco Vieira and Corrêa, M. and Júnior, J.B.C. and Branco, K. and Júnior, O.T. , "Application of SOA in Safety-Critical Embedded Systems", in International Conference on Hybrid Information Technology, ICHIT 2011, 2011 [citation][year=2013]Jesper Pedersen Notander, Per Runeson, Martin Höst, "A model-based framework for flexible safety-critical software development: a design study", 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18 - 22, 2013. [publication]Rodrigues, D. and Estrella, J. and Marco Vieira and Corrêa, M. and Júnior, J.B.C. and Branco, K. and Júnior, O.T. , "Service-Oriented Architectures for Complex Safety-Critical Embedded Systems: A Case Study on UAVs (short paper)", in 1st Brazilian Conference on Critical Embedded Systems, CBSEC 2011, 2011 [publication]Margarido, I.L. and Faria, J.P. and Vidal, R.M. and Marco Vieira , "Classification of Defect Types in Requirements Specifications: Literature Review, Proposal and Assessment", in 6ª Conferência Ibérica de Sistemas e Tecnologias de Informação, CISTI’2011, 2011 [publication]Braz, A. and Rubira, C.M.F. and Marco Vieira , "Método Ágil aplicado ao Desenvolvimento de Software Confiável baseado em Componentes", in Workshop Brasileiro de Métodos Ágeis, WBMA 2011, 2011 2010(17 publications) [publication]Laranjeiro, N. and Marco Vieira , "Towards Automatic Classification of Web Services Robustness", in The 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010 - Fast Abstract), 2010 [citation][year=2013]Domenico Di Leo, “Robustness Evaluation of Software Systems through Fault Injection”, PhD Thesis, Universit a degli Studi di Napoli Federico II, Italy, 2013. [citation][year=2012]Guo Hongjian and Chen Yifei, “Web Classification Algorithm Using Support Vector Machine and Particle Swarm Optimization,” International Journal of Advancements in Computing Technology (IJACT) 4, no. 17.60, doi:10.4156/ijact, September 2012. [citation][year=2012]Gizelle Sandrini Lemos and Eliane Martins, “Specification-guided Golden Run for Analysis of Robustness Testing Results,” 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE), 157 –166, doi:10.1109/SERE.2012.28, June 2012. [citation][year=2012]Ali Shahrokni and Robert Feldt, “A Systematic Review of Software Robustness,” Information and Software Technology (Elsevier), doi:10.1016/j.infsof.2012.06.002, June 2012. [citation][year=2012]Mustafa Bozkurt, Mark Harman, and Youssef Hassoun, “Testing & Verification In Service-Oriented Architecture: A Survey,” Software Testing, Verification and Reliability: Wiley & Sons, 00, no. 1-7, doi:10.1002/000: 67, 2012. [citation][year=2011]Dareen Abdelmoneim, “Semantic Deontic Modeling and Text Classification for Supporting Automated Environmental Compliance Checking in Construction”, MSc Thesis (Civil Engineering), University of Illinois at Urbana-Champaign, Illinois, USA, November 2011. [citation][year=2011]Dareen Salama and Nora El-Gohary, “Natural Language Processing for Automated Regulatory and Contractual Document Analysis,” Annual Conference of the Canadian Society for Civil Engineering 2011, 2897–2906. Vol. 4, Ottawa, Ontario, Canada, ISBN: 978-1-61839-218-3, 14-17 June 2011. [citation][year=2011]Ying Ma, Fei Wang, and Jian Wu, “Locality Sensitive Hashing Based Service Classification,” The 5th International Conference on Management and Service Science (MASS 2011), 1-5, Wuhan, China: IEEE Computer Society, ISBN: 978-1-4244-6579-8, doi:10.1109/ICMSS.2011.5998757, 12-14 August 2011. [publication]Laranjeiro, N. and Oliveira, R.A.C.d and Marco Vieira , "Applying Text Classification Algorithms in Web Services Robustness Testing", in 29th IEEE International Symposium on Reliable Distributed Systems (SRDS 2010), 2010 [citation][year=2013]Ali Shahrokni, Robert Feldt, "A systematic review of software robustness", Information and Software Technology, Volume 55, Issue 1, January 2013. [citation][year=2013]D Di Leo, D Cotroneo, F Garofalo "Robustness Evaluation of Software Systems through Fault Injection", Phd Thesis, ` Universita degli Studi di Napoli Federico II, 2013 [citation][year=2012]1. Guo Hongjian and Chen Yifei, “Web Classification Algorithm Using Support Vector Machine and Particle Swarm Optimization,” International Journal of Advancements in Computing Technology (IJACT) 4, no. 17.60, doi:10.4156/ijact, September 2012. [citation][year=2012]2. Gizelle Sandrini Lemos and Eliane Martins, “Specification-guided Golden Run for Analysis of Robustness Testing Results”, 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE), June 2012. [citation][year=2012]4. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing & Verification in Service-Oriented Architecture: A Survey", Software Testing, Verification and Reliability (STVR), Issn: 1099-1689, Wiley InterScience, 2012. [citation][year=2011]1. Dareen Abdelmoneim, “Semantic Deontic Modeling and Text Classification for Supporting Automated Environmental Compliance Checking in Construction”, MSc Thesis (Civil Engineering), University of Illinois at Urbana-Champaign, Illinois, USA, November 2011. [citation][year=2011]2. Dareen Salama and Nora El-Gohary, “Natural Language Processing for Automated Regulatory and Contractual Document Analysis,” Annual Conference of the Canadian Society for Civil Engineering 2011, 2897–2906. Vol. 4, Ottawa, Ontario, Canada, ISBN: 978-1-61839-218-3, 14-17 June 2011. [citation][year=2011]3. Ying Ma, Fei Wang, Jian Wu, “Locality Sensitive Hashing Based Service Classification”, The 5th International Conference on Management and Service Science (MASS 2011), Wuhan, China, August 12-14, 2011. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks", in The 16th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2010), 2010 [publication]Nuno Antunes and Marco Vieira , "Benchmarking Vulnerability Detection Tools for Web Services", in IEEE International Conference on Web Services (ICWS 2010), 2010 [citation][year=2015]M.-A. Laverdiere, B. J. Berger, and E. Merloz, “Taint analysis of manual service compositions using Cross-Application Call Graphs,” in 2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015, pp. 585–589. [citation][year=2015]S. Deng, L. Huang, Y. Yin, and W. Tang, “Trust-based Service Recommendation in Social Network,” Applied Mathematics & Information Sciences, vol. 9, no. 3, pp. 1567–1574, 2015. [citation][year=2015]M. H. A. N. and C. Miao, “Structured Query Language Injection Penetration Test Case Generation Based on Formal Description,” Journal of Donghua University(English Edition), vol. 32, no. 3, pp. 446–452, 2015. [citation][year=2014]Zhang Jing and Peng Xinguang, “Research On Penetration Test For Android-Based Smartphone,” ????????, vol. 31, no. 12, pp. 29–32, 2014. [citation][year=2014]P. D. Buck, Q. Shi, and B. Zhou, “Monitoring and Testing Web Services,” 2014. [citation][year=2014]S. Shah and B. M. Mehtre, “An overview of vulnerability assessment and penetration testing techniques,” Journal of Computer Virology and Hacking Techniques, 2014. [citation][year=2014]Y.-H. Tung, S.-S. Tseng, J.-F. Shih, and H.-L. Shan, “W-VST: A Testbed for Evaluating Web Vulnerability Scanner,” in Quality Software (QSIC), 2014 14th International Conference on, 2014, pp. 228–233. [citation][year=2014]H. Holm, “A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures,” KTH Royal Institute of Technology, Stockholm, 2014. [citation][year=2014]S. R. Kesharwani and A. Deshpande, “A Survey On XML-Injection Attack Detection Systems,” International Journal of Science and Research (IJSR), vol. 3, no. 5, 2014. [citation][year=2014]S. Shah and B. M. Mehtre, “A Modern Approach to Cyber Security Analysis Using Vulnerability Assessment and Penetration Testing,” International Journal of Electronics Communication and Computer Engineering, vol. 4, no. 6, pp. 47–52. [citation][year=2013]A. Nakamura, “Towards Unified Vulnerability Assessment with Open Data,” in IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSACW), 2013, 2013, pp. 248–253. [citation][year=2013]M. E. Ruse, “Model checking techniques for vulnerability analysis of Web applications,” Ph.D. Thesis, Iowa State University, Ames, Iowa, 2013. [citation][year=2013]H. Holm, M. Ekstedt, and T. Sommestad, “Effort estimates on web application vulnerability discovery,” in Hawaii International Conference on System Sciences 46 (HICSS), Grand Wailea, Maui, Hawaii, 2013. [citation][year=2013]Z. Wenfeng, X. Shengwei, P. Yaping, and F. Yong, “Design of a Penetration Testing Model for Mobile Internet Web Application,” Journal of Beijing Electronic Science & Technology Institute, vol. 20, no. 4, 2013. [citation][year=2013]T. Mattos, A. Santin, and A. Malucelli, “Mitigating XML Injection Zero-Day Attack through Strategy-based Detection System,” IEEE Security & Privacy, vol. 11, no. 4, pp. 46–53, 2013. [citation][year=2013]Y.-H. Tung, S.-S. Tseng, J.-F. Shih, and H.-L. Shan, “A cost-effective approach to evaluating security vulnerability scanner,” in 15th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2013, 2013, pp. 1–3. [citation][year=2012]H. Holm, T. Sommestad, U. Franke, and M. Ekstedt, “Success Rate of Remote Code Execution Attacks-Expert Assessments and Observations,” Journal of Universal Computer Science, vol. 18, no. 6, pp. 732–749, 2012. [citation][year=2012]J. L. Perea Ramos, D. A. Franco Borré, and J. C. Rodríguez Ribón, “Estado del arte de vulnerabilidades de las IT,” INGENIATOR, vol. 2, no. 3, Apr. 2012. [citation][year=2012]M. I. P. Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques,” MSc Thesis, IC-UNICAMP, Campinas, Brasil, 2012. [citation][year=2011]Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]Liang-Jie (LJ) Zhang, "Guest Editor's Introduction", Services Computing, Computing Now, January 2011. [citation][year=2011]J.L. Perea, D.A. Franco, “Estado del Arte de la Seguridad de las Aplicaciones Web”, Décima Conferencia Iberoamericana en Sistemas, Cibernética e Informática, CISCI 2011, Orlando, Florida, 2011. [publication]Ivano Irrera and Joao Duraes and Marco Vieira and Madeira, H. , "Towards Identifying the Best Variables for Failure Prediction Using Injection of Realistic Software Faults", in The 16th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2010), 2010 [citation][year=2012]Atef S Mohamed, "Software Architecture-Based Failure Prediction", PhD Thesis, Queen's University, Kingston, Ontario, Canada, September 2012. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]1. A. Bovenzi, S. Russo, F. Brancati, A. Bondavalli, "Towards identifying OS-level anomalies to detect application software failures", 2011 IEEE International Workshop on Measurements and Networking (M&N), Anacapri, Italy, October 2011. [citation][year=2011]2. Antonio Bovenzi, Francesco Brancati, Stefano Russo, Andrea Bondavalli, "A Statistical Anomaly-Based Algorithm for On-line Fault Detection in Complex Software Critical Systems", 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, Naples, Italy, September 2011. [citation][year=2011]3. Antonio Bovenzi, Domenico Cotroneo, Roberto Pietrantuono, Gabriella Carrozza, “Error detection framework for complex software systems”, 13th European Workshop on Dependable Computin, EWDC '11, Pisa, Italy, May 11-12, 2011. [publication]José Fonseca and Marco Vieira and Madeira, H. , "The Web Attacker Perspective - A Field Study", in 21st annual International Symposium on Software Reliability Engineering, 2010 [citation][year=2013]D. A. Kindy, A.-S. K. Pathan, “A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies”, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 5, No. 2, August 2013. [citation][year=2013]Thijs Houtenbos, Dennis Pellikaan, "Automated vulnerability scanning and exploitation", University of Amsterdam, Amsterdam, Netherlands, July 2013. [citation][year=2011]1. Bruno Augusti Mozzaquatro, Renato Preigschadt de Azevedo, Raul Ceretta Nunes, Alice de Jesus Kozakevicius, Cristian Cappo, Christian Schaerer, "Anomaly-based Techniques for Web Attacks Detection", Journal of Applied Computing Research, ISSN: 2236-8434, Vol 1, No 2, 2011. [citation][year=2011]2. Salvatore D'Antonio, Luigi Coppolino, Ivano Alessandro Elia, Valerio Formicola, “Security issues of a phasor data concentrator for smart grid infrastructure”, 13th European Workshop on Dependable Computin, EWDC '11, Pisa, Italy, May 11-12, 2011. [publication]Ivano Alessandro Elia and José Fonseca and Marco Vieira , "Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study", in 21st annual International Symposium on Software Reliability Engineering, 2010 [citation][year=2014]H Holm, Signature Based Intrusion Detection for Zero-Day Attacks:(Not) A Closed Chapter?, System Sciences (HICSS), 2014 47th Hawaii …, 2014 [citation][year=2014]M ChoraÅ?, R Kozik, Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection, Soft Computing in Industrial Applications, 2014 [citation][year=2014]D Appelt, N Alshahwan, L Briand, Assessing the impact of firewalls and database proxies on sql injection testing, Future Internet Testing, 2014 [citation][year=2014]D Appelt, N Alshahwan, DC Nguyen, L Briand, Black-box SQL Injection Testing, Publication/NA, 2014 [citation][year=2014]P Talekar, R Misal, T Nevase, S Bajpai, WEB APPLICATION PROTECTION AGAINST SQL INJECTION ATTACK, Publication/NA, 2014 [citation][year=2014]H Holm, A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures, Publication/NA, 2014 [citation][year=2014]J Fonseca, M Vieira, H Madeira, Evaluation of Web Security Mechanisms using Vulnerability & Attack Injection, Dependable and Secure …, 2014 [citation][year=2014]M Kaushik, G Ojha, Attack Penetration System for SQL Injection, International Journal of Advanced …, 2014 [citation][year=2014]D Appelt, CD Nguyen, LC Briandâ?¦, Automated testing for SQL injection vulnerabilities: An input mutation approach, Proceedings of the 2014 …, 2014 [citation][year=2014]PD Buck, Q Shi, B Zhou, Monitoring and Testing Web Services, the 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 2014 [citation][year=2013]Holm, Hannes, Mathias Ekstedt, and Teodor Sommestad. "Effort estimates on web application vulnerability discovery." System Sciences (HICSS), 2013 46th Hawaii International Conference on. IEEE, 2013. [citation][year=2013]Choras, Michal and Rafal Kozik. "Evaluation of Various Techniques for SQL Injection Attack Detection." Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013. Springer International Publishing, 2013. [citation][year=2013]J Fonseca, M Vieira, H Madeira, Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection, Publication/NA, 2013 [citation][year=2013]D Appelt, N Alshahwan, L Briand, Assessing the impact of firewalls and database proxies on sql injection testing, Proceedings of the 1st …, 2013 [citation][year=2013]H Holm, M Ekstedt, Estimates on the effectiveness of web application firewalls against targeted attacks, Information Management & Computer …, 2013 [citation][year=2012]Choras, Michal, and Rafa l Kozik. "Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection.", 2012 [citation][year=2012]Natarajan, Kanchana, and Sarala Subramani. "Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks." Procedia Technology 4 (2012): 790-796. [citation][year=2012]Abusaimeh, Hesham, and Mohammad Shkoukani. "Survey of Web Application and Internet Security Threats." IJCSNS 12.12 (2012): 67. [citation][year=2012]Gadhgadhi, Ridha, Kim-Khoa Nguyen, and Mohamed Cheriet. "Automated intrusion attack with permanent control: Analysis and countermeasures." Information Science, Signal Processing and their Applications (ISSPA), 2012 11th International Conference on. IEEE, 2012. [citation][year=2012]Choras, Michal, et al. "Correlation Approach for SQL Injection Attacks Detection." International Joint Conference CISIS’12-ICEUTE´ 12-SOCO´ 12 Special Sessions. Springer Berlin Heidelberg, 2012. [citation][year=2012]Manikanta, Yakkala V. Naga, and Anjali Sardana. "Protecting web applications from SQL injection attacks by using framework and database firewall." Proceedings of the International Conference on Advances in Computing, Communications and Informatics. ACM, 2012. [citation][year=2012]A Bondavalli, H Madeira, P Lollini, Future of Resilience Assessment: The AMBER Research Roadmap, Resilience Assessment and …, 2012 [citation][year=2012]G Lloyd, [CITATION][C] Database Intrusion Detection, Publication/NA, 2012 [citation][year=2012]N Antunes, M Vieira, Defending against web application vulnerabilities, Computer, 2012 [citation][year=2011]1. Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [publication]Jorge Bernardino and Marco Vieira , "Tolerância a Falhas em Data Warehouses", in ICI10 – The 5th Scientific Meeting ISLA, Data Mining and Business Intelligence Methods and Applications, 2010 [publication]Veras, P.C. and Villani, E. and Ambrósio, A.M. and Silva, N. and Marco Vieira and Madeira, H. , "Errors on Space Software Requirements: A Field Study and Application Scenarios", in 21st annual International Symposium on Software Reliability Engineering, 2010 [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [publication]Veras, P.C. and Villani, E. and Ambrósio, A.M. and Pontes, R.P. and Marco Vieira and Madeira, H. , "Benchmarking Software Requirements Documentation for Space Application", in The 29th International Conference on Computer Safety, Reliability and Security (SAFECOMP 2010), 2010 [publication]Raquel Almeida and Poess, M. and Nambiar, R. and Patil, I. and Marco Vieira , "How to advance TPC benchmarks with dependability aspects", in Second TPC technology conference on Performance evaluation, measurement and characterization of complex systems, 2010 [citation][year=2013]Alessandro Gustavo Farias Fior, "Under Pressure Benchmark: A Large-Scale Availability Benchmark For Distributed Databases", Msc Thesis, Universidade Federal Do Paraná, Curitiba, Brazil, 2013. [citation][year=2011]1. Yantao Li, Charles Levine, “Extending TPC-E to Measure Availability in Database Systems”, Third TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC 2011, Seattle, WA, USA, August 29, 2011. [publication]Raquel Almeida and Madeira, H. and Marco Vieira , "Benchmarking the Resilience of Self-Adaptive Systems: A New Research Challenge", in 29th IEEE International Symposium on Reliable Distributed Systems (SRDS 2010), 2010 [citation][year=2012]1. Deb Bodeau, Rich Graubart, Len LaPadula, Peter, Kertzner, Arnie Rosenthal, Jay Brennan, "Cyber Resiliency Metrics, Version 1.0, Rev. 1", The MITRE Corporation, MP1 20053, Rev. 1, 2012. [publication]Raquel Almeida and Madeira, H. and Marco Vieira , "From Performance to Resilience Benchmarking", in IEEE 30th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2010 [publication]Raquel Almeida and Marco Vieira , "Resilience Benchmarking for Self-Adaptive Systems: A Research Challenge (fast abstract)", in Eigth European Dependable Computing Conference, EDCC 2010, 2010 [publication]Veras, P.C. and Villani, E. and Ambrósio, A.M. and Marco Vieira and Madeira, H. , "Towards Benchmarking Software Requirements Documentation for Space Applications (fast abstract)", in Eigth European Dependable Computing Conference, EDCC 2010, 2010 [publication]Marco Vieira , "Securing Web Applications and Services (abstract)", in Second Meeting: NET-SCIP Workshop on Security (NET-SCIP – CMU/PT), 2010 [publication]Estrella, J. and Branco, K. and Marco Vieira , "Security in Web Services: State-of-the-art and Research Opportunities (tutorial)", in IEEE Sixth Congress on Services Computing, SERVICES 2010, 2010 2009(21 publications) [publication]Laranjeiro, N. and Marco Vieira , "Extending Test-Driven Development for Robust Web Services", in International Conference on Dependability (DEPEND 2009), 2009 [citation][year=2013]1. Ali Shahrokni, Robert Feldt, “A Systematic Review of Software Robustness”, Information and Software Technology (Elsevier), ISSN 0950-5849, 2013. [citation][year=2013]Mohammed Riyad El Khoudary, “Design of a Selective Continuous Test Runner”, MSc Thesis, The Islamic University – Gaza, Palestine, June 2013. [citation][year=2012]2. Abhishek Sharma, Theodore D. Hellmann, Frank Maurer, "Testing of Web Services – A Systematic Mapping", IEEE World Congress on Services, SERVICES 2012, Honolulu, Hawaii, June 2012. [citation][year=2012]3. Tim Majchrzak, Andreas Simon, “Using Spring Roo for the Test-Driven Development of Web Applications”, 27th Symposium On Applied Computing, SAC 2012, Trento, Italy, March 2012. [citation][year=2012]Hussan Munir and Misagh Moayyed, “Systematic Literature Review and Controlled Pilot Experimental Evaluation of Test Driven Development (TDD) vs. Test-Last Development (TLD)”, PhD Thesis, School of Computing, Blekinge Institute of Technology, Sweden, May 2012. [citation][year=2011]1. Sammer Hanna and Amer AbuAli, “Platform Effect on Web Services Robustness Testing,” Journal of Applied Sciences 11, no. 2, 360-366, 2011. [citation][year=2010]1. Anand Chakravarty, “Issues in Verifying Reliability and Integrity of Data Intensive Web Services”, 28th Annual Pacific Northwest Software Quality Conference, Portland, Oregon, USA, October 18-19, 2010. [citation][year=2010]2. Sami Kollanus, “Test-Driven Development - Still a Promising Approach?”, International Conference on the Quality of Information and Communications Technology, Porto, Portugal: 29 September – 2 October, 2010. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Predicting Timing Failures in Web Services", in International Workshop on Managing Data Quality in Collaborative Information Systems (MCIS 2009) at the International Conference on Database Systems for Advanced Applications (DASFAA 2009), 2009 [citation][year=2012]1. Yan Hai and Li xiuli, “A Web Service QoS Predicting Algorithm based on QoS Ontology and BP Neutral Networks,” International Journal of Advancements in Computing Technology 4, no. 4, 199–207, March 2012. [citation][year=2012]2. A. Vani Vathsala and Hrushikesha Mohanty, “Checkpointing Orchestrated Web Services,” Special Issue of International Journal of Computer and Communication Technology (IJCCT) 3, no. 2: 36-42, January 2012. [citation][year=2012]Ignacio Peralta, “Probablistic Error Detection and Diagnosis in Large-scale Distributed Applications”, PhD Thesis, Purdue University, West Lafayette, Indiana, USA, December 2012. [citation][year=2012]Andreas Schönberger and Guido Wirtz, “Configurable analysis of sequential multi-­party choreographies,” Computer Systems: Science & Engineering 27, no. 2, March 2012. [citation][year=2011]1. A. Vani Vathsala, “Optimal Call Based Checkpointing for Orchestrated Web Services”, International Journal of Computer Applications, no. 8, Foundation of Computer Science, New York, USA, December 2011. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Improving Web Services Robustness", in IEEE International Conference on Web Services (ICWS 2009), 2009 [citation][year=2012]1. Marco Prandini and Marco Ramilli, “Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes”, Future Internet 4, no. 3, pp. 700–718, August 2012. [citation][year=2012]2. Marcelo Invert Palma Salas and Eliane Martins, “Metodologia de Testes de Robustez por Injeção de Falhas para WS-Security”, Technical Report. Anais do VII Workshop de Teses, Dissertações e Trabalhos de Iniciação Científica em Andamento do IC-UNICAMP IC-12-19. Alex Grilo, Ariadne Carvalho, Daniel Cugler, Everton Silva, Gustavo Alkmim, Ivelize Rocha, Leonardo Tampelini, et al. (Eds.), Instituto de Computação, Universidade Estadual de Campinas, June 2012. [citation][year=2012]3. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing & Verification in Service-Oriented Architecture: A Survey", Software Testing, Verification and Reliability (STVR), Issn: 1099-1689, Wiley InterScience, 2012. [citation][year=2012]Marcelo Invert Palma Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Brasil, 7 December 2012. [citation][year=2012]Araceli Acosta, Cecilia Kilmurray, Pablo Castro, Nazareno Aguirre, “Model Checking Propositional Deontic Temporal Logic via a ?-Calculus Characterization”, Formal Methods: Foundations and Applications, ed. Rohit Gheyi and David Naumann, 2012. [citation][year=2011]1. Sammer Hanna, Amer AbuAli, “Platform Effect on Web Services Robustness Testing”, Journal of Applied Sciences 11, no. 2, 360-366, 2011. [citation][year=2010]1. Manoj Lall, Lucas Venter, and John van der Poll, “Evaluating the second generation Web services specifications for satisfying non-functional requirements,” World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Orlando, Florida, USA, ISBN: 1-880094-83-5, October 2010. [citation][year=2010]2. Yongbo Wang, Fuyuki Ishikawa, and Shinichi Honiden, “Business Semantics Centric Reliability Testing for Web Services in BPEL”, 6th World Congress on Services, SERVICES ’10, Washington, DC, USA, 2010. [citation][year=2010]3. Christopher Cannon, “Scenario-Driven Evaluation of Network-Centric Agent Systems,” MSc Thesis, Drexel University, Philadelphia, USA, March 2010. [citation][year=2009]1. Marcelo Palma Salas, Eliane Martins, “Metodologia de Testes de Robustez para Segurança em Serviços WEB”, Proceedings of the 5o Workshop de Teses de Doutorado em Andamento do IC-UNICAMP, IC-09-026 – Technical Report, Mariana Piquet Dias, Cecília Mary F. Rubira, Rodolfo Jardim de Azevedo, Carla G. N. Macario, Joana E. G. Malaverr, Jefersson Alex dos Santos, Luiz Fernando Bittencourt, Ricardo Caceffo, Roberto Pereira, Vânia Paula de A. Neris (Eds.), September 2009. [publication]Laranjeiro, N. and Marco Vieira , "Testing Web Services for Robustness: A Tool Demo", in European Workshop on Dependable Computing (EWDC 2009), 2009 [citation][year=2012]1. Marcelo Invert Palma Salas and Eliane Martins, “Metodologia de Testes de Robustez por Injeção de Falhas para WS-Security”, Technical Report. Anais do VII Workshop de Teses, Dissertações e Trabalhos de Iniciação Científica em Andamento do IC-UNICAMP IC-12-19. Alex Grilo, Ariadne Carvalho, Daniel Cugler, Everton Silva, Gustavo Alkmim, Ivelize Rocha, Leonardo Tampelini, et al. (Eds.), Instituto de Computação, Universidade Estadual de Campinas, June 2012. [citation][year=2012]Marcelo Invert Palma Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Brasil, 7 December 2012. [citation][year=2010]1. Xiang Qiu, Li Zhang, Xiaoli Lian, “Static analysis for java exception propagation structure”, 2010 IEEE International Conference on Progress in Informatics and Computing (PIC), 2:1040-1046, Vol. 2, ISBN: 978-1-4244-6788-4, December 10-12, 2010. [citation][year=2009]1. Marcelo Palma Salas, Eliane Martins, “Metodologia de Testes de Robustez para Segurança em Serviços WEB”, proceedings of the 5o Workshop de Teses de Doutorado em Andamento do IC-UNICAMP, IC-09-026 – Technical Report, Mariana Piquet Dias, Cecília Mary F. Rubira, Rodolfo Jardim de Azevedo, Carla G. N. Macario, Joana E. G. Malaverr, Jefersson Alex dos Santos, Luiz Fernando Bittencourt, Ricardo Caceffo, Roberto Pereira, Vânia Paula de A. Neris (Eds.), September de 2009. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Protecting Database Centric Web Services against SQL/Xpath Injection Attacks", in 20th International Conference on Database and Expert Systems Applications (DEXA 2009), 2009 [citation][year=2011]1. Velu Shanmughaneethi, R. Ravichandran, S. Swamynathan, “PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications”, International Journal on Web Service Computing, no. 3: 192-201, September 2011 [citation][year=2011]2. Velu Shanmughaneethi, Ra. Yagna Pravin, S. Swamynathan, "XIVD: Runtime Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented Programming", Advances in Computing and Information Technology - Communications in Computer and Information Science, Springer Berlin Heidelberg, Vol. 198, ISBN: 978-3-642-22555-0, 2011. [publication]Nuno Antunes and Laranjeiro, N. and Marco Vieira and Madeira, H. , "Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services", in IEEE International Conference on Services Computing (SCC 2009), 2009 [citation][year=2015]D. Appelt, C. D. Nguyen, and L. Briand, “Behind an Application Firewall, Are We Safe from SQL Injection Attacks?,” in 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST), 2015, pp. 1–10. [citation][year=2015]M. H. A. N. and C. Miao, “Structured Query Language Injection Penetration Test Case Generation Based on Formal Description,” Journal of Donghua University(English Edition), vol. 32, no. 3, pp. 446–452, 2015. [citation][year=2015]P. Mehta, J. Sharda, and M. L. Das, “SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data,” in Information Systems Security, S. Jajodia and C. Mazumdar, Eds. Springer International Publishing, 2015, pp. 192–206 [citation][year=2015]P. Shirani, M. A. Azgomi, and S. Alrabaee, “A method for intrusion detection in web services based on time series,” in 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), 2015, pp. 836–841. [citation][year=2015]T. Aghariya, “Security Testing on Web Application,” MSc Thesis, Charles Darwin University, Darwin, 2015 [Online]. Available: http://espace.cdu.edu.au/eserv/cdu:46186/Thesis_CDU_46186_Aghariya_T.pdf. [Accessed: 22-Aug-2015] [citation][year=2015]A. Mahadkar and N. Singh, “A review on approaches for web application vulnerabilities detection,” International journal of Advance Engineering and Research Development (IJAERD), vol. 2, no. 1, pp. 293–295, 2015. [citation][year=2014]T. K. Saha and A. S. Ali, “Web Application Security Attacks and Countermeasures,” Case Studies in Secure Computing: Achievements and Trends, p. 343, 2014. [citation][year=2014]V. Shanmuga Neethi, “Prevention of code injection vulnerabilities in web applications through web services,” Ph.D. Thesis, Anna University, Chennai, India, 2014. [citation][year=2014]D. Appelt, C. D. Nguyen, L. C. Briand, and N. Alshahwan, “Automated testing for SQL injection vulnerabilities: An input mutation approach,” in Proceedings of the 2014 International Symposium on Software Testing and Analysis, 2014, pp. 259–269 [Online]. Available: http://dl.acm.org/citation.cfm?id=2610403. [Accessed: 20-Jan-2016] [citation][year=2014]P. D. Buck, Q. Shi, and B. Zhou, “Monitoring and Testing Web Services,” in The 15th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNET 2014), Liverpool, UK, 2014 [Online]. Available: http://www.cms.livjm.ac.uk/PGNet2014/papers/1569959305.pdf. [Accessed: 09-Sep-2014] [citation][year=2014]M. Mirjalili, A. Nowroozi, and M. Alidoosti, “A survey on web penetration test,” Advances in Computer Science: an International Journal (ACSIJ), vol. 3, no. 6, 2014. [citation][year=2014]Zhuo Ying gun and Pan Renyi, “Design and implementation of website information disclosure assessment system,” Ph.D. Thesis, National Chung Cheng University, 2014. [citation][year=2014]D. Appelt, N. Alshahwan, D. C. Nguyen, and L. Briand, “Black-box SQL Injection Testing,” University of Luxembourg, TR-SnT-2014-1, 2014 [Online]. Available: http://orbilu.uni.lu/handle/10993/15121. [Accessed: 18-Sep-2014] [citation][year=2014]B. Mohamed Ibrahim and A. R. Mohamed Shanavas, “Severe SOA Security Threats on SOAP Web Services–A Critical Analysis,” IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, pp. 135–141, 2014. [citation][year=2014]R. J. Manoj, A. Chandrasekhar, and M. A. Praveena, “An Approach to Detect and Prevent Tautology Type SQL Injection in Web Service Based on XSchema validation,” International Journal Of Engineering And Computer Science, vol. 3, no. 1, pp. 3695–3699, Jan. 2014. [citation][year=2014]E. Shafie, “Runtime Detection and Prevention for Structure Query Language Injection Attacks,” Ph.D. Thesis, De Montfort University, England, 2013 [Online]. Available: https://www.dora.dmu.ac.uk/xmlui/handle/2086/10076. [Accessed: 18-Sep-2014] [citation][year=2013]P. Zech, M. Felderer, M. Farwick, and R. Breu, “A Concept for Language-Oriented Security Testing,” in 2013 IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C), 2013, pp. 53–62. [citation][year=2013]J. Lakhani, “Blind XPath Injection Attack: A Case Study,” International Journal of System & Software Engineering, vol. 1, no. 1, pp. 30–34, Jun. 2013. [citation][year=2013]Luo Qi-Han, Zhang Yu-Qing, and Liu Qi-Xu, “Design and implementation of a SQL injection vulnerability detection tool on RESTful API,” Journal of Graduate University of Chinese Academy of Sciences, vol. 30, no. 3, pp. 417–424, 2013. [citation][year=2013]L. Stage, “Entwurf einer Methodik zum Testen der Sicherheit von Web-Service-basierten Systemen,” University of Stuttgart, 2013 [Online]. Available: ftp://ftp.informatik.uni-stuttgart.de/pub/library/medoc.ustuttgart_fi/DIP-3501/DIP-3501.pdf. [Accessed: 13-Jan-2014] [citation][year=2013]A. Asmawi, L. S. Affendey, N. I. Udzir, and R. Mahmod, “XIPS: A Model-based Prevention Mechanism for Preventing Blind XPath Injection in Database-Centric Web Services Environment,” International Journal of Advancements in Computing Technology (IJACT), vol. 5, no. 10, 2013 [Online]. Available: http://www.aicit.org/IJACT/ppl/IJACT3093PPL.pdf. [Accessed: 11-Jun-2014] [citation][year=2013]L. Lei, X. Jing, L. Minglei, and Y. Jufeng, “A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach,” in Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual, 2013, pp. 256–261. [citation][year=2013]A. N. Gupta and P. S. Thilagam, “Attacks on Web Services Need To Secure XML on Web,” Computer Science & Engineering: An International Journal, vol. 3, no. 5, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=22313583&AN=92015920&h=iMqkcNK0LUFoRJIbd7JQYgPgr6yHFEz0Mjfg+LRf9wGQNss6EgEwDEGzmaZBHpOu2VaugC6VNulYB2RFkmRDzw==&crl=c. [Accessed: 16-Dec-2013] [citation][year=2013]N. Arora and S. Tanwani, “Emerging Web Services Trends and Challenges,” International Journal of Systems, Algorithms & Applications (IJSAA), vol. 3, no. ICRAET13, pp. 6–11, Mar. 2013. [citation][year=2013]A. Ghourabi, T. Abbes, and A. Bouhoula, “Characterization of attacks collected from the deployment of Web service honeypot,” Security and Communication Networks, 2013 [Online]. Available: http://onlinelibrary.wiley.com/doi/10.1002/sec.737/abstract. [Accessed: 04-Mar-2013] [citation][year=2013]Z. Z. Zhang, Q. Y. Wen, and Z. Zhang, “An Improved Approach for SQL Injection Vulnerabilities Detection,” Applied Mechanics and Materials, vol. 263, pp. 3017–3020, 2013. [citation][year=2013]W. Phocharoen and T. Senivongse, “A Security Attack Risk Assessment for Web Services Based on Data Schemas and Semantics,” in Proceedings of the 2012 International Conference on Information Technology and Software Engineering, W. Lu, G. Cai, W. Liu, and W. Xing, Eds. Springer Berlin Heidelberg, 2013, pp. 135–143 [citation][year=2012]I. Lundgren, “Securing public APIs using OAuth and OAuthLib,” BSc Thesis, Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 2012. [citation][year=2012]A. Asmawi, L. S. Affendey, N. I. Udzir, and R. Mahmod, “Model-based system architecture for preventing XPath injection in database-centric web services environment,” in 7th International Conference on Computing and Convergence Technology (ICCCT 2012), Seoul, South Korea, 2012, pp. 621–625. [citation][year=2012]Xu Jing, Tian Wei, Liu Lei, Zhang Ying, and Yang Jufeng, “Model-driven web Application SQL Injection penetration testing,” High Technology Letters, vol. 22, no. 11, pp. 1161–1168, 2012. [citation][year=2012]K. Liu, H. B. K. Tan, and L. K. Shar, “Semi-Automated Verification of Defense against SQL Injection in Web Applications,” in 2012 19th Asia-Pacific Software Engineering Conference (APSEC), 2012, vol. 1, pp. 91 –96. [citation][year=2012]T. Wei, Y. Ju-Feng, X. Jing, and S. Guan-Nan, “Attack Model Based Penetration Test for SQL Injection Vulnerability,” in 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops (COMPSACW), Izmir, Turkey, 2012, pp. 589 –594. [citation][year=2012]V. Shanmughaneethi, R. Y. Praveen, and S. Swamynathan, “CIVD: detection of command injection vulnerabilities in web services through aspect–oriented programming,” International Journal of Computer Applications in Technology, vol. 44, no. 4, pp. 312–320, Jan. 2012. [citation][year=2011]F. van der Loo, “Comparison of penetration testing tools for web applications,” MSc Thesis, University of Radboud, Netherlands, 2011. [citation][year=2011]V. Shanmughaneethi, R. Ravichandran, and S. Swamynathan, “PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications,” International Journal on Web Service Computing, vol. 2, no. 3, pp. 192–201, Sep. 2011. [citation][year=2011]A. R. Pais, D. J. Deepak, and B. R. Chandavarkar, “Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture,” in Advances in Network Security and Applications, vol. 196, D. C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, and D. Nagamalai, Eds. Springer Berlin Heidelberg, 2011, pp. 331–343. [citation][year=2011]V. Shanmughaneethi, R. Y. Pravin, and S. Swamynathan, “XIVD: Runtime Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented Programming,” Advances in Computing and Information Technology, pp. 192–201, 2011. [citation][year=2010]A. S. Khader, “Preventing MS SQL Injection in Web Application,” MSc Thesis, University Utara Malaysia, 2010. [citation][year=2010]P. R. Yadav, “Protection Against Denial of Service Attack in Service Oriented Architecture,” MSc Thesis – Master of Technology in Computer Science & Engineering – Information Security, Department of Computer Enginering, National Institute of Technology Karnataka (NITK), Surathkal, Mangalore, 2010. [citation][year=2010]D. J. Deepak, “Protection Against Input Manipulation vulnerabilities in Service Oriented Architecture,” MSc Thesis – Master of Technology in Computer Science & Engineering – Information Security, Department of Computer Engineering - National Institute of Technology Karnataka, Mangalore, India, 2010. [citation][year=2010]A. Anchlia and S. Jain, “A Novel Injection Aware Approach for the Testing of Database Applications,” in 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, 2010, pp. 311–313. [citation][year=2010]S. Madan and S. Madan, “Security Standards Perspective to Fortify Web Database Applications from Code Injection Attacks,” in 2010 International Conference on Intelligent Systems, Modelling and Simulation, 2010, pp. 226–230. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Vulnerability & Attack Injection for Web Applications", in 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), 2009 [citation][year=2013]Nana Yaw Asabere, Wisdom Kwawu Torgby, "Towards a Perspective of Web Application Vulnerabilities and Security Threats", International Journal of Computer Science and Telecommunications, Vol. 4, Issue 5, May 2013. [citation][year=2012]L. Shar, H. Tan, H. "Defeating SQL Injection", IEEE Computer, 2012. [citation][year=2012]Kaiping Liu, Hee Beng Kuan Tan, and L.K. Shar, “Semi-­Automated Verification of Defense against SQL Injection in Web Applications”, 19th Asia-Pacific Software Engineering Conference, APSEC 2012, ­Hong Kong, December 4-7, 2012. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]M. Ghafari, H. Shoja, M. Y. Amirani, "Detection and Prevention of Data Manipulation from Client Side in Web Applications", IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, UK, June 25-27, 2012. [citation][year=2011]Geoffrey Vaughan, "Understanding SQL Injection Attacks Inside and Out", Faculty of Business and IT, University of Ontario Institute of Technology, Canada, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]Eidah Al-Khashab, Fawaz S. Al-Anzi, Ayed A. Salman, "PSIAQOP: preventing SQL injection attacks based on query optimization process", Second Kuwait Conference on e-Services and e-Systems, KCESS'11, Kuwait, Kuwait, April 5, 2011. [citation][year=2011]A. Bondavalli, P. Lollini, A. Bovenzi, M. Colajanni, L. Coppolino, C. Esposito, M. Fixxo, C. di Martino, L. Montecchi, R. Natella, A. Peccia, "D3.1: Modeling and Evaluation: State-of-the-art", deliverable of the project: Dependable Off-The-Shelf based Middleware Systems for Large-scale Complex Critical Infrastructures (DOTS-LCCI Project: PRIN 2008LWRBHF), Italy, March 2011. [citation][year=2011]Francisco Vieira, “Realistic Vulnerability Injections in PHP Web Applications”, MSc Thesis, Faculty of Sciences, University of Lisbon, Lisbon, Portugal, 2011. [citation][year=2010]1. Célio B. Taquary Segundo, Luis Fernando Rust C. Carmo, Luci Pirmez, “Uso de Árvores de Ataque e Técnicas de Mutação de Código na Segurança de Aplicações Web”, X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBSeg’10, Fortaleza, Brazil, October 2010. [citation][year=2010]2. Rim Akrout, Anthony Dessiatnikoff, “An Attack-goal Driven Approach for Web Applications Security Assessment”, Eigth European Dependable Computing Conference, EDCC 2010, Valencia, Spain, April 2010. [citation][year=2009]1. Karthik Pattabiraman, Benjamin Zorn, “DoDOM: Leveraging DOM Invariants for Web 2.0 Application Reliability”, Technical Report, Microsoft Research - Redmond, USA, 2009. [publication]Marco Vieira and Nuno Antunes and Madeira, H. , "Using Web Security Scanners to Detect Vulnerabilities in Web Services", in 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), 2009 [citation][year=2014]M. K. N. Durai and K. Priyadharsini, “A Survey on Security Properties and Web Application Scanner,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 10, pp. 517–527, 2014. [citation][year=2014]M. Mirjalili, A. Nowroozi, and M. Alidoosti, “A survey on web penetration test,” Advances in Computer Science: an International Journa, vol. 3, no. 6, 2014. [citation][year=2014]??? and ???, “Design and implementation of website information disclosure assessment system,” 2014. [citation][year=2014]T. P. Chiem, “A study of penetration testing tools and approaches,” MSc Thesis, Auckland University of Technology, Auckland, New Zealand, 2014. [citation][year=2014]P. D. Buck, Q. Shi, and B. Zhou, “Monitoring and Testing Web Services,” 2014. [citation][year=2014]R. M. Jnena, “Modern Approach for WEB Applications Vulnerability Analysis,” MSc Thesis, The Islamic University of Gaza, 2013. [citation][year=2014]D. Appelt, N. Alshahwan, D. C. Nguyen, and L. Briand, “Black-box SQL Injection Testing,” University of Luxembourg, TR-SnT-2014-1, 2014. [citation][year=2014]D. Appelt, N. Alshahwan, and L. Briand, “Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing,” in Future Internet Testing, T. E. J. Vos, K. Lakhotia, and S. Bauersfeld, Eds. Springer International Publishing, 2014, pp. 32–47. [citation][year=2014]M. Kranch and J. Bonneau, “Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.” [citation][year=2014]A. L. Doupé, “Advanced Automated Web Application Vulnerability Analysis,” Ph.D. Thesis, UNIVERSITY OF CALIFORNIA Santa Barbara, Santa Barbara, 2014. [citation][year=2014]M. I. P. Salas and E. Martins, “Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security,” in Electronic Notes in Theoretical Computer Science, 2014, vol. 302, pp. 133–154. [citation][year=2014]S. Gil, A. Kott, and A.-L. Barabási, “A genetic epidemiology approach to cyber-security,” Sci. Rep., vol. 4, Jul. 2014. [citation][year=2014]S. Karumanchi and A. C. Squicciarini, “In the Wild: a Large Scale Study of Web Services Vulnerabilities,” presented at the 29th Symposium On Applied Computing, Gyeongju, Republic of Korea, 2014. [citation][year=2014]R. J. Manoj, A. Chandrasekhar, and M. A. Praveena, “An Approach to Detect and Prevent Tautology Type SQL Injection in Web Service Based on XSchema validation,” International Journal Of Engineering And Computer Science, vol. 3, no. 1, pp. 3695–3699, Jan. 2014. [citation][year=2014]I. Medeiros, N. F. Neves, and M. Correia, “Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives,” in Proceedings of the International World Wide Web Conference (WWW), Seoul, Korea, 2014. [citation][year=2013]???, ???, and ???, “?? RESTful API ? SQL ??????????????,” ???????????, vol. 30, no. 3, pp. 417–424, 2013. [citation][year=2013]P. Zech, M. Felderer, M. Farwick, and R. Breu, “A Concept for Language-Oriented Security Testing,” in 2013 IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C), 2013, pp. 53–62. [citation][year=2013]A. Asmawi, L. S. Affendey, N. I. Udzir, and R. Mahmod, “XIPS: A Model-based Prevention Mechanism for Preventing Blind XPath Injection in Database-Centric Web Services Environment,” International Journal of Advancements in Computing Technology (IJACT), vol. 5, no. 10, 2013. [citation][year=2013]L. Stage, “Entwurf einer Methodik zum Testen der Sicherheit von Web-Service-basierten Systemen,” University of Stuttgart, 2013. [citation][year=2013]C. Ma, Y. Duan, X. Ju, and F. Xu, “WS-S Evaluation Based on User Preferences and Ranking Mechanism,” in 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2013, pp. 298–301. [citation][year=2013]Y.-C. Cho and J.-Y. Pan, “Vulnerability Assessment of IPv6 Websites to SQL Injection and other Application Level Attacks,” The Scientific World Journal, vol. 2013, 2013. [citation][year=2013]R. I. Hassan and N. H. B. M. Alwi, “Penetration Testing for Libyan Government Website,” presented at the Fourth International Conference on Computing and Informatics 2013 (ICOCI 2013), Kuching, Sarawak, Malaysia, 2013. [citation][year=2013]J. E. Stein, “Metodologia de Configuração de Vulnerabilidades para o Modsecurity,” Colégio Técnico Industrial de Santa Maria - Universidade Federal de Santa Maria, Santa Maria, RS, Brasil, Curso Superior de Tecnologia em Redes de Computadores, 2013. [citation][year=2013]N. F. Awang and A. A. Manaf, “Self Assessment Framework For Detecting Vulnerability In Web Applications,” in The Third International Conference on Digital Information and Communication Technology and its Applications (DICTAP2013), 2013, pp. 283–287. [citation][year=2013]I. Medeiros, N. F. Neves, and M. Correia, “Securing Energy Metering Software with Automatic Source Code Correction,” in 11th IEEE International Conference on Industrial Informatics (INDIN 2013). [citation][year=2013]Z. Zheng and M. R. Lyu, “Background Review,” in QoS Management of Web Services, Springer Berlin Heidelberg, 2013, pp. 9–17. [citation][year=2013]S. Wang, Y. Gong, G. Chen, Q. Sun, and F. Yang, “Service Vulnerability Scanning based on Service-oriented Architecture in Web Service Environments,” Journal of Systems Architecture. [citation][year=2013]P. Payet, A. Doupé, C. Kruegel, and G. Vigna, “EARs in the Wild: Large-Scale Analysis of Execution After Redirect Vulnerabilities,” 28th Symposium On Applied Computing, Mar. 2013. [citation][year=2012]A. Asmawi, L. S. Affendey, N. I. Udzir, and R. Mahmod, “Model-based system architecture for preventing XPath injection in database-centric web services environment,” in 7th International Conference on Computing and Convergence Technology (ICCCT 2012), Seoul, South Korea, 2012, pp. 621–625. [citation][year=2012]S. S. Venkatraman, “Systematically Enhancing Black-Box Web Vulnerability Scanners,” Master of Science, National University of Singapore Singapore, Singapore, 2012. [citation][year=2012]M. P. Salas and E. Martins, “Emulation of Malformed XML Using WSInject for Security Testing Against WS-Security,” presented at the IEEE Latin-American Conference on Communications (LATINCOM), Cuenca, Ecuador, 2012. [citation][year=2012]D. N. Swetha and B. S. Kumar, “Protocol Based Approach on Vulnerability Detection Tools of SQLIA along with Monitoring Tools,” International Journal of Computer Science Engineering and Technology (IJCSET), vol. 2, no. 11, pp. 1476–1482, Nov. 2012. [citation][year=2012]Z. Zheng, Y. Zhang, and M. Lyu, “Investigating QoS of Real-World Web Services,” IEEE Transactions on Services Computing, vol. PP, no. 99, p. 1, 2012. [citation][year=2012]D. Hauzar and J. Kofron, “On Security Analysis of PHP Web Applications,” in Computer Software and Applications Conference Workshops (COMPSACW), 2012 IEEE 36th Annual, 2012, pp. 577 –582. [citation][year=2012]S. Katkar Anjali and B. Kulkarni Raj, “Web Vulnerability Detection and Security Mechanism,” International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 4, pp. 237–241, Sep. 2012. [citation][year=2012]M. P. Salas and E. Martins, “Emulação de Ataques do Tipo XPath Injection para Testes de Web Services usando Injeção de Falhas,” in XIII Workshop de Testes e Tolerância a Falhas, Ouro Preto - MG, Brasil, 2012. [citation][year=2012]D. Rocha, D. Kreutz, and R. Turchetti, “A free and extensible tool to detect vulnerabilities in Web systems,” in 2012 7th Iberian Conference on Information Systems and Technologies (CISTI), 2012, pp. 1 –6. [citation][year=2012]A. Malhotra, N. Navdeep, and G. S. Sekhon, “Browser Prevention Against Phishing Website Security Risk,” International journal of Computer Science & Communication, vol. III, no. 1, pp. 215–219, Jun. 2012. [citation][year=2012]WANG Li-Jie, LI Meng, CAI Si-Bo, LI Ge, XIE Bing, and YANG Fu-Qing, “Internet Information Search Based Approach to Enriching Textual Descriptions for Public Web Services,” Journal of Software, vol. 23, no. 6, 2012. [citation][year=2012]A. Doupé, L. Cavedon, C. Kruegel, and G. Vigna, “Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner,” in 21st USENIX Security Symposium (USENIX Security ’12), Bellevue, WA, 2012. [citation][year=2012]P. Zech, M. Felderer, and R. Breu, “Towards Risk–Driven Security Testing of Service Centric Systems,” presented at the QSIC, 2012. [citation][year=2012]M. H. Al-Ibrahim, “Are Our Educational Technology Systems Secure?,” International Journal of Innovation, Management and Technology (IJIMT), vol. 3, no. 3, pp. 241–245, 2012. [citation][year=2012]M. Murali and R. Srinivasan, “Inter-domain Authentication Scheme in a Distributed Mobile Network,” Research Journal of Information Technology, 2012. [citation][year=2012]V. Prasath, “Building Trust for Web Services Security Patterns,” International Journal of Applied Information Systems (IJAIS), vol. 3, no. 2, pp. 14–20, Jul. 2012. [citation][year=2011]D. Hauzar and J. Kofron, “Hunting Bugs Inside Web Applications,” Technical Report, Oct. 2011. [citation][year=2011]SU Bin and YANG Yin, “The Limitations of Network Applications Vulnerability Scanner,” Network and Computer Security, no. 5, pp. 77–79, 2011. [citation][year=2011]F. van der Loo, “Comparison of penetration testing tools for web applications,” MSc Thesis, University of Radboud, Netherlands, 2011. [citation][year=2011]V. Shanmughaneethi, R. Ravichandran, and S. Swamynathan, “PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications,” International Journal on Web Service Computing, vol. 2, no. 3, pp. 192–201, Sep. 2011. [citation][year=2011]A. M. Ferreira and H. Kleppe, “Effectiveness of Automated Application Penetration Testing Tools,” 2011. [citation][year=2011]J. Chen and S. Kulkarni, “Effectiveness of Transition Systems to Model Faults,” in Proceedings of the 2nd International Workshop on Logical Aspects of Fault-Tolerance (LAFT) In conjunction with LICS’11., Toronto, Canada, 2011. [citation][year=2011]V. Shanmughaneethi, R. Y. Pravin, and S. Swamynathan, “XIVD: Runtime Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented Programming,” Advances in Computing and Information Technology, pp. 192–201, 2011. [citation][year=2011]Z. Zheng, “QoS Management of Web Services,” Ph.D. Thesis, The Chinese University of Hong Kong, Hong Kong, 2011. [citation][year=2011]Wang Xin, Wei Gengyu, Zhang Dongmei, Yang Yixian, "Web Application Vulnerability Detection Based on Reinforcement Learning", 3rd International Conference on Computer and Network Technology, ICCNT 2011, Taiyuan, China, February 26-28, 2011. [citation][year=2010]AOKI T. and YASUDA H., “Web Fingerprint: A New Scheme to Arbitrate Mismatch of Web Pages,” The Journal of the Institute of Image Electronics Engineers of Japan, vol. 39, no. 5, pp. 644–653, Sep. 2010. [citation][year=2010]X. Wang, L. Wang, G. Wei, D. Zhang, and Y. Yang, “Hidden web crawling for SQL injection detection,” in 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), Beijing, China, 2010, pp. 14–18. [citation][year=2010]M. P. Correia and P. J. Sousa, Segurança no Software. Lisboa, Portugal: FCA, 2010. [citation][year=2010]C. Lai-Cheng, “Enhancing Distributed Web Security Based on Kerberos Authentication Service,” in Web Information Systems and Mining, vol. 6318, F. Wang, Z. Gong, X. Luo, and J. Lei, Eds. Springer Berlin / Heidelberg, 2010, pp. 171–178. [citation][year=2010]D. A. Shelly, “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners,” MSc Thesis - Master of Science in Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, Virginia, 2010. [citation][year=2010]T. Basso, R. L. O. Moraes, and M. Jino, “A Methodology for Effectiveness Analysis of Vulnerability Scanning Tools,” presented at the Terceiro Encontro dos Alunos e Docentes do Departamento de Engenharia de Computação e Automação Industrial, University of Campinas (UNICAMP), Brazil, 2010. [citation][year=2010]T. Basso, P. C. S. Fernandes, M. Jino, and R. L. O. Moraes, “Analysis of the Effect of Java Software Faults on Security Vulnerabilities and Their Detection by Commercial Web Vulnerability Scanner Tool,” in 4th Workshop on Recent Advances on Intrusion-Tolerant Systems, WRAITS 2010, in conjunction with The 40th IEEE/IFIP International Conference on Dependable Systems and Networks, Chicago, IL, USA, 2010. [citation][year=2010]A. Doupé, M. Cova, and G. Vigna, “Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners,” Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 111–131, 2010. [citation][year=2010]Z. Zheng, Y. Zhang, and M. R. Lyu, “Distributed QoS Evaluation for Real-World Web Services,” in 2010 IEEE International Conference on Web Services, 2010, pp. 83–90. [citation][year=2010]L. Wang, F. Liu, L. Zhang, G. Li, and B. Xie, “Enriching Descriptions for Public Web Services Using Information Captured from Related Web Pages on the Internet,” in 2010 Fifth IEEE International Symposium on Service Oriented System Engineering, 2010, pp. 141–150. [publication]Nuno Antunes and Marco Vieira , "Detecting SQL Injection Vulnerabilities in Web Services", in Fourth Latin-American Symposium on Dependable Computing (LADC 2009), 2009 [citation][year=2015]A. Masood and J. Java, “Static analysis for web service security-Tools & techniques for a secure development life cycle,” in 2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015, pp. 1–6. [citation][year=2015]N. A. Allen, “Detecting penetration attempts using log-sensitive fuzzing,” United States Patent 9104877, 11-Aug-2015. [citation][year=2015]A. Davies, “Securing Legacy Web Services,” BSc Thesis, Bournemouth University, Dorset, UK, 2015. [citation][year=2015]T. Aghariya, “Security Testing on Web Application,” MSc Thesis, Charles Darwin University, Darwin, 2015. [citation][year=2015]M. H. A. N. and C. Miao, “Structured Query Language Injection Penetration Test Case Generation Based on Formal Description,” Journal of Donghua University(English Edition), vol. 32, no. 3, pp. 446–452, 2015. [citation][year=2014]D. Appelt, C. D. Nguyen, L. C. Briand, and N. Alshahwan, “Automated testing for SQL injection vulnerabilities: An input mutation approach,” in Proceedings of the 2014 International Symposium on Software Testing and Analysis, 2014, pp. 259–269. [citation][year=2014]V. Sunkari and C. V. Guru Rao, “Preventing input type validation vulnerabilities using network based intrusion detection systems,” in 2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014, pp. 702–706. [citation][year=2014]M. K. N. Durai and K. Priyadharsini, “A Survey on Security Properties and Web Application Scanner,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 10, pp. 517–527, 2014. [citation][year=2014]D. Appelt, N. Alshahwan, and L. Briand, “Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing,” in Future Internet Testing, T. E. J. Vos, K. Lakhotia, and S. Bauersfeld, Eds. Springer International Publishing, 2014, pp. 32–47. [citation][year=2014]M. Mirjalili, A. Nowroozi, and M. Alidoosti, “A survey on web penetration test,” Advances in Computer Science: an International Journal (ACSIJ), vol. 3, no. 6, 2014. [citation][year=2014]Zhuo Ying gun and Pan Renyi, “Design and implementation of website information disclosure assessment system,” Ph.D. Thesis, National Chung Cheng University, 2014. [citation][year=2014]D. Appelt, N. Alshahwan, D. C. Nguyen, and L. Briand, “Black-box SQL Injection Testing,” University of Luxembourg, TR-SnT-2014-1, 2014. [citation][year=2013]R. M. Jnena, “Modern Approach for WEB Applications Vulnerability Analysis,” MSc Thesis, The Islamic University of Gaza, 2013. [citation][year=2013]P. Zech, M. Felderer, M. Farwick, and R. Breu, “A Concept for Language-Oriented Security Testing,” in 2013 IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C), 2013, pp. 53–62. [citation][year=2013]Luo Qi-Han, Zhang Yu-Qing, and Liu Qi-Xu, “Design and implementation of a SQL injection vulnerability detection tool on RESTful API,” Journal of Graduate University of Chinese Academy of Sciences, vol. 30, no. 3, pp. 417–424, 2013. [citation][year=2013]Y.-C. Cho and J.-Y. Pan, “Vulnerability Assessment of IPv6 Websites to SQL Injection and other Application Level Attacks,” The Scientific World Journal, vol. 2013, 2013. [citation][year=2013]L. Lei, X. Jing, L. Minglei, and Y. Jufeng, “A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach,” in Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual, 2013, pp. 256–261. [citation][year=2013]O. Vikholm and M. Flodström, “SQL-Injections: A wake-up call for developer: A study about a major threat and issue for companies and organizations worldwide,” Bachelor Thesis, Uppsala University, Uppsala, 2013. [citation][year=2012]G. Vaughan, “Understanding SQL Injection Attacks Inside and Out,” 2012. [citation][year=2012]Y. C. Zhu and H. L. Liang, “The SQL Injection Vulnerability Detection of the Web Application,” Applied Mechanics and Materials, vol. 198, pp. 1457–1461, 2012. [citation][year=2012]M. P. Salas and E. Martins, “Emulation of Malformed XML Using WSInject for Security Testing Against WS-Security,” presented at the IEEE Latin-American Conference on Communications (LATINCOM), Cuenca, Ecuador, 2012. [citation][year=2012]M. P. Salas and E. Martins, “Emulação de Ataques do Tipo XPath Injection para Testes de Web Services usando Injeção de Falhas,” in XIII Workshop de Testes e Tolerância a Falhas, Ouro Preto - MG, Brasil, 2012. [citation][year=2012]D. Rocha, D. Kreutz, and R. Turchetti, “A free and extensible tool to detect vulnerabilities in Web systems,” in 2012 7th Iberian Conference on Information Systems and Technologies (CISTI), 2012, pp. 1 –6. [citation][year=2012]T. Huynh and J. Miller, “AIWAS: The Automatic Identification of Web Attacks System,” International Journal of Systems and Service-Oriented Engineering (IJSSOE), vol. 3, no. 1, pp. 73–91, 2012. [citation][year=2012]H.-T. Tseng, “Design and Implementation of Automatic Web-Pages Penetration Testing System,” MSc Thesis, National Taiwan University of Science and Technology, Taiwan, 2012. [citation][year=2012]M. I. P. Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques,” MSc Thesis, IC-UNICAMP, Campinas, Brasil, 2012. [citation][year=2012]D. Rocha, D. Kreutz, and R. Turchetti, “Uma Ferramenta Livre e ExtensíVel Para Detecção de Vulnerabilidades em Sistemas Web,” Computer Science and Engineering, 2012. [citation][year=2011]1. A.R. Pais, D.J. Deepak, and B.R. Chandavarkar, “Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture”, Advances in Network Security and Applications, Vol. 196, ISBN: 978-3-642-22539-0, 2011. [citation][year=2011]2. F. van der Loo, “Comparison of penetration testing tools for web applications,” MSc Thesis, University of Radboud, Netherlands, 2011. [citation][year=2011]Geoffrey Vaughan, "Understanding SQL Injection Attacks Inside and Out", Faculty of Business and IT, University of Ontario Institute of Technology, Canada, 2011. [citation][year=2010]1. Hsin-Chung Chen, "Multi-Layer Real-time Protection Applications Against SQLIV Attacks", MSc Thesis, Department of Computer Science and Information Engineering, National Taiwan University of Science and technology, July 2010. [citation][year=2010]2. Peng Geng, Fan Ming-yu, "SQL Injection Detection based on Improved Web Crawler", Application research of Computes, Vol. 27 no 7, July 2010. [citation][year=2010]3. HU Ju-ning, BI Hong-jun, LIU Yun, JIA Fan, "Key management scheme based on polynomial and chaos for wireless sensor networks", Application research of Computes, Vol. 27 no 7, July 2010. [citation][year=2010]4. D.A. Shelly, “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners”, MSc Thesis, Virginia Polytechnic Institute and State University, July 2010. [citation][year=2010]5. N. Lambert, Kang Song Lin, "Use of Query tokenization to detect and prevent SQL injection attacks", 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, Chengdu, China, September 2010. [citation][year=2010]6. Toan Nguyen Duc Huynh, “Empirically Driven Investigation of Dependability and Security Issues in Internet-Centric Systems”, PhD Thesis, University of Alberta, Canada, 2010. [publication]Araújo Neto, A.C.d. and Marco Vieira and Madeira, H. , "An Appraisal to Assess the Security of Database Configurations", in International Conference on Dependability (DEPEND 2009), 2009 [citation][year=2013]Dilip kumar Choubey, Joy Bhattacharjee, Roopali Soni, "“Loss Minimization of Web Databases by Fine Grain Approach", International Journal of Engineering Research and Applications (IJERA), Vol. 3 Issue 1, January-February 2013. [citation][year=2012]Neera Batra, Hemant Aggarwal, "Autonomous Multilevel Policy Based Security tonomous Multilevel Policy Based Security Configuration in Distributed Database", International Journal of Computer Science Issues (IJCSI), Vol. 9 Issue 6 No 2, November 2012. [citation][year=2012]Dilip kumar Choubey, Roopali Soni, Joy Bhattacharjee, "Privacy protection and fine grained access control to web database", IRNetExplore, India, 2012. [citation][year=2011]Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo, "A method for system auditing based on baseline assessment", IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, May 27-29, 2011. [publication]Araújo Neto, A.C.d. and Marco Vieira , "Benchmarking Untrustworthiness in DBMS Configurations", in Fourth Latin-American Symposium on Dependable Computing (LADC 2009), 2009 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Appraisals based on Security Best Practices for Software Configurations", in Fourth Latin-American Symposium on Dependable Computing (LADC 2009), 2009 [publication]Araújo Neto, A.C.d. and Marco Vieira , "A Trust-Based Benchmark for DBMS Configurations", in 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC\'09), 2009 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Untrustworthiness: A Trust-Based Security Metric", in 4th International Conference on Risks and Security of Internet and Systems (CRiSIS2009), 2009 [citation][year=2010]1. Ming Li, B. Alessio, Wanlei Zhou, "OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security", 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China, December 2010. [publication]Nuno Antunes and Marco Vieira , "Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services", in IEEE 15th Pacific Rim International Symposium on Dependable Computing (PRDC'09), 2009 [citation][year=2015]S. Jan, C. D. Nguyen, and L. Briand, “Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems,” in 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS), 2015, pp. 233–241. [citation][year=2015]K. Goseva-Popstojanova and A. Perhinschi, “On the capability of static code analysis to detect security vulnerabilities,” Information and Software Technology, vol. 68, pp. 18–33, 2015. [citation][year=2015]S. Khani, C. Gacek, and P. Popov, “Security-aware selection of Web Services for Reliable Composition,” in 11th European Dependable Computing Conference (EDCC 2015) - Student Forum, Paris, France, 2015. [citation][year=2015]A. Davies, “Securing Legacy Web Services,” BSc Thesis, Bournemouth University, Dorset, UK, 2015. [citation][year=2015]Y.-C. Cho, “Implementation and analysis of website security mining system, applied to universities’ academic networks,” Tehnicki vjesnik - Technical Gazette, vol. 22, no. 2, pp. 279–287, 2015. [citation][year=2015]M.-A. Laverdiere, B. J. Berger, and E. Merloz, “Taint analysis of manual service compositions using Cross-Application Call Graphs,” in 2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015, pp. 585–589. [citation][year=2015]M. I. Palma Salas and E. Martins, “A Black-Box Approach to Detect Vulnerabilities in Web Services Using Penetration Testing,” Latin America Transactions, IEEE (Revista IEEE America Latina), vol. 13, no. 3, pp. 707–712, 2015. [citation][year=2014]V. Shanmuga Neethi, “Prevention of code injection vulnerabilities in web applications through web services,” Ph.D. Thesis, Anna University, Chennai, India, 2014. [citation][year=2014]R.M.Dilip Charaan, R. Ramesh, E. Uma, and C. Yaashuwanth, “Design Of Three Layer Security Architecture To Prevent Dos Attacks In Web Service,” International Journal of Applied Engineering Research, vol. 9, no. 24, 2014. [citation][year=2014]C. T. Phong and W. Q. Yan, “An Overview of Penetration Testing,” International Journal of Digital Crime and Forensics (IJDCF), vol. 6, no. 4, pp. 50–74, 2014. [citation][year=2014]V. Sunkari and C. V. Guru Rao, “Preventing input type validation vulnerabilities using network based intrusion detection systems,” in 2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014, pp. 702–706. [citation][year=2014]S. Chimmanee, T. Veeraprasit, and C. Srisa-An, “A Performance Evaluation of Vulnerability Detection: NetClarity Audito, Nessus, and Retina.,” International Journal of Computer Science & Network Security, vol. 14, no. 3, 2014. [citation][year=2014]T. P. Chiem, “A study of penetration testing tools and approaches,” MSc Thesis, Auckland University of Technology, Auckland, New Zealand, 2014. [citation][year=2014]Zhuo Ying gun and Pan Renyi, “Design and implementation of website information disclosure assessment system,” Ph.D. Thesis, National Chung Cheng University, 2014. [citation][year=2014]M. I. P. Salas and E. Martins, “Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security,” in Electronic Notes in Theoretical Computer Science, 2014, vol. 302, pp. 133–154. [citation][year=2013]A. Austin, C. Holmgreen, and L. Williams, “A Comparison of the Efficiency and Effectiveness of Vulnerability Discovery Techniques,” Information and Software Technology, 2013. [citation][year=2013]G. Nilson, K. Wills, J. Stuckman, and J. Purtilo, “BugBox: A Vulnerability Corpus for PHP Web Applications,” presented at the 6th Workshop on Cyber Security Experimentation and Test (CSET ’13), Washington, D.C., 2013. [citation][year=2013]M. Muralidharan and M. Surya, “A Network Based Vulnerability Scanner for Detecting and Preventing SQLI Attacks in Web Applications,” International Journal of Advanced and Innovative Research (IJAIR), vol. 2, no. 3, Mar. 2013. [citation][year=2013]N. Meghanathan, “Automated Source Code Analysis to Identify and Remove Software Security Vulnerabilities: Case Studies on Java Programs,” International Journal of Software Engineering, vol. 6, no. 1, pp. 3–32, Jan. 2013. [citation][year=2013]N. Awang and A. Manaf, “Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing,” in Advances in Security of Information and Communication Networks, vol. 381, A. Awad, A. Hassanien, and K. Baba, Eds. Springer Berlin Heidelberg, 2013. [citation][year=2013]R. Thenmozhi, M. Priyadharshini, and K. Abirami, “Vulnerability Management in Web Applications,” Data Mining and Knowledge Engineering, vol. 5, no. 4, pp. 162–167, 2013. [citation][year=2013]R. Scandariato, J. Walden, and W. Joosen, “Static analysis versus penetration testing: A controlled experiment,” in 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), 2013, pp. 451–460. [citation][year=2012]S. Chimmanee, T. Veeraprasit, K. Sriphaew, and A. Hemanidhi, “A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus,” Recent Advances in Communications, Circuits and Technological Innovation, pp. 280–285, 2012. [citation][year=2012]S. Roy, A. K. Singh, and A. S. Sairam, “A Novel Approach to Prevent SQL Injection Attack Using URL Filter,” International Journal of Innovation, Management and Technology, vol. 3, no. 5, pp. 499–502, Oct. 2012. [citation][year=2012]V. Shanmughaneethi, R. Y. Praveen, and S. Swamynathan, “CIVD: detection of command injection vulnerabilities in web services through aspect–oriented programming,” International Journal of Computer Applications in Technology, vol. 44, no. 4, pp. 312–320, Jan. 2012. [citation][year=2012]N. Meghanathan and A. R. Geoghegan, “A Case Study on Testing for Software Security: Static Code Analysis of a File Reader Program Developed in Java,” in Advanced Automated Software Testing: Frameworks for Refined Practice, I. Alsmadi, Ed. IGI Global, 2012, pp. 89–112. [citation][year=2012]A. K. Singh and S. Roy, “A Network Based Vulnerability Scanner for Detecting SQLI Attacks in Web Applications,” in 1st International Conference on Recent Advances in Information Technology (RAIT), 2012, 2012, pp. 585 –590. [citation][year=2012]M. I. P. Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques,” MSc Thesis, IC-UNICAMP, Campinas, Brasil, 2012 [citation][year=2012]G. Nilson, K. Wills, J. Stuckman, and J. Purtilo, “BugBox: A Vulnerability Corpus for PHP Web Applications,” presented at the 6th Workshop on Cyber Security Experimentation and Test (CSET ’13), Washington, D.C., 2013. [citation][year=2012]A. Austin, C. Holmgreen, and L. Williams, “A Comparison of the Efficiency and Effectiveness of Vulnerability Discovery Techniques,” Information and Software Technology, Dec. 2012. [citation][year=2011]1. E. Uma, A. Kannan, R. Ramesh, “Design of New Architecture for Providing Secure Web Services”, Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA: Newswood Limited, October 19-21, 2011. [citation][year=2011]2. Sangita Roy, Avinash Kumar Singh, Ashok Singh Sairam, "Detecting and Defeating SQL Injection Attacks", International Journal of Information and Electronics Engineering, Vol. 1 , No. 1, July 2011. [citation][year=2011]3. A.R. Pais, D.J. Deepak, and B.R. Chandavarkar, “Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture”, Advances in Network Security and Applications, Vol. 196, ISBN: 978-3-642-22539-0, 2011. [citation][year=2011]4. S. Roy, A. K. Singh, and A. S. Sairam, “Analyzing SQL Meta Characters and Preventing SQL Injection Attacks Using Meta Filter”, International Conference on Information and Electronics Engineering, Singapore, 2011. [citation][year=2011]5. A. Austin and L. Williams, “One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques,” presented at the ACM/IEEE 5th International Symposium on Empirical Software Engineering and Measurement (ESEM), Banff, Alberta, Canada, 2011. [citation][year=2011]6. A. Austin, “Improving the Security of Electronic Health Record Systems,” Master of Science, North Carolina State University, Raleigh, North Carolina, 2011. [citation][year=2010]1. Pramote Kuacharoen, “A Practical Customer Privacy Protection on Shared Servers”, 2010 International Conference on Information Theory and Information Security, ICITIS2010, Beijing, China, December 2010. [citation][year=2010]2. Deepak D. J., “Protection Against Input Manipulation Vulnerabilities in Service Oriented Architecture”, MSc Thesis – Master of Technology in Computer Science & Engineering – Information Security, Department of Computer Engineering - National Institute of Technology Karnataka, Mangalore, India, July 2010. [publication]Marques, P. and Paulo Gomes and Marco Vieira and Prieto, J.F. and Navarro, V. and Pecchioli, M. , "BIRF: Keeping Software Development under Control across the Organization", 2009 [citation][year=2012]1. Kenelly Almeida, Cristine Gusmão, Júlio Venâncio, "A Risk Breakdown Structure for Multiple Project Software Environments", 9th International Conference on Information Systems and Technology Management, 9th CONTECSI, São Paulo, SP, Brazil, 2012. [citation][year=2012]Kenelly Almeida, Cristine Gusmão, Júlio Venâncio, "A Risk Breakdown Structure for Multiple Project Software Environments", 9th International Conference on Information Systems and Technology Management, 9th CONTECSI, São Paulo, SP, Brazil, 2012. [publication]Seixas, N. and José Fonseca and Marco Vieira and Madeira, H. , "Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study", in 20th annual International Symposium on Software Reliability Engineering, 2009 [citation][year=2012]M. Murali, R. Srinivasan, "Inter-domain Authentication Scheme in a Distributed Mobile Netwrok, Journal of Informattion Technology, ISSN: 1815-7432, 2012. [citation][year=2012]Theodoor Scholte, Davide Balzarotti, William Robertson, Engin Kirda, "An Empirical Analysis of Input Validation Mechanisms in Web Applications and Languages", 27th ACM Symposium On Applied Computing (SAC 2012), Trento, Italy, March 2012. [citation][year=2012]Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan, "A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies", CustomWare & International Islamic University Malaysia, Kuala Lumpur, Malaysia, 2012. [citation][year=2011]5. Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan, “A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques”, The 15th IEEE Symposium on Consumer Electronics, IEEE ISCE2011, Singapore, June, 2011. [citation][year=2011]1. Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]2. Lai-Cheng Cao, “Secure Negotiation Approach for Share-Secret-Key of Kerberos Service”, Artificial Intelligence and Computational Intelligence”, pp 101-107, Springer Berlin / Heidelberg, ISBN 978-3-642-23886-4, September, 2011. [citation][year=2011]3. Dimitris Mitropoulos, Vassilios Karakoidas, Panagiotis Louridas, Diomidis Spinellis, “Countering code injection attacks: A unified approach”, Information Management and Computer Security, 19(3), ISSN: 0968-5227, Emerald Journals, 2011. [citation][year=2011]4. Lai-Cheng Cao, “Secure Secret-Key Management of Kerberos Service”, Emerging Research in Artificial Intelligence and Computational Intelligence, pp 76-83, September, 2011. [citation][year=2010]1. Deepak D. J., “Protection Against Input Manipulation Vulnerabilities in Service Oriented Architecture”, MSc Thesis – Master of Technology in Computer Science & Engineering – Information Security, Department of Computer Engineering - National Institute of Technology Karnataka, Mangalore, India, July 2010. [citation][year=2010]2. C. Lai-Cheng, “Enhancing Distributed Web Security Based on Kerberos Authentication Service”, Web Information Systems and Mining, F. Wang, Z. Gong, X. Luo, and J. Lei, eds., Springer Berlin / Heidelberg, pp. 171-178, 2010. [publication]Marco Vieira and Madeira, H. and Ivano Irrera , "Fault Injection for Failure Prediction Methods Validation", in Fifth Workshop on Hot Topics in System Dependability (HotDep 2009), 2009 [citation][year=2012]1. A. Vashist, R. Izmailov, K. Manousakis, R. Chadha, C. J. Chiang, C. Serban, S. E. Ali, "Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisions", 2012 IEEE Network Operations and Management Symposium (NOMS 2012), Maui, Hawaii, USA, April 2012. [citation][year=2011]1. Maria Rita Di Berardini, Henry Muccini, Andrea Polini, Pengcheng Zhang, "Online Failure Prediction of Dynamically Evolving Systems", Technical Report TRCS 006/2011, Dipartimento di Informatica, University of L'Aquila, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2010]1. James Brandt, Frank Chen, Vincent De Sapio, Ann Gentile, Jackson Mayo, Philippe Pébay, Diana Roe, David Thompson, Matthew Wong, "Quantifying Effectiveness of Failure Prediction and Response in HPC Systems: Methodology and Example", 1st Workshop on Fault-Tolerance for HPC at Extreme Scale, FTXS 2010, in conjunction with The 40th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), Chicago, IL, USA, 2010. [publication]Marco Vieira and Madeira, H. , "From Performance to Dependability Benchmarking: A Mandatory Path", in First TPC Technology Conference on Performance Evaluation & Benchmarking, TPCTC 2009, (jointly organized with the 35th International Conference on Very Large Databases, VLDB09), 2009 [citation][year=2013]Alessandro Gustavo Farias Fior, "Under Pressure Benchmark: A Large-Scale Availability Benchmark For Distributed Databases", Msc Thesis, Universidade Federal Do Paraná, Curitiba, Brazil, 2013. [citation][year=2012]Anja Bog, "Benchmarking Composite Transaction and Analytical Processing Systems", University of Potsdam/Hasso-Plattner-Institut, Potsdam, Germany, June 2012. [citation][year=2010]1. Karl Huppler, “Price and the TPC", Second TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC'10, Singapure, September 2010. [citation][year=2010]2. Priya Sethuraman, H. Reza Taheri, "TPC-V: a benchmark for evaluating the performance of database applications in virtual environments", Second TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC'10, Singapure, September 2010. [publication]Mendes, N. and Joao Duraes and Marco Vieira and Madeira, H. , "Towards Assessing the Impact of Security Attacks in Web Servers (fast abstract)", in The 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, 2009 [publication]Marco Vieira , "Assessing the Robustness and Security of Web Services: State-of-the-art and Research Opportunities (tutorial)", in The 5th 2009 World Congress on Services, SERVICES 2009, 2009 2008(21 publications) [publication]José Fonseca and Marco Vieira and Madeira, H. , "Online Detection of Malicious Data Access Using DBMS Auditing", in 23rd Annual ACM Symposium on Applied Computing (ACM SAC 2008), 2008 [citation][year=2013]Abhijeet Sartape, Vasgi B. P., "Data-Base Security Using Different Techniques: A Survey", International Journal of Computer Trends and Technology (IJCTT), Vol. 4 Issue 4, April 2013. [citation][year=2013]Rita M. Barrios, "A Multi-Leveled Approach to Intrusion Detection and the Insider Threat", Journal of Information Security, 4, January 2013. [citation][year=2012]Asaf Shabtai, Yuval Elovici, Lior Rokach, "A Survey of Data Leackage Detection and Prevention Solutions", Springer Briefs in Computer Science, 2012. [citation][year=2012]Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012. [citation][year=2012]1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012. [citation][year=2011]A. Rezk, H. Ali, M. El-Mikkawy, S. Barakat, "Minimize the False Positive Rate in a Database Intrusion Detection System", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3 No 5, October 2011. [citation][year=2011]1. J. Harold Pardue, Priya Patidar, “Threats to Healthcare Data: A Threat Tree for Risk Assessment”, Issues in Information Systems, Volume XII, No. 1, pp. 106-113, 2011. [citation][year=2010]Dai Hual, Qin Xiaolin, Li Ziyuel, Sun Libin, Wu Don, "A DBSUIM-Based Suspicious User Isolation Mechanism for Database", Journal of Computer Research and Development, 47(Suppl), 2010. [citation][year=2010]1. Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu Upadhyaya, “A data-centric approach to insider attack detection in database systems”, 13th international conference on Recent advances in intrusion detection, RAID'10, Ottawa, Ontario, Canada, September 15-17, 2010. [citation][year=2010]2. Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, and Yuval Elovici, “Detecting data misuse by applying context-based data linkage”, 2010 ACM CCS Workshop on Insider threats (Insider Threats '10), Chicago, IL, USA, October 2010. [citation][year=2010]3. Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici, “M-score: estimating the potential damage of data leakage incident by assigning misuseability weight”, 2010 ACM CCS Workshop on Insider threats (Insider Threats '10), Chicago, IL, USA, October 2010. [citation][year=2009]Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li, "Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation", Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009 (in conjunction with ICEIS 2009), Milan, Italy, May 2009. [citation][year=2009]1. Hennayake M. Bandara, “Security Features in Oracle Database Management System”, MSc Thesis, California State University, Sacramento, USA, 2009. [citation][year=2009]2. Sunu Mathew, “Techniques for Cyber-Attack Comprehension through Analysis of Application Level Data”, PhD Thesis, State University of New York at Buffalo, USA, July 2009. [citation][year=2009]3. Platt, A., Mengle, S. S., Goharian, N., “Improving classification based off-topic search detection via category relationships”, 2009 ACM Symposium on Applied Computing, SAC '09, Honolulu, Hawaii, USA, March 9-12, 2009. [citation][year=2008]1. Jagdish Halde, "SQL Injection analysis, Detection and Prevention", MSc Thesis, Department of Computer Science, San Jose State University, San Jose, CA, USA, 2008. [publication]Vieira, J. and Marco Vieira and Costa, M.A. and Madeira, H. , "Redundant Array of Inexpensive Nodes for DWS", in The 13th International Conference on Database Systems for Advanced Applications (DASFAA 2008), 2008 [publication]Vieira, J. and Marco Vieira and Costa, M.A. and Madeira, H. , "RAIN: Always On Data Warehousing", in The 13th International Conference on Database Systems for Advanced Applications (DASFAA 2008), 2008 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Towards Assessing the Security of DBMS Configurations", in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), 2008 [citation][year=2009]1. A. Tjang, F. Oliveira, R. Bianchini, R. P. Martin, T. Nguyen, “Model-Based Validation for Internet Services”, 28th International Symposium on Reliable Distributed Systems (SRDS), October 2009. [publication]José Fonseca and Marco Vieira , "Mapping Software Faults with Web Security Vulnerabilities", in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), 2008 [citation][year=2013]Gary Nilson, Kent Wills, Jeffrey Stuckman, James Purtilo, "BugBox: A Vulnerability Corpus for PHP Web Applications", 6th Workshop on Cyber Security Experimentation and Test, CSET'13, Washington D. C., USA, August 12, 2013. [citation][year=2013]Umme Hunny, Mohammad Zulkernine, and Komminist Weldemariam, "OSDC: adapting ODC for developing more secure software", 28th Annual ACM Symposium on Applied Computing, SAC '13, Coimbra, Portugal, March 18 - 22, 2013. [citation][year=2012]1. Theodoor Scholte, Davide Balzarotti, William Robertson, Engin Kirda, "An Empirical Analysis of Input Validation Mechanisms in Web Applications and Languages", 27th ACM Symposium On Applied Computing (SAC 2012), Trento, Italy, March 2012. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]Jeffrey Stuckman, James Purtilo "Comparing and applying attack surface metrics", 8th international workshop on Security measurements and metrics, MetriSec'12, Lund, Sweden, September 21, 2012. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]Mohamed Al-Ibrahim, "Are our Educational Technology Systems Secured?", International Journal for e-Learning Security (IJeLS), Volume 1, Issues 3/4, September/December 2011. [citation][year=2011]Rich Pietravalle and Dan Lanz, “Resiliency Research Snapshot”, Technical Report. 11-3023, MITRE Corporation, June 2011. [citation][year=2011]Jingshu Chen, Sandeep Kulkarni, “Effectiveness of Transition Systems to Model Faults”, 2nd International Workshop on Logical Aspects of Fault-Tolerance, LAFT, in conjunction with Twenty-Sixth Annual IEEE Symposium on Logic in Computer Science (LICS 2011), Toronto, Canada, June, 2011. [citation][year=2011]Francisco Vieira, “Realistic Vulnerability Injections in PHP Web Applications”, MSc Thesis, Faculty of Sciences, University of Lisbon, Lisbon, Portugal, 2011. [citation][year=2010]Plínio C. S. Fernandes, Tania Basso, Regina L. O. Moraes, Mario Jino, "Attack Trees Modeling for Security Tests in Web Applications", IV Brazilian Workshop on Systematic and Automated Software Testing, SAST 2010, Natal, Brazil, November 8-10, 2010. [citation][year=2010]1. Célio B. Taquary Segundo, Luis Fernando Rust C. Carmo, Luci Pirmez, “Uso de Árvores de Ataque e Técnicas de Mutação de Código na Segurança de Aplicações Web”, X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBSeg’10, Fortaleza, Brazil, October 2010. [citation][year=2010]2. Tânia Basso, Plínio César Simões Fernandes, Mario Jino, Regina Moraes, “Analysis of the Effect of Java Software Faults on Security Vulnerabilities and Their Detection by Commercial Web Vulnerability Scanner Tool”, 4th Workshop on Recent Advances on Intrusion-Tolerant Systems, WRAITS 2010, in conjunction with The 40th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), Chicago, IL, USA, 2010. [citation][year=2010]3. Tania Basso, Regina L. O. Moraes, Mario Jino, "A Methodology for Effectiveness Analysis of Vulnerability Scanning Tools", III EADCA - Terceiro Encontro dos Alunos e Docentes do Departamento de Engenharia de Computação e Automação Industrial, University of Campinas (UNICAMP), Brazil, March 2010. [citation][year=2009]1. Regina Moraes, Bruno T. de Abreu, Eliane Martins, "Mapping Web-Based Applications Failures to Faults", Fourth Latin-American Symposium on Dependable Computing, LADC 2009, João Pessoa, PB, Brazil, September, 2009. [citation][year=2009]2. T. Basso, R. Moraes, B. P. Sanches, M. Jino, “An Investigation of Java Faults Operators Derived from a Field Data Study on Java Software Faults”, Workshop de Tolerancia a Falhas (WTF 2009), jointly organized with the Fourth Latin-American Symposium on Dependable Computing (LADC 2009), João Pessoa, PB, Brazil, September 2009. [citation][year=2008]1. Cesar Simões Fernandes, "Desenvolvimento de Ferramenta para Injeção de Falhas de Software - J-SWFIT", Pauta da 23ª Reunião Ordinária, Centro Superior de Educação Tecnológica, University of Campinas, Brazil, 2008. [publication]Marco Vieira and Vieira, J. and Madeira, H. , "Towards Data Security in Affordable Data Warehouses (Fast Abstract)", in 7th European Dependable Computing Conference (EDCC-7), 2008 [citation][year=2011]1. Amy Poh Ai Ling, Mukaidono Masao, “Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System”, International Journal of Grid Computing & Applications (IJGCA), Vol.2, No.2, June 2011. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Experimental Robustness Evaluation of JMS Middleware", in IEEE International Conference on Services Computing (SCC 2008), 2008 [citation][year=2013]Antonio Bovenzi, Aniello Napolitano, Christian Esposito, Gabriella Carrozza, "JFIT: an Automatic Tool for Assessing Robustness of DDS-Compliant Middleware", Innovative Technologies for Dependable OTS-Based Critical Systems, 2013. [citation][year=2012]Marcelo Invert Palma Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Brazil, December 2012. [citation][year=2011]1. A. Napolitano, G. Carrozza, A. Bovenzi, C. Esposito, "Automatic Robustness Assessment of DDS-Compliant Middleware", 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC), Pasadena, CA, USA, December 2011. [citation][year=2011]2. André Willik Valenti, “Testes de Robustez em Web Services por meio de Injeção de Falhas”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), July 2011. [citation][year=2010]1. Robert Henjes, “Performance Evaluation of Publish/Subscribe Middleware Architectures”, PhD Thesis, Julius-Maximilians-Universität Würzburg, Germany, April 2010. [citation][year=2009]1. Francis Tam, “Service Availability Standards for Carrier-Grade Platforms: Creation and Deployment in Mobile Networks,” PhD Thesis, Tampere University of Technology, Finland, 2009. [publication]Laranjeiro, N. and Canelas, S. and Marco Vieira , "wsrbench: An On-Line Tool for Robustness Benchmarking", in IEEE International Conference on Services Computing (SCC 2008), 2008 [citation][year=2012]1. Ali Shahrokni, Robert Feldt, “A Systematic Review of Software Robustness”, Information and Software Technology (Elsevier), ISSN 0950-5849, June 2012. [citation][year=2012]2. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing & Verification in Service-Oriented Architecture: A Survey", Software Testing, Verification and Reliability (STVR), Issn: 1099-1689, Wiley InterScience, 2012. [citation][year=2012]Marcelo Invert Palma Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Brasil, 7 December 2012. [citation][year=2011]1. André Willik Valenti, “Testes de Robustez em Web Services por meio de Injeção de Falhas”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), July 2011. [citation][year=2011]2. Paulo Nunes, “Validação de padrões de web services transacionais”, MSc Thesis, Instituto de Matemática e Estatística, Universidade de São Paulo, São Paulo, Brazil, July 2011. [citation][year=2011]3. Sammer Hanna, Amer AbuAli, “Platform Effect on Web Services Robustness Testing”, Journal of Applied Sciences 11, no. 2, 360-366, 2011. [citation][year=2010]1. André Willik Valenti, Willian Yabusame Maja, Eliane Martins, Fayçal Bessayah, Ana Cavalli, “WSInject: A Fault Injection Tool for Web Services”, Technical Report - IC-10-22, Instituto de Computação, Universidade Estadual de Campinas, Campinas, Brazil, July 2010. [citation][year=2010]2. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing Web Services: A Survey", Department of Computer Science, King's College London, UK, TR-10-01, January 2010. [publication]Marco Vieira and Mendes, N. and Joao Duraes and Madeira, H. , "The AMBER Data Repository", in DSN 2008 Workshop on Resilience Assessment and Dependability Benchmarking (DSN-RADB08), IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), 2008 [citation][year=2011]1. J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas, "From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers’ Pro?les", Rapport de Recherche, RR-2011-14, Laboratoire D'informatique Fondamentale D'Orleans (LIFO), Université D'Orleans, France, 2011. [citation][year=2010]1. Andreas Dittrich, Felix Salfner, "Experimental Responsiveness Evaluation of Decentralized Service Discovery", 15th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems,Atlanta, Georgia, USA, April 2010. [citation][year=2008]1. Andrea Ceccarelli, Danilo Iovino, Andrea Bondavalli, “A Fault Injection Tool for Trustworthy, Comparative Measurements and Analysis”, SRDS 2008 Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (jointly organized with the 27th International Symposium on Reliable Distributed Systems, IEEE SRDS 2008), Naples, Italy, October 5, 2008. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Timing Failures Detection in Web Services", in IEEE Asia-Pacific Services Computing Conference (APSCC 2008), 2008 [citation][year=2012]Araceli Acosta, Cecilia Kilmurray, Pablo Castro, Nazareno Aguirre, “Model Checking Propositional Deontic Temporal Logic via a ?-Calculus Characterization”, Formal Methods: Foundations and Applications, ed. Rohit Gheyi and David Naumann, 2012. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Training Security Assurance Teams using Vulnerability Injection", in 14th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC\'08), 2008 [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2011]1. Paulo Véras, “Benchmarking Software Requirements Documentation for Space Application”, PhD Thesis, Instituto Tecnológico de Aeronáutica, São José dos Campos, SP, Brasil, 2011. [citation][year=2011]2. Francisco Vieira, “Realistic Vulnerability Injections in PHP Web Applications”, MSc Thesis, Faculty of Sciences, University of Lisbon, Lisbon, Portugal, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [publication]Almeida, P. and Jorge, M. and Cortesão, L. and Marco Vieira and Paulo Gomes , "Supporting Fraud Analysis in Mobile Telecommunications Using Case-Based Reasoning", in ECCBR 2008 - European Conference on Case-Based Reasoning, 2008 [citation][year=2012]1. Jungeun Kim, Keunho Choi, Gunwoo Kim, Yongmoo Suh, "Classification cost: An empirical comparison among traditional classifier, Cost-Sensitive Classifier, and MetaCost", Expert Systems with Applications, Volume 39, Issue 4, March 2012. [publication]Mendes, N. and Araújo Neto, A.C.d. and Joao Duraes and Marco Vieira and Madeira, H. , "Assessing and Comparing Security of Web Servers", in 14th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC\'08), 2008 [citation][year=2013]B. Eshete, A. Villafiorita, K. Weldemariam, M. Zulkernine, “Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications”, IEEE 7th International Conference on Software Security and Reliability, SERE 2013, June 18-20, 2013. [citation][year=2012]1. L. Ertaul, Y. Martirosyan, “Implementation of a WEB Application for Evaluation of WEB Application Security Scanners”, 2012 International Conference on Security & Management, SAM’12, Las Vegas, USA, July 2012. [citation][year=2011]1. Birhanu Eshete, Komminist Weldemariam, Adolfo Villafiorita, “Early Detection of Security Misconfiguration Vulnerabilities in Web Applications”, Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011. [citation][year=2010]1. R. Priyadarshini, S. Aishwarya, A. A. Ahmed, "Search engine vulnerabilities and threats - a survey and proposed solution for a secured censored search platform", International Conference on Communication and Computational Intelligence, INCOCCI 2010, Erode, India, December 27-29, 2010. [citation][year=2009]1. Sérgio Rodrigues Nunes, "Web attack risk awareness with lessons learned from high interaction honeypots", MSc Thesis, University of Lisbon/Carnegie Mellon University, December 2009. [citation][year=2009]2. Yoshio Masuzawa, Takashi Hayakawa, Kazunori Kumakura, Toshio Morikawa, "Method for ensuring security, data storage apparatus, security ensuring server, and storage medium storing program for the same", United States Patent 7574743, August de 2009. [publication]Marco Vieira and Mendes, N. and Joao Duraes , "A Case Study on Using the AMBER Data Repository for Experimental Data Analysis", in SRDS 2008 Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (jointly organized with the 27th International Symposium on Reliable Distributed Systems, IEEE SRDS 2008), 2008 [citation][year=2011]1. Jean Arlat, Regina Moraes, "Collecting, Analyzing and Archiving Results from Fault Injection Experiments", 5th Latin-American Symposium on Dependable Computing, LADC 2011, São José dos Campos, SP, Brazil, April 25-29, 2011. [publication]Dixit, M. and Costa, A.C. and Laranjeiro, N. and Marco Vieira , "Using Experimental Measurements to Assess Dependable Adaptation Support Mechanisms for Timed Transactions", in SRDS 2008 Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (jointly organized with the 27th International Symposium on Reliable Distributed Systems, IEEE SRDS 2008), 2008 [publication]Mendes, N. and Joao Duraes and Marco Vieira and Madeira, H. , "Security Assessment and Testing Tools Information Repository", in Workshop on Fault Tolerance (WTF2008) in the 26th Brazilian Symposium on Network Computing (SBRC2008), 2008 [publication]Raquel Almeida and Vieira, J. and Marco Vieira and Madeira, H. and Jorge Bernardino , "Efficient Data Distribution for DWS", in 10th International Conference on Data Warehousing and Knowledge Discovery (DaWaK \'08 ), 2008 [citation][year=2012]1. Lili Wu, Roshan Sumbaly, Chris Riccomini, Gordon Koo, Hyung Jin Kim, Jay Kreps, Sam Shah, "Avatara: OLAP for Web-scale Analytics Products", Proceedings of the VLDB Endowment, Vol. 5, No. 12, The 38th International Conference on Very Large Data Bases, Istanbul, Turkey, August 2012. [citation][year=2011]1. Doulkifli Boukraâ, Omar Boussaïd, Fadila Bentayeb, "Vertical Fragmentation of XML Data Warehouses Using Frequent Path Sets", 13th international conference on Data warehousing and knowledge discovery, DaWaK'11, Toulouse, France, August 2011. [citation][year=2011]2. Robert Jan Kopaczyk, "Scalable In-Memory Aggregation", MSc Thesis, Department of Computing, Imperial College London, London, UK, June 2011. [citation][year=2009]1. Yongping Zhang, "OLAP Database Computation with a Splitcube in a Cluster", MSc Theses, School of COmputing Science, Simon Fraser University, Burnaby, Canada, 2009. [citation][year=2009]2. Shah, N., Tsai, C., Marinov, M., Cooper, J., Vitliemov, P., Chao, K., “Ontological On-line Analytical Processing for Integrating Energy Sensor Data”, IETE Tech Rev 26:375-87, 2009. [citation][year=2009]3. Kolsi, N., Abdellatif, A., and Ghedira, K., “Data warehouse access using multi-agent system”, Distributed and Parallel Databases, Vol. 25, Issue 1-2, April 2009. [publication]Bruno Direito and António Dourado and Marco Vieira and Sales, F. , "Combining Energy and Wavelet Transform for Epileptic Seizure Prediction in an Advanced Computational System", in International Conference on Biomedical Engineering and informatics, 2008 [citation][year=2015]Real-time mining of epileptic seizure precursors via nonlinear mapping and dissimilarity features S Nesaei, AR Sharafat - IET Signal Processing, 2015 - IET We propose a novel approach for detecting precursors to epileptic seizures in intracranial electroencephalograms (iEEGs), which is based on the analysis of system dynamics. In the proposed scheme, the largest Lyapunov exponent (LLE) of wavelet entropy of the ... [citation][year=2014]Real-time Detection of Precursors to Epileptic Seizures: Non-Linear Analysis of System Dynamics S Nesaei, AR Sharafat - Journal of medical signals and sensors, 2014 - ncbi.nlm.nih.gov [citation][year=2012]Manohar Ayinala, "Low-Power Architectures for Signal Processing and Classi?cation Systems", University of Minnesota, USA, August 2012. [citation][year=2010]Shao-Hang Hung, Chih-Feng Chao, Shu-Kai Wang, Bor-Shyh Lin, Chin-Teng Lin, "VLSI implementation for Epileptic Seizure Prediction System based on wavelet and chaos theory", IEEE Region 10 Conference 2010, TENCON 2010, Fukuoka, Japan, November 21-24, 2010. [citation][year=2010]Nesaei, S., Nesaei, S., "Comparison of phase synchrony information flow in human EEG through wavelet phase synchronization analysis", 2010 IEEE 10th International Conference on Signal Processing, ICSP 2010, Beijing, China, October 2010. [citation][year=2009]Hu, S., Stead, M., Liang, H., Worrell, G. A., "Reference Signal Impact on EEG Energy?, 6th international Symposium on Neural Networks: Advances in Neural Networks - Part III, Wuhan, China, May 2009. [publication]Bruno Direito and António Dourado and Marco Vieira and Sales, F. , "An Application for Electroencephalogram Mining for Epileptic Seizure Prediction", in ICDM- International Conference on Data Mining, 2008 [citation][year=2012]Nearest neighbor estimate of conditional mutual information in feature selection A Tsimpiris, I Vlachos, D Kugiumtzis - Expert Systems with Applications, 2012 - Elsevier [citation][year=2012]Alkiviadis Tsimpiris, Ioannis Vlachos, Dimitris Kugiumtzis, "Nearest neighbor estimate of conditional mutual information in feature selection", Expert Systems with Applications, Vol. 39 Issue 16, November 2012. [citation][year=2010]A. Tsimpiris, D. Kugiumtzis, "EEG Features as biomarkers for discrimination of pre-ictal states", International Conference on Biomedical Data & Knowledge Mining: Towards Biomarker Discovery, Chania, Greece, July 2010. [citation][year=2010]A. Tsimpiris, D. Kugiumtzis and P.G. Larsson, "Discrimination of epileptic pre-ictal states using feature based clustering on EEG", XII Mediterranean Conference on Medical and Biological Engineering and Computing (Medicon 2010), Porto Carras, Chalkidiki, Greece, May 2010. [publication]Bruno Direito and Martins, R. and Costa, R. and António Dourado and Sales, F. and Marco Vieira , "Computational Intelligence Algorithms for Seizure Prediction", in 8th European Congress on Epileptology, 2008 [publication]Bruno Direito and António Dourado and Marco Vieira , "Classification of epileptic EEG data using multidimensional scaling", in ICBBE 2008, The 2nd International Conference on Bioinformatics and Biomedical Engineering, 2008 2007(12 publications) [publication]Marco Vieira and Costa, A.C. and Madeira, H. , "Towards Timely ACID Transactions in DBMS", in The 12th International Conference on Database Systems for Advanced Applications (DASFAA 2007), 2007 [citation][year=2010]Adnan Gohar, “Analyzing Service Oriented Architecture (SOA) in Open Source Products”, Master Thesis in Software Engineering, School of Innovation, Design and Engineering (IDT), Mälardalen University, Sweden, October 2010. [publication]Marco Vieira and Laranjeiro, N. and Madeira, H. , "Assessing Robustness of Web-services Infrastructures", in Dependable Computing and Communications Symposium (DCCS), 2007 [citation][year=2013]Sébastien Salva and Antoine Rollet, “A pragmatic approach for testing stateless and stateful Web Service Robustness,” Studia Informatica Universalis 10, no. 2: 139–179, 2013. [citation][year=2013]Stefan Winter, Michael Tretter, Benjamin Sattler, and Neeraj Suri, “simFI: From Single to Simultaneous Software Fault Injections,” The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Budapest, Hungary: IEEE Computer Society, 24 June 2013. [citation][year=2013]Zibin Zheng and Michael R Lyu, “QoS-Aware Fault Tolerance for Web Services,” QoS Management of Web Services, 97–118. Advanced Topics in Science and Technology in China, Springer, 2013. [citation][year=2012]1. Issam Rabhi, “Testabilité des services Web”, PhD Thesis, École Doctorale Sciences pour l’Ingénieur de Clermont-Ferrand. Université Blaise Pascal – Clermont II, 5 October 2012. [citation][year=2012]2. Ali Shahrokni, Robert Feldt, “A Systematic Review of Software Robustness”, Information and Software Technology (Elsevier), ISSN 0950-5849, June 2012. [citation][year=2012]3. Issam Rabhi and Patrice Laurençot, “Robustesse des Services Web Composés”, Conférence en IngénieriE du Logiciel (CIEL), Rennes, France, 18 June 2012. [citation][year=2012]4. Marcelo Invert Palma Salas and Eliane Martins, “Metodologia de Testes de Robustez por Injeção de Falhas para WS-Security”, Technical Report. Anais do VII Workshop de Teses, Dissertações e Trabalhos de Iniciação Científica em Andamento do IC-UNICAMP IC-12-19. Alex Grilo, Ariadne Carvalho, Daniel Cugler, Everton Silva, Gustavo Alkmim, Ivelize Rocha, Leonardo Tampelini, et al. (Eds.), Instituto de Computação, Universidade Estadual de Campinas, June 2012. [citation][year=2012]5. Yuhui Chen, Anatoliy Gorbenko, Vyacheslav Kharchenko, Alexander Romanovsky, “Measuring and Dealing with the Uncertainty of SOA Solutions,” Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, ed. Valeria Cardellini, Emiliano Casalichio, Kalinka Castelo Branco, Júlio Cezar Estrella, and Francisco José Monaco, IGI Global, ISBN: 1609607945, 2012. [citation][year=2012]6. Anatoliy Gorbenko, Vyacheslav Kharchenko, Seyran Mamutov, Olga Tarasyuk, Alexander Romanovsky, “Exploring Uncertainty of Delays as a Factor in End-to-End Cloud Response Time”, 9th European Dependable Computing Conference (EDCC 2012), Sibiu, Romenia, May 2012. [citation][year=2011]1. Fahad A. Arshad, Saurabh Bagchi, “Dangers and Joys of Stock Trading on the Web: Failure Characterization of a Three-Tier Web Service,” IEEE 30th International Symposium on Reliable Distributed Systems, SRDS 2011, Madrid, Spain, October 2011. [citation][year=2011]2. Khaled Farj, “Fault Injection Testing Method of Software Implemented Fault Tolerance Mechanisms of Web Service Systems”, PhD Thesis, Newcastle University, Newcastle upon Tyne, UK, September 2011. [citation][year=2011]3. Rich Pietravalle and Dan Lanz, “Resiliency Research Snapshot”, Technical Report. 11-3023, MITRE Corporation, June 2011. [citation][year=2011]4. Zibin Zheng, “QoS Management of Web Services”, PhD Thesis, The Chinese University of Hong Kong, Hing Kong, January 2011. [citation][year=2011]Yuhui Chen, Anatoliy Gorbenko, Vyacheslav Kharchenko, and Alexander Romanovsky, “Measuring and Dealing with the Uncertainty of SOA Solutions,” Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, ed. Valeria Cardellini, Emiliano Casalichio, Kalinka Castelo Branco, Júlio Cezar Estrella, and Francisco José Monaco, 265-294, IGI Global, ISBN: 1609607945, July 2011. [citation][year=2010]1. Yongbo Wang, Fuyuki Ishikawa, and Shinichi Honiden, “Business Semantics Centric Reliability Testing for Web Services in BPEL”, 6th World Congress on Services, SERVICES ’10, Washington, DC, USA, 2010. [citation][year=2010]2. Zibin Zheng, M.R. Lyu, “Optimal Fault Tolerance Strategy Selection for Web Services,” International Journal of Web Service Research (JWSR), Vol. 7, no. 4, pp. 21-40, 2010. [citation][year=2010]3. Anatoliy Gorbenko, “Instability Analysis of Delays Contributing to Web Service Response Time”, Radioelectronic and computer systems, National Aerospace University, Ukraine. Vol. 6, no. 47, 2010. [citation][year=2010]4. Manoj Lall, Lucas Venter, and John van der Poll, “Evaluating the second generation Web services specifications for satisfying non-functional requirements,” World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Orlando, Florida, USA, ISBN: 1-880094-83-5, October 2010. [citation][year=2010]5. Sébastien Salva, Issam Rabhi, “Stateful web service robustness”, Fifth International Conference on Internet and Web Applications and Services, Barcelona, Spain, May 2010. [citation][year=2010]6. Sébastien Salva, Issam Rabhi, “Robustesse des Services Web Persistants,” 8ème Conférence Internationale de MOdélisation et SIMulation (MOSIM 2010), Hammamet, Tunisia: IEEE Computer Society, May 2010. [citation][year=2010]7. Anatoliy Gorbenko, Vyacheslav Kharchenko, Seyran Mamutov, Olga Tarasyuk, Yuhui Chen, and Alexander Romanovsky, “Real Distribution of Response Time Instability in Service-Oriented Architecture”, 29th IEEE Symposium on Reliable Distributed Systems, pp. 92-99, New Delhi, India, November 2010. [citation][year=2009]1. Gorbenko, A., Kharchenko, V., Mamutov, S., Tarasyuk, O., Chen, Y., Romanovsky, “A Real Distribution of Response Time Instability in Service-Oriented Architecture”, CS-TR-1182, Technical Report Series, School of Computing Science, University of Newcastle Upon Tyne, UK, December 2009. [citation][year=2009]2. Zibin Zheng, Michael R. Lyu, “An Adaptive QoS-Aware Fault Tolerance Strategy for Web Services”, Springer Journal of Empirical Software Engineering (EMSE), December 2009. [citation][year=2009]3. Seung Hak Kuk, Hyeon Soo Kim, "Robustness testing framework for Web services composition", IEEE Asia-Pacific Services Computing Conference (APSCC 2009), Singapore, December 2009. [citation][year=2009]4. Marcelo Palma Salas, Eliane Martins, “Metodologia de Testes de Robustez para Segurança em Serviços WEB”, proceedings of the 5o Workshop de Teses de Doutorado em Andamento do IC-UNICAMP, IC-09-026 – Technical Report, Mariana Piquet Dias, Cecília Mary F. Rubira, Rodolfo Jardim de Azevedo, Carla G. N. Macario, Joana E. G. Malaverr, Jefersson Alex dos Santos, Luiz Fernando Bittencourt, Ricardo Caceffo, Roberto Pereira, Vânia Paula de A. Neris (Eds.), September de 2009. [citation][year=2009]5. Zibin Zheng, Michael R. Lyu, “A QoS-Aware Fault Tolerant Middleware for Dependable Service Composition”, The 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Lisbon, Portugal, June 29-July 2, 2009. [citation][year=2009]6. Zibin Zheng, Michael R. Lyu, “A Runtime Dependability Evaluation Framework for Fault Tolerant Web Services”, Workshop on Proactive Failure Avoidance, Recovery and Maintenance, PFARM (jointly organized with The 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009), Lisbon, Portugal, June 29, 2009. [citation][year=2009]7. Sébastien Salva, Issam Rabhi, “Automatic web service robustness testing from WSDL descriptions”, 12th European Workshop on Dependable Computing, EWDC 2009, Toulouse, France, May 14-15, 2009. [citation][year=2009]8. Y. Chen, A. Gorbenko, V. Kharchenko, S. Mamutov, A. Romanovsky, O. Tarasyuk, “Benchmarking Dependability of a System Biology Application”, 14th IEEE International Conference on Engineering of Complex Computer Systems, Potsdam, Germany, June 2009. [citation][year=2008]1. A. Gorbenko, A. Romanovsky, V. Kharchenko, A. Mikhaylichenko, “Experimenting with exception propagation mechanisms in service-oriented architecture”, 4th international Workshop on Exception Handling, WEH’08, Atlanta, Georgia, USA, November 14, 2008. [citation][year=2008]2. Z. Zheng, M.R. Lyu, “A QoS-Aware Middleware for Fault Tolerant Web services”, IEEE International Symposium on Software Reliability Engineering (ISSRE'08), Seattle, USA, November 11-14, 2008. [citation][year=2008]3. A. Gorbenko, V. Kharchenko, O. Tarasyuk, Y. Chen, A. Romanovsky, “The Threat of Uncertainty in Service-Oriented Architecture”, 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems, Newcastle upon Tyne, United Kingdom, November 2008. [citation][year=2008]4. Zibin Zheng, Michael R. Lyu, “A Distributed Replication Strategy Evaluation and Selection Framework for Fault Tolerant Web Services”, IEEE International Conference on Web Services (ICWS'08), Beijing, China, September 23-26, 2008. [citation][year=2008]5. Chen Yuhui, “WS-Mediator for Improving Dependability of Service Composition”, PhD Thesis, CS-TR: 1116 Technical Report Series, School of Computing Science, University of Newcastle Upon Tyne, UK, August 2008. [citation][year=2008]6. Z. Zheng, M.R. Lyu, "WS-DREAM: A Distributed Reliability Assessment Mechanism for Web Services", 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, Anchorage, Alaska, USA, June 24-27, 2008. [publication]Marco Vieira and Laranjeiro, N. , "Comparing Web Services Performance and Recovery in the Presence of Faults", in IEEE 2007 International Conference on Web Services (ICWS 2007), 2007 [citation][year=2013]Guisheng Fan, Huiqun Yu, Liqiong Chen, and Dongmei Liu, “Petri net based techniques for constructing reliable service composition,” Journal of Systems and Software ISSN: 0164-1212 86, no. 4, doi:10.1016/j.jss.2012.11.037: 1089–1106, April 2013. [citation][year=2012]1. Sid Kargupta and Sue Black, “A novel approach for service performance analysis and forecast”, Journal of Web Engineering, Rinton Press, 11, no. 2: 146–176, June 2012. [citation][year=2012]2. Marcelo Invert Palma Salas and Eliane Martins, “Metodologia de Testes de Robustez por Injeção de Falhas para WS-Security”, Technical Report. Anais do VII Workshop de Teses, Dissertações e Trabalhos de Iniciação Científica em Andamento do IC-UNICAMP IC-12-19. Alex Grilo, Ariadne Carvalho, Daniel Cugler, Everton Silva, Gustavo Alkmim, Ivelize Rocha, Leonardo Tampelini, et al. (Eds.), Instituto de Computação, Universidade Estadual de Campinas, June 2012. [citation][year=2012]3. Nik Marsyahariani Nik Daud and W.M.N Wan Kadir, “Systematic mapping study of quality attributes measurement in service oriented architecture”, 8th International Conference on Information Science and Digital Content Technology (ICIDT), 3:626 –631. Vol. 3, June 2012. [citation][year=2012]4. G. M. Tere, R. R. Mudholkar, B. T. Jadhav, “Invoking Web Service using AJAX”, MPGI National Multi Conference 2012, MPGINMC-2012, Nanded, India, April 2012. [citation][year=2012]5. K. Jayashree, Sheila Anand, “Policy Based Distributed Run Time Fault Diagnoser Model for Web Services”, Advances in Computer Science and Information Technology, Computer Science and Information Technology, (Eds. Natarajan Meghanathan, Nabendu Chaki, and Dhinaharan Nagamalai), Heidelberg: Springer Berlin, Berlin, 2012. [citation][year=2012]Marcelo Invert Palma Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Brasil, 7 December 2012. [citation][year=2010]1. Muhammad Sajid Farooq, Muhammad Khalid Khan, Muhammad Qasim Pasta, “Model Based Web Application Backend Testing Using Requirement Specification Table”, Journal of Engineering and Sciences 4, no. 1. Technology Forces, January – June, 2010. [citation][year=2010]2. Nikola Milanovic, “Models, Methods and Tools for Availability Assessment of IT-Services and Business Processes”, PhD Thesis, Technical University of Berlin, May 2010. [citation][year=2010]3. Nikola Milanovic, Bratislav Milic, “Automatic Generation of Service Availability Models”, IEEE Transactions on Services Computing, no. 1, ISSN: 1939-1374, March 2010. [citation][year=2009]1. Vincent Gilbert, “Measuring performance of two Application Servers for Java developed Web Services under heavy loads”, MSc Thesis, Concordia University College of Alberta, Alberta, Canada, May 2009. [citation][year=2009]2. Marcelo Palma Salas, Eliane Martins, “Metodologia de Testes de Robustez para Segurança em Serviços WEB”, proceedings of the 5o Workshop de Teses de Doutorado em Andamento do IC-UNICAMP, IC-09-026 – Technical Report, Mariana Piquet Dias, Cecília Mary F. Rubira, Rodolfo Jardim de Azevedo, Carla G. N. Macario, Joana E. G. Malaverr, Jefersson Alex dos Santos, Luiz Fernando Bittencourt, Ricardo Caceffo, Roberto Pereira, Vânia Paula de A. Neris (Eds.), September 2009. [citation][year=2008]1. Thiago Marçal, “Avaliação de Performance em Composições de Serviços Web”, Technical Report, Departamento de Ciência da Computação, Instituto de Matemática, Universidade Federal da Bahia, Brazil, 2008. [citation][year=2008]2. Li-Der Chou, Yung-Shih Wang, Zih-Hong Chen, “Adaptive Compensation Mechanism Considering the Interaction of SLA and Manages for Web Services Management System”, 2008 International Computer Symposium, ICS2008, November 13-15, 2008. [citation][year=2008]3. Yung-Shih Wang, “Auto-Compensation of SLA-based Web Services Management System”, MSc Thesis, National Central University of Taiwan, 2008. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Correlating security vulnerabilities with software faults (Fast Abstract)", in 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007), 2007 [publication]Costa, A.C. and Marco Vieira and Madeira, H. , "Middleware Support for Time-Elastic Database Applications (Fast Abstract)", in 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007), 2007 [publication]José Fonseca and Marco Vieira and Madeira, H. , "Detecting malicious SQL", in 4th International Conference on Trust, Privacy & Security in Digital Business (in conjunction with the 18th International Conference on Database and Expert Systems Applications (DEXA 2007)), TrusBus\'07, 2007 [citation][year=2013]Manju Khari, Anjali Karar, "Preventing SQL-Based Attacks Using Intrusion Detection System", International Journal of Science and Engineering Applications, Vol. 2 Issue 6, 2013. [citation][year=2013]Sudam Kokane, Aishwarya Jadhav, Nikita Mandhare, Mayur Darekar, "Intrusion Detection in RBAC Model", International Journal of Innovative Reserach & Studies (IJIRS), Vol. 2 Issue 5, May 2013. [citation][year=2013]Gang Lu, Kevin Lü, "Logical Trees: an Essential Method of Parsing SQL Statement withSemantic Analysis", International Journal of Advancements in Computing Technology (IJACT), Vol. 5 No 1, January 2013. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]1. Yakkala V. Naga Manikanta, Anjali Sardana, "Protecting web applications from SQL injection attacks by using framework and database firewall", International Conference on Advances in Computing, Communications and Informatics (ICACCI '12), New York, NY, USA, August 2012. [citation][year=2011]1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Integrated Intrusion Detection in Databases", in Third Latin-American Symposium on Dependable Computing (LADC 2007), 2007 [citation][year=2013]Elisa Costante, Sokratis Vavilis, Sandro Etall, Milan Petkovic, Nicola Zannone, "Database Anomalous Activities: Detection and Quantification", 10th International Conference on Security and Cryptography, SECRYPT 2013, Reykjavík, Iceland, July 29-31, 2013. [citation][year=2013]Sudam Kokane, Aishwarya Jadhav, Nikita Mandhare, Mayur Darekar, "Intrusion Detection in RBAC Model", International Journal of Innovative Reserach & Studies (IJIRS), Vol. 2 Issue 5, May 2013. [citation][year=2012]1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012. [citation][year=2011]A. Rezk, H. Ali, M. El-Mikkawy, S. Barakat, "Minimize the False Positive Rate in a Database Intrusion Detection System", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3 No 5, October 2011. [citation][year=2011]1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011. [citation][year=2011]2. Hua Dai, Xiaolin Qin, Guineng Zheng, Ziyue Li, “SQRM: An Effective Solution to Suspicious Users in Database”, The Third International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2011), St. Maarten, The Netherlands Antilles, January, 2011. [citation][year=2010]Dai Hual, Qin Xiaolin, Li Ziyuel, Sun Libin, Wu Don, "A DBSUIM-Based Suspicious User Isolation Mechanism for Database", Journal of Computer Research and Development, 47(Suppl), 2010. [citation][year=2010]Dai Hua,Qin Xiaolin?Bai Chuanjie, "A Malicious Transaction Detection Method Based on Transaction Template", Journal of computer research and development, 47(5), 2010. [citation][year=2009]Yawei Zhang, Xiaojun Ye, Feng Xie, Yong Peng, "A Practical Database Intrusion Detection System Framework", Ninth IEEE International Conference on Computer and Information Technology, CIT '09, Xiamen, China, October 11-14, 2009. [citation][year=2009]1. Wu, G. Z., Osborn, S. L., Jin, X., “Database Intrusion Detection Using Role Profiling with Role Hierarchy”, 6th VLDB Workshop on Secure Data Management, Lyon, France, August 2009. [citation][year=2009]2. Mohammad Hossein Haratian, “An Architectural Design For a Hybrid Intrusion Detection System for Database”, MSc Thesis, Centre for Advanced Software Engineering (CASE), Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Malaysia, April 2009. [publication]Laranjeiro, N. and Marco Vieira , "Towards Fault Tolerance in Web Services Compositions", in ESEC/FSE 2007 - 2nd International Workshop on Engineering Fault Tolerant Systems (EFTS\'2007), 2007 [citation][year=2013]Amanda S. Nascimento, Cecília M. F. Rubira, Rachel Burrows, and Fernando Castor, “A systematic review of design diversity-based solutions for fault-tolerant SOAs,” Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, 107–118. EASE ’13, New York, NY, USA: ACM, ISBN: 978-1-4503-1848-8, doi:10.1145/2460999.2461015, 2013. [citation][year=2013]B.K. Dhanalakshmi and Arudra, “Sharing The Personal Health Data in the Cloud Using ABE Technique in a Efficient Manner”, Rajiv Gandhi Institute of Technology, India, 2013. [citation][year=2012]1. Jörg Hohwiller, Diethelm Schlegel, and Gregor Engels, “Approaches to Improve Reliability of Service Composition”, Service-Oriented Computing - ICSOC 2011 Workshops, ed. George Pallis, Mohamed Jmaiel, Anis Charfi, Sven Graupner, Yücel Karabulut, Sam Guinea, Florian Rosenberg, Quan Sheng, Cesare Pautasso, and Sonia Ben Mokhtar, 7221:321–332. Vol. 7221. Lecture Notes in Computer Science, Springer Berlin / Heidelberg, ISBN: 978-3-642-31874-0, 2012. [citation][year=2012]2. Jeyeon Oh, Nam Wook CHo, Kim Hoontae, and Suk-ho Kang, “Fault-Tolerant Execution Planning for collaborative Business Processes based on Genetic Algorithms”, International Journal of Innovative Computing, Information and Control 8, no. 7(B): 5265–5275, July 2012. [citation][year=2012]3. Nicolas Bonvin, “Linear Scalability of Distributed Applications”, PhD Thesis, Ecole polytechnique fédérale de Lausanne, February 2012. [citation][year=2011]1. Jonathan Lee, Shang-Pin Ma, Shang-Jie Lee, Chia-Ling Wu, Chiung-Hon Leon Lee, “Towards a High-Availability-Driven Service Composition Framework”, Service Life Cycle Tools and Technologies: Methods, Trends, and Advances, ed. Shang-Pin Ma and Alan Liu, IGI Global, ISBN: 1613501595, November 30, 2011. [citation][year=2011]2. S. Padma and Ananthi Seshasaayee, “Towards Discriminant Analysis Modeling of Web 3.0 Design and Development for Students, Faculty and IT Professionals”, International Journal of Computer Science and Information Security (IJCSIS) 9, no. 9, September 2011. [citation][year=2011]3. S. Padma and Ananthi Seshasaayee, “Towards Maximum Spanning Tree Model in Web 3.0 Design and Development for Students using Discriminant Analysis,” International Journal of Computer Science Issues (IJCSI) Vol. 8 (5) no. 2., September 2011. [citation][year=2011]4. Jonas Buys, Vincenzo De Florio, Chris Blondia, “Towards context-aware adaptive fault tolerance in SOA applications”, 5th ACM international conference on Distributed event-based system, DEBS ’11, New York, NY, USA, July 11-14, 2011. [citation][year=2011]5. Rich Pietravalle and Dan Lanz, “Resiliency Research Snapshot”, Technical Report. 11-3023, MITRE Corporation, June 2011. [citation][year=2011]6. Dong Yang, Lei Liu, and Manuel Bernale Llinares, “A Method for Web Services Fault Tolerance Based on Ripple Effect Analysis,” Key Engineering Materials (Volumes 474 - 476) Advanced Materials and Computer Science, April 2011. [citation][year=2011]7. Nicolas Bonvin, Thanasios Papaioannou, and Karl Aberer, “Autonomic SLA-driven Provisioning for Cloud Applications”, 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Newport Beach, California, USA, May 23-26, 2011. [citation][year=2010]1. Fu-zhi Zhang, Wei-wei Zhao, and Li-na Zhou, “Dependable Web Services Composition Method to Guarantee Response Time,” Journal of Chinese Computer Systems vol. 31, no. 10., 2010. [citation][year=2010]2. Wei-Tek Tsai, Xin Sun, Qihong Shao, and Guanquiu Qi, “Two-Tier Multi-Tenancy Scaling and Load Balancing”, The 2nd International Workshop on Cloud Services (IWCS 2010) - Platform Accelerating e-Business at the IEEE International Conference on e-Business Engineering, ICEBE 2010, Shanghai, China, November 10-12, 2010. [citation][year=2010]3. Nicolas Bonvin, Thanasis Papaioannou, Karl Aberer, “An economic approach for scalable and highly-available distributed applications”, 3rd IEEE International Conference on Cloud Computing, CLOUD 2010, Miami, Florida, USA, July 2010. [citation][year=2010]4. Nicholas May, “Dynamic Service Quality and Resource Negotiation for High-Availability Service-Oriented Systems” International Conference on Software Engineering (ICSE 2010), Cape Town, South Africa, May 2010. [citation][year=2010]5. Yin Ke-ting, Zhou Bo, Zhang Shuai, Xu Bin, Chen Yi-xi, Jiang Dan, “QoS-based bottom-up service replacement for Web service composition,” Journal of Zhejiang University (Engineering Science) 44, no. 4, ISSN: 1008-973X, pp 700-709, April 2010. [citation][year=2009]1. Guisheng Fan, Huiqun Yu, Liqiong Chen, and Dongmei Liu, “A Method for Modeling and Analyzing Fault-Tolerant Service Composition”, 16th Asia-Pacific Software Engineering Conference, APSEC 2009, Penang, Malaysia, December 2009. [citation][year=2009]2. L. Dekar, H. Kheddouci, “A Self-Stabilizing Web Services Communities Management Scheme”, The 5th IEEE International Conference on Signal Image Technology and Internet Based Systems, SETIS2009, Marrakech, Morocco, December 2009. [citation][year=2009]3. Parichat Pasatcha, Khamron Sunat, “Improving reliability for a distributed e-education framework based on the service oriented architecture”, 9th International Symposium on Communication and Information Technology, ISCIT 2009, Incheon, Korea, September 2009. [citation][year=2009]4. Ning-jiang Chen, Pan Lin, "An Adaptive Fault-tolerant Mechanism for Web Services Based on Context Awareness", 2009 4th International Conference on Computer Science & Education (ICCSE 2009), Nanning, China, July 2009. [citation][year=2009]5. N. May, H. Schmidt, and I. Thomas, “Service Redundancy Strategies in Service-Oriented Architectures”, 35th Euromicro SEAA Conference, SEAA 2009, Patras, Greece, 2009. [citation][year=2009]6. Nicholas May, “A Redundancy Protocol for Service-Oriented Architectures,” Service-Oriented Computing – ICSOC 2008 Workshops, Springer-Verlag, 2009. [citation][year=2009]7. Z. Maamar, Q.Z. Sheng, S. Tata, D. Benslimane, and M. Sellami, “Towards an approach to sustain web services high-availability using communities of web services,” International Journal of Web Information Systems, vol. 5, pp. 32 – 55, 2009. [citation][year=2009]8. Sattanathan Subramanian, “Highly-Available Web Service Community”, International Conference on Information Technology: New Generations (ITNG), Las Vegas, USA, April 2009. [citation][year=2008]1. Seung Hak Kuk, Hyeon Soo Kim, Jai-Kyung Lee, and Seong-Whan Park, “Approaches to Improving Reliability in e-Engineering Framework,” IEEE International Conference on Web Services (ICWS 2008), Beijing, China, September 2008. [citation][year=2008]2. Chen Yuhui, “WS-Mediator for Improving Dependability of Service Composition”, PhD Thesis, CS-TR: 1116 Technical Report Series, School of Computing Science, University of Newcastle Upon Tyne, UK, August 2008. [citation][year=2008]3. Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane, “Sustaining Web Services High-Availability Using Communities”, 2008 Third International Conference on Availability, Reliability and Security, ARES 2008, Barcelona, Spain, March 4-7, 2008. [publication]Marco Vieira and Madeira, H. , "Do you know... How to analyze and share results from dependability evaluation experiments? (Tutorial)", in Third Latin-American Symposium on Dependable Computing (LADC 2007), 2007 [publication]Marco Vieira and Laranjeiro, N. and Madeira, H. , "Benchmarking the Robustness of Web Services", in The 13th IEEE Pacific Rim Dependable Computing Conference (PRDC 2007), 2007 [citation][year=2013]Sachin Kumar, Saibal K. Pal, "Customized TDD in Post Trade Automation for Non Expert Workforce", International Journal of Engineering Research & Technology (IJERT), Vol. 2 Issue 9, September 2013. [citation][year=2012]1. Scott Bourne, Claudia Szabo, and QuanZ. Sheng, “Ensuring Well-Formed Conversations between Control and Operational Behaviors of Web Services,” Service-Oriented Computing, ed. Chengfei Liu, Heiko Ludwig, Farouk Toumani, and Qi Yu, 7636:507–515. Vol. 7636. Lecture Notes in Computer Science, Springer Berlin Heidelberg, ISBN: 978-3-642-34320-9. http://dx.doi.org/10.1007/978-3-642-34321-6_34, 2012 [citation][year=2012]2. Quan Z. Sheng, Zakaria Maamar, Lina Yao, Claudia Szabo, and Scott Bourne, “Behavior Modeling and Automated Verification of Web Services,” Information Sciences (Elsevier), 2012. [citation][year=2012]3. Ali Shahrokni, Robert Feldt, “A Systematic Review of Software Robustness”, Information and Software Technology (Elsevier), ISSN 0950-5849, June 2012. [citation][year=2012]4. Marcelo Invert Palma Salas and Eliane Martins, “Metodologia de Testes de Robustez por Injeção de Falhas para WS-Security”, Technical Report. Anais do VII Workshop de Teses, Dissertações e Trabalhos de Iniciação Científica em Andamento do IC-UNICAMP IC-12-19. Alex Grilo, Ariadne Carvalho, Daniel Cugler, Everton Silva, Gustavo Alkmim, Ivelize Rocha, Leonardo Tampelini, et al. (Eds.), Instituto de Computação, Universidade Estadual de Campinas, June 2012. [citation][year=2011]1. Lina Bentakouk, “Test symbolique de services Web composites”, PhD Thesis, Université Paris-Sud XI, France, 16 December 2011. [citation][year=2011]2. Paulo Véras, “Benchmarking Software Requirements Documentation for Space Application”, PhD Thesis, Instituto Tecnológico de Aeronáutica, São José dos Campos, SP, Brasil, 2011. [citation][year=2011]3. Mustafa Bozkurt, Mark Harman, “Automatically Generating Realistic Test Input From Web Services”, The 6th IEEE Symposium on Service-Oriented System Engineering, Irvine, CA, USA, December 12-14, 2011. [citation][year=2011]4. Sammer Hanna, Amer AbuAli, “Platform Effect on Web Services Robustness Testing”, Journal of Applied Sciences 11, no. 2, 360-366, 2011. [citation][year=2011]5. André Willik Valenti, “Testes de Robustez em Web Services por meio de Injeção de Falhas”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), July 2011. [citation][year=2011]6. Mustafa Bozkurt, Mark Harman, “Generating Realistic Test Input Using Web Services”, Research Note. RN/11/17, Department of Computer Science, University College London, July 2011. [citation][year=2010]1. André Willik Valenti, Willian Yabusame Maja, Eliane Martins, Fayçal Bessayah, Ana Cavalli, “WSInject: A Fault Injection Tool for Web Services”, Technical Report - IC-10-22, Instituto de Computação, Universidade Estadual de Campinas, Campinas, Brazil, July 2010. [citation][year=2010]2. Garth Heward, Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg, “Assessing the Performance Impact of Service Monitoring”, 21st Australian Software Engineering Conference, Auckland, New Zealand, April 2010. [citation][year=2010]3. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing Web Services: A Survey", Department of Computer Science, King's College London, UK, TR-10-01, January 2010. [citation][year=2009]1. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing & Verification in Service-Oriented Architecture: A Survey", Software Testing, Verification and Reliability (STVR), Issn: 1099-1689, Wiley InterScience, 2009. [citation][year=2009]2. Karthik Pattabiraman, Benjamin Zorn, “DoDOM: Leveraging DOM Invariants for Web 2.0 Application Reliability”, Technical Report, Microsoft Research - Redmond, USA, 2009. [citation][year=2009]3. Francis Tam, “Service Availability Standards for Carrier-Grade Platforms: Creation and Deployment in Mobile Networks”, PhD Thesis, Tampere University of Technology, Finland, 2009. [citation][year=2009]4. Marcelo Palma Salas, Eliane Martins, “Metodologia de Testes de Robustez para Segurança em Serviços WEB”, proceedings of the 5o Workshop de Teses de Doutorado em Andamento do IC-UNICAMP, IC-09-026 – Technical Report, Mariana Piquet Dias, Cecília Mary F. Rubira, Rodolfo Jardim de Azevedo, Carla G. N. Macario, Joana E. G. Malaverr, Jefersson Alex dos Santos, Luiz Fernando Bittencourt, Ricardo Caceffo, Roberto Pereira, Vânia Paula de A. Neris (Eds.), September de 2009. [citation][year=2008]Kaiou Wang, “Improving the Reliability of Web Service Based Workflows”, MSc Thesis, University of York, UK, 2008. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks", in 13th IEEE Pacific Rim Dependable Computing Conference (PRDC 2007), 2007 [citation][year=2013]N. Awang and A. Manaf, “Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing,” in Advances in Security of Information and Communication Networks, vol. 381, A. Awad, A. Hassanien, and K. Baba, Eds. Springer Berlin Heidelberg, 2013. [citation][year=2013]P. Santhosh Reddy, G.Sireesha, "Automated Security Test by using Formal Threat Models on Leakage Detection", International Journal of Advanced and Innovative Research (IJAIR), Vol. 2 Issue 2, 2013. [citation][year=2013]Prashant Belhekar, Alka Londhe, Bhavana Lucy, Santosh Kumar, "Finding Bugs In Web Applications Using Dynamic Test Generation", International Journal of Engineering Research & Technology (IJERT), Vol. 2 Issue 5, May 2013. [citation][year=2013]Michelle Elaine Ruse, "Model checking techniques for vulnerability analysis of Web applications", PhD Thesis, Iowa State University, Ames, Iowa, 2013. [citation][year=2013]Eric Alata, Mohamed Kaaniche, Vincent Nicomette, Rim Akrout, "An Automated Approach to Generate Web Applications Attack Scenarios", Sixth Latin-American Symposium on Dependable Computing, LADC 2013, Rio de Janeiro, RJ, Brazil, April 1-5 2013. [citation][year=2013]Pallavali Radha, G. Sireesha, "Security Test by Using FTM and Data Allocation Strategies on Leakage Detection", International Journal Of Coputers & Technology, Vol. 4 No 2, March 2013. [citation][year=2013]Hannes Holm, Mathias Ekstedt, Teodor Sommestad, "Effort Estimates on Web Application Vulnerability Discovery", 46th Hawaii International Conference on System Sciences, HICSS 2013, January 7-10 2013. [citation][year=2013]A. Marback, H. Do, K. He, s. Kondamarri, D. Xu, "A threat model-based approach to security testing", Software: Practice and Experience, Vol. 43 Issue 2, February 2013. [citation][year=2012]Sanon Chimmanee, Thanyada Veeraprasit, Kritsada Sriphaew, Aniwat Hemanidhi, "A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus", Recent Advances in Communications, Circuits and Technological Innovation, Paris, France, December 2-4, 2012. [citation][year=2012]D. N. Swetha, B. S. Kumar, “Protocol Based Approach on Vulnerability Detection Tools of SQLIA along with Monitoring Tools”, International Journal of Computer Science Engineering and Technology (IJCSET), vol. 2, no. 11, November 2012. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]T. Koskinen, P. Ihantola, V. Karavirta, "Quality of WordPress Plug-Ins: An Overview of Security and User Ratings", International Conference on Privacy, Security, Risk and Trust and International Conference on Social Computing, PASSAT 2012 and SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012. [citation][year=2012]D. Hauzar, J. Kofron, "On Security Analysis of PHP Web Applications", IEEE 36th Annual Computer Software and Applications Conference Workshops, COMPSACW 2012, Izmir, Turkey, July 16-20, 2012. [citation][year=2012]Douglas Rocha, Diego Kreutz, Rogerio Turchetti, "A free and extensible tool to detect vulnerabilities in Web systems", 2012 7th Iberian Conference on Information Systems and Technologies, CISTI 2012, Madrid, Spain, June 2012. [citation][year=2012]Mike Samuel, Úlfar Erlingsson, "Let's parse to prevent pwnage", 5th USENIX conference on Large-Scale Exploits and Emergent Threats, LEET'12, San Jose, CA, USA, April 2012. [citation][year=2012]D. Xu, M. Tu, M. Sanford, L. Thomas, D. Woodraska, W. Xu, "Automated Security Test Generation with Formal Threat Models", IEEE Transactions on Dependable and Secure Computing, TSC, ISSN: 1545-5971, Issue:99, February 2012. [citation][year=2011]A. Dessiatnikoff, R. Akrout, E. Alata, M. Kaaniche, V. Nicomette, “A Clustering Approach for Web Vulnerabilities Detection", 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC 2011), Pasadena, CA, USA, December 2011. [citation][year=2011]Nidal Khoury, Pavol Zavarsky, Dale Lindskog Ron Ruhl, "Testing and assessing web vulnerability scanners for persistent SQL injection attacks", First International Workshop on Security and Privacy Preserving in e-Societies (SeceS '11), New York, NY, USA, 2011. [citation][year=2011]D. Hauzar, J. Kofron, “Hunting Bugs Inside Web Applications”, Formal Verification of Object-Oriented Software, Technical report, Department of Informatics, KIT, October 2011. [citation][year=2011]Zhushou Tang, Haojin Zhu, Zhenfu Cao, Shuai Zhao, "L-WMxD: Lexical based Webmail XSS Discoverer", 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011, Hyannis, MA, USA, October 10-12, 2011. [citation][year=2011]N. Khoury, P. Zavarsky, D. Lindskog, R. Ruhl, "An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection", 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT 2011) and 2011 IEEE Third International Conference on Social Computing (SOCIALCOM 2011), Boston, USA, October 2011. [citation][year=2011]Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]Birhanu Eshete, Komminist Weldemariam, Adolfo Villafiorita, “Early Detection of Security Misconfiguration Vulnerabilities in Web Applications”, Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011. [citation][year=2011]Sangita Roy, Avinash Kumar Singh, Ashok Singh Sairam, "Detecting and Defeating SQL Injection Attacks", International Journal of Information and Electronics Engineering, Vol. 1 , No. 1, July 2011. [citation][year=2011]Thomas, L., Weifeng Xu, Dianxiang Xu, "Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing", IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 184 - 189, Minuch, Germany, July, 2011. [citation][year=2011]Daniel Woodraska, Michael Sanford, Dianxiang Xu, “Security mutation testing of the FileZilla FTP server”, 2011 ACM Symposium on Applied Computing, ACM SAC '11, Taichung, Taiwan, March 21-24, 2011. [citation][year=2011]Geert Smelt, “Programming web applications securely”, BSc Thesis, Faculty of Science, Radboud University of Nijmegen, Nijmegen, Netherlands, January 2011. [citation][year=2010]Dmitri Nikulin, "Assertions For Self-Testing Web Applications", Faculty of Information Technology - Monash University, Clayton, Victoria, Australia, 2010. [citation][year=2010]Huning Dai, Michael Glass, E. Gail Kaiser, "Baseline: Metrics for setting a baseline for web vulnerability scanners", Technical Report, CUCS-023-10, Columbia University, New York, NY, 2010. [citation][year=2010]P. Roberts-Morpeth, J. Ellman, "Some security issues for web based frameworks", 2010 7th International Symposium on Communication Systems Networks and Digital Signal Processing, CSNDSP 2010, New Castle, UK, July 2010 [citation][year=2010]Shahriar, M. Zulkernine, “Mitigating Program Security Vulnerabilities: Approaches and Challenges”, ACM Computing Surveys, ACM, 2010. [citation][year=2010]D.A. Shelly, “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners”, MSc Thesis, Virginia Polytechnic Institute and State University, July 2010. [citation][year=2010]Tânia Basso, Plínio César Simões Fernandes, Mario Jino, Regina Moraes, “Analysis of the Effect of Java Software Faults on Security Vulnerabilities and Their Detection by Commercial Web Vulnerability Scanner Tool”, 4th Workshop on Recent Advances on Intrusion-Tolerant Systems, WRAITS 2010, in conjunction with The 40th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), Chicago, IL, USA, 2010. [citation][year=2010]Muhammad Sajid Farooq, Muhammad Khalid Khan, Muhammad Qasim Pasta, “Model Based Web Application Backend Testing Using Requirement Specification Table”, Journal of Engineering and Sciences 4, no. 1. Technology Forces, January – June, 2010. [citation][year=2010]Hossain Shahriar, “Mitigating and Monitoring Program Security Vulnerabilities”, PhD Thesis, School of Computing - Queen’s University, Kingston, Ontario, Canada, June 2010. [citation][year=2010]J. Bau, E. Bursztein, D. Gupta, J.C. Mitchell, “State of the Art: Automated Black-Box Web Application Vulnerability Testing”, Proceedings IEEE Symposium on Security and Privacy, May 2010. [citation][year=2010]Tania Basso, Regina L. O. Moraes, Mario Jino, "A Methodology for Effectiveness Analysis of Vulnerability Scanning Tools", III EADCA - Terceiro Encontro dos Alunos e Docentes do Departamento de Engenharia de Computação e Automação Industrial, University of Campinas (UNICAMP), Brazil, March 2010. [citation][year=2009]1. Shahriar, H., Zulkernine, M. “MUTEC: Mutation-based testing of Cross Site Scripting”, 2009 ICSE Workshop on Software Engineering For Secure Systems, International Conference on Software Engineering, Vancouver, Canada, May 19, 2009. [citation][year=2009]2. H. Shahriar, M. Zulkernine, “Automatic Testing of Program Security Vulnerabilities", 1st IEEE International Workshop on Test Automation, 2009 33rd Annual IEEE International Computer Software and Applications Conference, IEEE CS Press, Seattle, USA, July 2009. [citation][year=2008]1. Jagdish Halde, "SQL Injection analysis, Detection and Prevention", MSc Thesis, Department of Computer Science, San Jose State University, San Jose, CA, USA, 2008. [publication]Lopes, P. and Santos, J. and Paulo Gomes and Marco Vieira and Cortesão, L. , "SAID: A Business Intelligent Tool based on Open Source", in EPIA 2007 - Portuguese Conference on Artificial Intelligence., 2007 2006(2 publications) [publication]Marco Vieira and Costa, A.C. and Madeira, H. , "Towards Timely ACID Transactions in DBMS (Short Paper)", in The IEEE 12th International Symposium Pacific Rim Dependable Computing (PRDC 2006), 2006 [citation][year=2010]1. Adnan Gohar, “Analyzing Service Oriented Architecture (SOA) in Open Source Products”, Master Thesis in Software Engineering, School of Innovation, Design and Engineering (IDT), Mälardalen University, Sweden, October 2010. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Monitoring Database Application Behavior for Intrusion Detection (Short Paper)", in The IEEE 12th International Symposium Pacific Rim Dependable Computing (PRDC 2006), 2006 [citation][year=2011]1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011. [citation][year=2010]1. Yi Hu, Brajendra Panda, "Mining Inter-transaction Data Dependencies for Database Intrusion Detection", Innovations and Advances in Computer Sciences and Engineering, Springer Netherlands, ISBN978-90-481-3657-5, March 2010. [citation][year=2009]1. Mohammad Hossein Haratian, “An Architectural Design For a Hybrid Intrusion Detection System for Database”, MSc Thesis, Centre for Advanced Software Engineering (CASE), Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Malaysia, April 2009. [citation][year=2007]Clay Brockman, "Why Monitoring Database Application Behavior is the Best Database Intrusion Detection Method", Position Paper - ITK 478: Fall 2007, Illinois State University, 2007. 2005(5 publications) [publication]Pintér, G. and Madeira, H. and Marco Vieira and Pataricza, A. and Majzik, I. , "A Data Mining Approach to Identify Key Factors in Dependability Experiments", in Fifth European Dependable Computing Conference (EDCC-5), 2005 [citation][year=2013]Matthew Leeke, Arshad Jhumka, Sarabjot Singh Anand, "Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors", The Computer Journal, 56 (6), 2013. [citation][year=2011]1. Matthew Leeke, Saima Arif, Arshad Jhumka, Sarabjot Singh Anand , “A Methodology for the Generation of Efficient Error Detection Mechanisms”, 41st IEEE/IFIP International Conference on Dependable Systems and Networks, DSN'11, Hong Kong, China, June 27-30, 2011. [citation][year=2010]1. Piotr Gawkowski, Monika A. Kuczy?ska, Agnieszka Komorowska, "Fault Effects Analysis and Reporting System for Dependability Evaluation", Seventh International Conference on Rough Sets and Current Trends in Computing, RSCTC 2010, Warsaw, Poland, June 2010. [citation][year=2007]1. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]2. Domenico Cotroneo, Roberto Pietrantuono, Leonardo Mariani, Fabrizio Pastore, “Investigation of failure causes in workload-driven reliability testing”, Foundations of Software Engineering archive, Fourth international workshop on Software quality assurance: in conjunction with the 6th ESEC/FSE joint meeting, Dubrovnik, Croatia, 2007. [citation][year=2006]1. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2006. [publication]Marco Vieira and Madeira, H. , "Towards a security benchmark for Database Management Systems", in IEEE/IFIP International Conference on Dependable Systems and Networks, DSN2005, 2005 [citation][year=2011]1. Rich Pietravalle and Dan Lanz, “Resiliency Research Snapshot”, Technical Report. 11-3023, MITRE Corporation, June 2011. [citation][year=2008]YE Xiao-jun, WANG Jian-min, "Design of Database System Dependability Benchmarking Tools", Computer Science Journal, 35(8), 2008. [citation][year=2007]1. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December de 2007. [citation][year=2006]Randy Robertson, "In Support of Security Standards for Organizations", Position Paper - ITK 478: Fall 2006, Illinois State University, 2006. [citation][year=2006]1. J. Saul Gonzalez-Campos, “Secure Groups: Enhanced Management of Encrypted Data in Databases”, Seventh Mexican International Conference on Computer Science, ENC '06, September 2006. [citation][year=2006]2. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2006. [publication]Marco Vieira and Costa, A.C. and Madeira, H. , "TACID Transactions", in 1st Workshop on Hot Topics in System Dependability (HotDep-05), 2005 [citation][year=2007]2. Raul Barbosa, “An Essay on Real-Time Databases”, Department of Computer Science and Engineering, Chalmers University of Technology, Göteborg, Sweden, January 2007. [citation][year=2007]1. John D. McGregor, Tacksoo Im, “A Qualitative Approach to Dependability Engineering”, Dagstuhl Seminar, Germany, January 2007. [publication]Marco Vieira and Madeira, H. , "Detection of malicious transactions in DBMS", in The 11th IEEE International Symposium Pacific Rim Dependable Computing, PRDC2005, 2005 [citation][year=2013]Sudam Kokane, Aishwarya Jadhav, Nikita Mandhare, Mayur Darekar, "Intrusion Detection in RBAC Model", International Journal of Innovative Reserach & Studies (IJIRS), Vol. 2 Issue 5, May 2013. [citation][year=2013]Gang Lu, Kevin Lü, "Logical Trees: an Essential Method of Parsing SQL Statement withSemantic Analysis", International Journal of Advancements in Computing Technology (IJACT), Vol. 5 No 1, January 2013. [citation][year=2012]Y. A. Rathod, M. B. Chaudhari, G. B. Jethava, "Database intrusion detection by transaction signature", Third International Conference on Computing Communication & Networking Technologies, ICCCNT 2012, Tamilnadu, India, July 26-28, 2012. [citation][year=2012]1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012. [citation][year=2011]1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011. [citation][year=2011]2. Udai Pratap Rao, Dhiren R. Patel, "Database Security Architecture for Detection of Malicious Transactions in Database", The 2011 International Conference on Security & Management, SAM 2011, Las Vegas Nevada, USA, July 2011. [citation][year=2010]Dai Hua,Qin Xiaolin?Bai Chuanjie, "AMalicious Transaction Detection Method Based on Transaction Template", Journal of computer research and development, 47(5), 2010. [citation][year=2010]Chen Changqing, Liu Xiaofeng, Liu Yunsheng, Pei Xiaobing, Zhou Heng, "Architectures for Intrusion Tolerant Real-Time Database System", Journal of Computer Research and Development, 47 (Suppl), 2010. [citation][year=2010]Yunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh Bastani, "Cloud Storage Design Based on Hybrid of Replication and Data Partitioning", 2010 IEEE 16th International Conference on Parallel and Distributed Systems, ICPADS 2010, Shangai, China, December 2010. [citation][year=2010]Yunqi Ye, Liangliang Xiao, I-Ling Yen, F. Bastani, "Secure, Dependable, and High Performance Cloud Storage", 2010 29th IEEE Symposium on Reliable Distributed Systems, SRDS 2010, New Delhi, India, November 2010. [citation][year=2010]Udai Pratap Rao, G. J. Sahani, Dhiren R. Patel, “Machine Learning Proposed Approach for Detecting Database Intrusions in RBAC Enabled Databases”, Second International Conference on Computing, Communication and Networking Technologies, ICCCNT10, Karur, Tamilnadu, India, July 2010. [citation][year=2010]Udai Pratap Rao,G. J. Sahani, Dhiren R. Patel, “Clustering Based Machine Learning Approach for Detecting Database Intrusions in RBAC Enabled Databases”, International Journal of Computer and Network Security, IJCNS, Vol.2, No.6, June 2010. [citation][year=2010]Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene-Ayachi, "An access control model for web databases", 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, DBSec'10, Rome, Italy, June 2010. [citation][year=2009]Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li, "Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation", Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009 (in conjunction with ICEIS 2009), Milan, Italy, May 2009. [citation][year=2009]1. Himanshu Gahlaut, “Prevention of Malicious Transactions in Database Management Systems”, BSc Thesis, Department of Computer Science and Engineering – National Institute of Technology, Rourkela, India, May 2009. [citation][year=2008]CAI Min, YE Zhen, "Design of a model of database intrusion detection", Journal Of Hefei University Of Technology (Natural Science), 31(4), 2008. [citation][year=2007]Clay Brockman, "Why Monitoring Database Application Behavior is the Best Database Intrusion Detection Method", Position Paper - ITK 478: Fall 2007, Illinois State University, 2007. [citation][year=2007]1. Jinfu Chen, Yansheng Lu, Xiaodong Xie, “An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions”, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, September 2007. [publication]Mario Zenha-Rela and Marco Vieira and Cunha, J.C. and Joao Duraes , "Dependability Evaluation of Mobile Devices' System Software (Fast Abstract)", in IEEE/IFIP International Conference on Dependable Systems and Networks, DSN2005, 2005 2004(4 publications) [publication]Marco Vieira and Madeira, H. , "Portable Faultloads Based on Operator Faults for DBMS Dependability Benchmarking", in The 28th Annual International Computer Software and Applications Conference, COMPSAC 2004, 2004 [citation][year=2013]Mohamed Helmy Khafagy, "Agent-Based Software Fault Tolerance to Highly Improve Database Availability", PhD Thesis, Helwan University, Egypt, 2013. [citation][year=2008]1. Kimberly Keeton, Arif Merchant, john Wilkes, “System and method for interposition-based selective simulation of faults for access requests to a data storage system", United States Patent 7467333, December 2008. [citation][year=2007]1. Andréas Johansson, “Robustness Evaluation of Operating Systems”, PhD Thesis, Vom Fachbereich Informatik der Technischen Universit, University of Darmstad, Germany, 2007. [publication]Joao Duraes and Marco Vieira and Madeira, H. , "Dependability Benchmarking of Web-Servers", in The 23rd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2004, 2004 [citation][year=2012]1. Amit Sangroya, Damián Serrano, Sara Bouchenak, "Benchmarking Dependability of MapReduce Systems", 31st IEEE International Symposium on Reliable Distributed Systems, Irvine, CA, USA, October 2012. [citation][year=2012]2. Hajime Fujita, Yutaka Matsuno, Toshihiro Hanawa, Mitsuhisa Sato, Shinpei Kato, Yutaka Ishikawa, "DS-Bench Toolset: Tools for dependability benchmarking with simulation and assurance", 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, USA, June 2012. [citation][year=2012]3. Anatoliy Gorbenko, Vyacheslav Kharchenko, Seyran Mamutov, Olga Tarasyuk, Alexander Romanovsky, “Exploring Uncertainty of Delays as a Factor in End-to-End Cloud Response Time”, 9th European Dependable Computing Conference (EDCC 2012), Sibiu, Romenia, May 2012. [citation][year=2012]4. Yuhui Chen, Anatoliy Gorbenko, Vyacheslav Kharchenko, and Alexander Romanovsky, “Measuring and Dealing with the Uncertainty of SOA Solutions,” Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, ed. Valeria Cardellini, Emiliano Casalichio, Kalinka Castelo Branco, Júlio Cezar Estrella, and Francisco José Monaco, IGI Global, ISBN: 1609607945, 2012. [citation][year=2011]1. Paulo Véras, “Benchmarking Software Requirements Documentation for Space Application”, PhD Thesis, Instituto Tecnológico de Aeronáutica, São José dos Campos, SP, Brasil, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2009]1. Gustavo M. D. Vieira, Willy Zwaenepoel, Luis E. Buzato, “Dynamic Content Web Applications: Crash, Failover, and Recovery Analysis”, The 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Lisbon, Portugal, June 29-July 2, 2009. [citation][year=2009]2. Y. Chen, A. Gorbenko, V. Kharchenko, S. Mamutov, A. Romanovsky, O. Tarasyuk, “Benchmarking Dependability of a System Biology Application”, 14th IEEE International Conference on Engineering of Complex Computer Systems, Potsdam, Germany, June 2009. [citation][year=2008]1. Bailey, D., Frank-Schultz, E., Lindeque, P., Temple, J. L., "Three reliability engineering techniques and their application to evaluating the availability of IT systems : An introduction", IBM Systems Journal, ISSN 0018-8670, Vol. 47, no4, 2008. [citation][year=2008]2. A. Gorbenko, V. Kharchenko, O. Tarasyuk, Y. Chen, A. Romanovsky, “The Threat of Uncertainty in Service-Oriented Architecture”, 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems, Newcastle upon Tyne, United Kingdom, November 2008. [citation][year=2008]3. A. Gorbenko, A. Romanovsky, V. Kharchenko, A. Mikhaylichenko, “Experimenting with exception propagation mechanisms in service-oriented architecture”, 4th international Workshop on Exception Handling, WEH’08, Atlanta, Georgia, November 14, 2008. [citation][year=2007]1. Gergely Pintér, “Model Based Program Synthesis and Runtime Error Detection for Dependable Embedded Systems”, PhD Thesis, Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary, 2007. [citation][year=2006]1. L. Strigini et al., “Resilience-Building Technologies: State of Knowledge – ReSIST NoE Deliverable D12”, deliverable of the project: ReSIST: Resilience for Survivability in IST - A European Network of Excellence (ReSIST: Contract Number: 026764), September 2006. [citation][year=2006]2. S Tixeuil, LM Silva, W Hoarau, “An Overview of Existing Tools for Fault-Injection and Dependability Benchmarking in Grids”, Second CoreGRID Workshop on Grid and Peer to Peer Systems, 2006. [citation][year=2005]1. Rogério de Lemos, “Architecting Web Services Applications for Improving Availability”, Lecture Notes in Computer Science, Architecting Dependable Systems III, Springer, ISSN 0302-9743 (Print) 1611-3349 (Online), Volume 3549/2005, 2005. [citation][year=2005]2. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [publication]Marco Vieira and Costa, A.C. and Madeira, H. , "Timely ACID Transactions in DBMS (Fast Abstract)", in The International Conference on Dependable Systems and Networks, DSN-2004, 2004 [citation][year=2009]1. M. Rallapalli, "Managing and Achieving Process Integrity in SOA", Second International Conference on Computer and Electrical Engineering, ICCEE '09, Dubai, UAE, December 28-30, 2009. [publication]Marco Vieira and Joao Duraes and Madeira, H. , "How to Specify Dependability Benchmarks for OLTP Application Environments", in IX Conference on Software Engineering and Databases (JISBD 2004), 2004 [citation][year=2007]1. Karsten Wolke, Higher Availability of Services in Heterogeneous Distributed Systems, PhD Thesis, De Montfort University, Leicester, UK, October 2007. 2003(5 publications) [publication]Marco Vieira and Madeira, H. , "Benchmarking the Dependability of Different OLTP Systems", in International Conference on Dependable Systems and Networks, DSN-DCC 2003, 2003 [citation][year=2013]Anna Lanzaro, Roberto Natella, Ricardo Barbosa, "Tools for Injecting Software Faults at the Binary and Source-Code Level", Innovative Technologies for Dependable OTS-Based Critical Systems, 2013. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2009]1. Young Jun Cho, Yun Chan Cho, Jae Wook Jeon, "D-Bus based user device driver framework design for Linux mobile software platform", IEEE International Symposium on Industrial Electronics (ISIE 2009), Seoul, Korea, July 2009. [citation][year=2008]1. Gustavo M. D. Vieira, Willy Zwaenepoel, Luiz E. Buzato, “Dynamic Content Web Applications: Crash, Failover, and Recovery Analysis”, Technical Report - IC-08-34, Instituto de Computacão, University of Campinas, Campinas, Brazil, December 2008. [citation][year=2008]2. Arnaud Albinet, Jean Arlat, Jean-Charles Fabre, “Benchmarking the Impact of Faulty Drivers: Application to the Linux Kernel”, Dependability Benchmarking for Computer Systems, Lisa Spainhower & Karama Kanoun Eds., August 2008. [citation][year=2008]Kamalendu Majumdar, "Designing of Bibliographical Data-Base Management System: An Object Oriented Approach", PhD Thesis, Guru Ghasidas University, Bilaspur(CG), India, 2008. [citation][year=2006]1. L. Strigini et al., “Resilience-Building Technologies: State of Knowledge – ReSIST NoE Deliverable D12”, deliverable of the project: ReSIST: Resilience for Survivability in IST - A European Network of Excellence (ReSIST: Contract Number: 026764), September 2006. [citation][year=2005]1. Ricardo Gimenes, “Avaliação da Confiabilidade da Informação Utilizada em Sistemas de Informação e em Sistemas Críticos”, MSc Thesis, University of São Paulo, São Paulo, Brazil, 2005. [citation][year=2005]2. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [citation][year=2005]3. Richard Elling, “Availability Benchmarking”, RAS Engineering Group, Performance and Availability Engineering, Sun Microsystems, Inc., 2005. [citation][year=2005]4. Cristian Constantinescu, “Dependability Benchmarking Using Environmental Test Tools”, Proceedings of IEEE Reliability and Maintainability Symposium, RAMS 2005, January 24-27, 2005. [citation][year=2004]1. Ali Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, “Benchmarking Operating System Dependability: Windows 2000 as a Case Study”, 10th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC2004, Papeete, Tahiti, French Polynesia, March 3-5, 2004. [citation][year=2004]2. Arnaud Albinet, Jean Arlat, Jean-Charles Fabre, “Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2004]3. Dong Tang, Dileep Kumar, Sreeram Duvur, Oystein Torbjornsen, “Availability Measurement and Modelling for An Application Server”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2004]4. A. Romanovsky et al., “CaberNet Vision of Research and Technology Development in Distributed and Dependable Systems”, Network of Excellence in Distributed and Dependable Computing Systems, IST Contract No. IST-2000-25088, January 2004. [citation][year=2003]1. Aaron Brown, “A Recovery-Oriented Approach to Dependable Services: Repairing Past Errors with System-Wide Undo”, PhD Thesis, EECS Computer Science Division - University of California, Berkeley, California, USA, December 2003. [publication]Madeira, H. and Costa, J.P. and Marco Vieira , "The OLAP and Data Warehousing Approaches for Analysis and Sharing of Results from Dependability Evaluation Experiments", in International Conference on Dependable Systems and Networks, DSN-DCC 2003, 2003 [citation][year=2013]Truong Minh Thai, Frédéric Amblard, Benoit Gaudou, "Combination Framework of BI solution & Multi-agent platform (CFBM) for multi-agent based simulations", 13e Conférence Francophone sur l'Extraction et la Gestion de Connaissances, EGC'2013, Toulouse, France, January 29, 2013. [citation][year=2013]A. Bondavalli, F. Brancati, A. Flammini, S. Rinaldi, "Master Failure Detection Protocol in Internal Synchronization Environment", IEEE Transactions on Instrumentation and Measurement, vol.PP, no.99, January 2013. [citation][year=2011]1. A. Bondavalli, F. Brancati, F., A. Flammini, S. Rinaldi, S., "A Reliable and Self-Aware Clock for reference time failure detection in internal synchronization environment", 2011 IEEE International Workshop on Measurements and Networking (M&N), Anacapri, Italy, October 2011. [citation][year=2011]2. A. Bovenzi, S. Russo, F. Brancati, A. Bondavalli, "Towards identifying OS-level anomalies to detect application software failures", 2011 IEEE International Workshop on Measurements and Networking (M&N), Anacapri, Italy, October 2011. [citation][year=2011]3. Antonio Bovenzi, Francesco Brancati, Stefano Russo, Andrea Bondavalli, "A Statistical Anomaly-Based Algorithm for On-line Fault Detection in Complex Software Critical Systems", 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, Naples, Italy, September 2011. [citation][year=2011]Dimara Kusuma Hakim, "Development of License Report Application with Online Analytical Processing", Jurnal Informatika, JUITA, Vol. 1 N0. 3, 2011. [citation][year=2010]1. Andrea Bondavalli, Andrea Ceccarelli, Paolo Lollini, “Architecting and validating dependable systems: experiences and visions”, Architecting dependable systems VII, (Antonio Casimiro, Rogério de Lemos, and Cristina Gacek Eds.), Springer-Verlag, 2010. [citation][year=2010]2. F. Brancati, A. Bondavalli, "Practical Aspects in Analyzing and Sharing the Results of Experimental Evaluation", 29th IEEE Symposium on Reliable Distributed Systems, SRDS 2010, New Delhi, india, October 31 - November 03, 2010 [citation][year=2010]3. Piotr Gawkowski, Monika A. Kuczy?ska, Agnieszka Komorowska, "Fault Effects Analysis and Reporting System for Dependability Evaluation", Seventh International Conference on Rough Sets and Current Trends in Computing, RSCTC 2010, Warsaw, Poland, June 2010. [citation][year=2010]4. P. Sendín-Raña, E. Rodríguez-Fernández, F. J. González-Castaño, E. Costa-Montenegro, P. S. Rodríguez-Hernãndez, J. M. Pousada-Carballo, J. C. Burguillo-Rial, “Web-oriented business intelligence solution based on Associative Query Logic”, Software: Practice and Experience, Vol. 40, No 9, pg. 779-796, 2010. [citation][year=2010]5. A. Bondavalli, A. Ceccarelli, L. Falai, M. Vadursi, “A new approach and a related tool for dependability measurements on distributed systems”, IEEE Transactions on Instrumentation and Measurements 2010, 2010. [citation][year=2009]Andrea Ceccarelli, Andrea Bondavalli, Danilo Iovino, "Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection", 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC'09, Shanghai, China, November 2009. [citation][year=2009]János Oláh, István Majzik, "A Model Based Framework for Specifying and Executing Fault Injection Experiments", 2009 Fourth International Conference on Dependability of Computer Systems, 2009. [citation][year=2009]Pablo Sendín-Raña, Francisco J. González-Castaño, Enrique Pérez-Barros, Pedro S. Rodríguez-Hernández, Felipe Gil-Castiñeira, José M. Pousada-Carballo, “Improving the performance and functionality of Mondrian open-source OLAP systems”, Software: Practice and Experience, Vol. 39 N. 3, pg. 279-298, John Wiley & Sons, Ltd, 2009. [citation][year=2009]Li Xiao-gen, Wang Zong-minl, Huang Zhi-quan, "Visualization of large scene watershed model in real-time and interactive manner based on cache technique", Application Research of Computers, Vol. 26 No. 4, April 2009. [citation][year=2009]Yuan Zheng-wu, Zhao Rui-jing, Zhu Zhi-hui, “Reserach of indoor positioning method based on ray-tracing”, Application Reserach of Computers, Vol. 26 No. 4, April 2009. [citation][year=2008]Andrea Ceccarelli, Danilo Iovino, Andrea Bondavalli, “A Fault Injection Tool for Trustworthy, Comparative Measurements and Analysis”, SRDS 2008 Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (jointly organized with the 27th International Symposium on Reliable Distributed Systems, IEEE SRDS 2008), Naples, Italy, October 5, 2008. [citation][year=2008]Lorenzo Falai, Andrea Bondavalli, “RODS: General Framework for Rigorous Observation of Distributed Systems”, DSN 2008 Workshop on Resilience Assessment and Dependability Benchmarking, DSN-RADB08 (jointly organized with the IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008), Anchorage, Alaska, USA, June 25, 2008. [citation][year=2008]Paolo Lollini et al., "Application of the evaluation framework to the complete scenario", Formal Deliverable Project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), 2008. [citation][year=2008]WANG Xiao hong, WANG Guo ren, YU Yong qian, HONG Yang, "Study of closed loop decision support system based on telecommunication field", Application Research of Computers, Vol. 25 No. 4, April 2008. [citation][year=2008]CHU Yu-zhi, SUN Li-feng, ZHONG Yu-zhuo, XIE Jian, "IPv6 supporting multi-view video on demand system?, Application Research of Computers, Vol. 25 Nº 4, April 2008. [citation][year=2008]CAO Li-juan, XIE Qiang, DING Qiu-lin, "Research of Web-OLAP system based on distributed data cache technology", Computer Applications Journal, Vol.28 No.2, February 2008. [citation][year=2007]1. Paolo Lollini et al., "D4.2.1. Application of the evaluation framework to the complete scenario", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]2. Gergely Pintér, “Model Based Program Synthesis and Runtime Error Detection for Dependable Embedded Systems”, PhD Thesis, Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary, 2007. [citation][year=2007]3. Xie Qiang, Yu Ya-li, Ding Qiu-ling, “Web-OLAP System Based on Object Pool and Data Caching”, Journal of Applied Sciences, China, pages 161-165, Vol.25, No.2, 2007. [citation][year=2007]4. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]5. Lorenzo Falai, “Observing, Monitoring and Evaluating Distributed Systems”, PhD Thesis, Department of Systems and Informatics, University of Florence, Italy, December 2007. [citation][year=2006]1. Wei-Pin Chang, Yi-Ching Lin, Der-Ming Liou, "Experiences from Implementation of the Hospital Executive Information System in Taipei City Hospital", Taipei City Medical Journal, Vol.3 No. 12, December 2006. [citation][year=2006]2. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December de 2006. [citation][year=2006]3. Z. Micskei, I. Majzik, and F. Tam, “Robustness testing techniques for high availability middleware solutions”, International Workshop on Engineering of Fault Tolerant Systems, EFTS2006, Luxemburg, Luxemburg, June 12-13, 2006. [citation][year=2005]1. Ricardo Gimenes, “Avaliação da Confiabilidade da Informação Utilizada em Sistemas de Informação e em Sistemas Críticos”, MSc Thesis, University of São Paulo, São Paulo, Brasil, 2005. [citation][year=2003]1. Hsiao-Wen Wu, “Establishment of Data Warehouse in Hospital Executive Information Systems? A Case Study of the Self-management in a Regional Hospital”, MSc Thesis, Computer Science and Information Management, Providence University, Taiwan, 2003. [publication]Marco Vieira and Madeira, H. , "A Dependability Benchmark for OLTP Application Environments", in Very Large Databases Conference - VLDB2003, 2003 [citation][year=2013]Domenico Cotroneo, Roberto Natella, Stefano Russo, Fabio Scippacercola, "State-Driven Testing of Distributed Systems", 17th International Conference on Principles of Distributed Systems, OPODIS 2013, Nice, France, December 16-18, 2013. [citation][year=2013]Alessandro Gustavo Fior, Jorge Augusto Meira, Eduardo Cunha de Almeida, Ricardo Gonçalves Coelho, Marcos Didonet Del Fabro, Yves Le Traon, “Under Pressure Benchmark for DBMS Availability”, Journal of Information and Data Management, Vol. 4 No. 3, 2013. [citation][year=2013]Alessandro Gustavo Farias Fior, "Under Pressure Benchmark: A Large-Scale Availability Benchmark For Distributed Databases", Msc Thesis, Universidade Federal Do Paraná, Curitiba, Brazil, 2013. [citation][year=2013]Roberto Natella, Fabio Scippacercola, "Issues and Ongoing Work on State-Driven Workload Generation for Distributed Systems", 14th European Workshop on Dependable Computing, EWDC 2013, Coimbra, Portugal, May 14-15, 2013. [citation][year=2013]Domenico Di Leo, “Robustness Evaluation of Software Systems through Fault Injection”, PhD Thesis, Universit a degli Studi di Napoli Federico II, Italy, 2013. [citation][year=2012]Fabio Scippacercola, "State-Driven Workload Generation in Distributed Systems, Tesi di Laurea Magistrale, Universita' Degli Studi di Napoli Federico II, Naples, Italy, 2012. [citation][year=2012]Amit Sangroya, Damián Serrano, Sara Bouchenak, "Benchmarking Dependability of MapReduce Systems", 31st IEEE International Symposium on Reliable Distributed Systems, Irvine, CA, USA, October 2012. [citation][year=2012]Seung-Ho Lim, Hyun Jin Choi, Doo-Soon Park, "Efficient journaling writeback schemes for reliable and high-performance storage systems", Personal and Ubiquitous Computing, September 2012. [citation][year=2012]Domenico Cotroneo, Francesco Fucci, Roberto Natella, "Towards a State driven Workload Generation Framework for Dependability Assessment", The Fifth International Conference on Dependability, DEPEND 2012, Rome, Italy, August 19 - 24, 2012. [citation][year=2012]Anja Bog, "Benchmarking Composite Transaction and Analytical Processing Systems", University of Potsdam/Hasso-Plattner-Institut, Potsdam, Germany, June 2012. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]Yantao Li, Charles Levine, “Extending TPC-E to Measure Availability in Database Systems”, Third TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC 2011, Seattle, WA, USA, August 29, 2011. [citation][year=2011]Bo Li, Haiying Zhou, Decheng Zuo, Zhan Zhang, Peng Zhou, Long Jia, "Performance modeling and benchmarking of bank intermediary business on high-performance fault-tolerant computers", 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, Hong Kong, June 2011. [citation][year=2011]A. Bondavalli, P. Lollini, A. Bovenzi, M. Colajanni, L. Coppolino, C. Esposito, M. Fixxo, C. di Martino, L. Montecchi, R. Natella, A. Peccia, "D3.1: Modeling and Evaluation: State-of-the-art", deliverable of the project: Dependable Off-The-Shelf based Middleware Systems for Large-scale Complex Critical Infrastructures (DOTS-LCCI Project: PRIN 2008LWRBHF), Italy, March 2011. [citation][year=2010]4. Fábio Oliveira, "Towards Mistake-Aware Systems", PhD Thesis, Graduate School—New Brunswick Rutgers, The State University of New Jersey, October 2010. [citation][year=2010]5. Philipp Reinecke, Katinka Wolter, Miroslaw Malek, “#A Survey on Fault-Models for QoS Studies of Service-Oriented Systems”, Technical Report number B-2010-02, Freie Universität Berlin, February, 2010. [citation][year=2010]6. Manuel José Ferreira Carneiro Mendonça, "Vulnerability Detection in Device Drivers", PhD Thesis Proposal, University of Lisbon, Portugal, January 2010. [citation][year=2010]1. Anja Bog, Hasso Plattner, Alexander Zeier, "A mixed transaction processing and operational reporting benchmark", Information Systems Frontiers, Springer Netherlands, ISSN: 1387-3326, November 2010. [citation][year=2010]2. Goetz Graefe, Arnd Christian Konig, Harumi Kuno, Volker Markl, Kai-Uwe Sattler, "Robust Query Processing", Abstracts Collection and Executive Summary - Dagstuhl Seminar 20381, Dagstuhl, September 2010. [citation][year=2010]3. Bo Li, Haiying Zhou, Decheng Zuo, Zhan Zhang, "Study for Performance Benchmark of Bank Intermediary Business on High-Performance Fault-Tolerant Computers”, International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, September 2010. [citation][year=2009]1. Hongfei Guo Dan Jones Jennifer Beckmann Praveen Seshadri, “Declarative Management in Microsoft SQL Server”, 35th International Conference on Very Large Databases, VLDB09, Lyon, France, August 24-28, 2009. [citation][year=2009]2. Tsz-kin Lau, Peter Kin Leung Shum, "Quantitative measurement of the autonomic capabilities of computing systems", International Business Machines Corporation (IBM), United States Patent 7539904, May 2009. [citation][year=2009]3. Goetz Graefe, Harumi A. Kuno, Janet L. Wiener, “Visualizing the robustness of query execution”, Fourth Biennial Conference on Innovative Data Systems Research, CIDR 2009, Asilomar, CA, USA, January 4-7, 2009. [citation][year=2009]4. Choi, H. J., Lim, S., and Park, K. H., “JFTL: A flash translation layer based on a journal remapping for flash memory”, ACM Transactions on Storage, Vol 4, Issue, January 2009. [citation][year=2008]1. Gustavo M. D. Vieira, Willy Zwaenepoel, Luiz E. Buzato, “Dynamic Content Web Applications: Crash, Failover, and Recovery Analysis”, Technical Report - IC-08-34, Instituto de Computacão, University of Campinas, Campinas, Brazil, December 2008. [citation][year=2008]2. A. Bog, J. Krueger, J. Schaffner, “A Composite Benchmark for Online Transaction Processing and Operational Reporting”, IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE'08), Tianjin, China, 2008. [citation][year=2008]3. Imre Kocsis, Zsolt Kocsis, Imre Malatinszki, András Pararicza, “Dependabilty Benchmarks and System Supervision”, SRDS 2008 Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (jointly organized with the 27th International Symposium on Reliable Distributed Systems, IEEE SRDS 2008), Naples, Italy, October 5, 2008. [citation][year=2008]4. Sung Hoon Baek, Kyu Ho Park, "Prefetching with Adaptive Cache Culling for Striped Disk Arrays", The 2008 USENIX Annual Technical Conference, Boston, USA, June 25-27, 2008. [citation][year=2007]1. Gergely Pintér, “Model Based Program Synthesis and Runtime Error Detection for Dependable Embedded Systems”, PhD Thesis, Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary, 2007. [citation][year=2007]2. M. Banatre, A. Pataricza, A. van Moorsel, P. Palanque, L. Strigini, “From Resilience-Building to Resilience-Scaling Technologies: Directions – ReSIST NoE Deliverable D13”, deliverable of the project: ReSIST: Resilience for Survivability in IST - A European Network of Excellence (ReSIST: Contract Number: 026764), September 2007. [citation][year=2007]3. S. H. Baek, K. H. Park, “Matrix-Stripe-Cache-Based Contiguity Transform for Fragmented Writes in RAID-5”, IEEE Transactions on Computers, Volume 56 , Issue 8 , August, 2007. [citation][year=2007]4. Manuel Mendonça, Nuno Neves, “Robustness Testing of the Windows DDK”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, Edinburgh, UK, June 25-28, 2007. [citation][year=2007]5. David C.C. Ong, Rytis Sileika, Souheil Khaddaj, Radouane Oudrhiri, “Alternative data storage solution for mobile messaging services”, Mobile Information Systems, Volume 3, Number 1, pp. 39 – 54, 2007. [citation][year=2007]6. André Cardeal Santana; Sueli de Fatima Poppi Borba, “Desempenho de Dados em Modelos de Relacionamentos por Herança”, Campo Digit@l, ISSN 1981-092X, vol.2 nº1, 2007. [citation][year=2006]1. Shih-Han Chiu, "Toward a More Generalized Benchmark Workload Model for Data Warehouse and Data Mining", PhD Thesis, National Chengchi University, 2006. [citation][year=2006]2. Farès Saad Khorchef, “Un Cadre Formel pour le Test de Robustesse des Protocoles de Communication”, PhD Thesis, LAAS-CNRS, Toulouse, France, December 2006. [citation][year=2005]1. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [citation][year=2005]2. F. Oliveira, K. Nagaraja, R. Bachwani, R. Bianchini, R. P. Martin, and T. Nguyen. "Understanding and Validating Database System Administration", 2005 USENIX Annual Technical Conference, USENIX '05, May 30-June 3, 2005. [citation][year=2004]1. Ali Kalakech, Karama Kanoun, Yves Crouzet, Jean Arlat, “Benchmarking The Dependability of Windows NT4, 2000 and XP”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [publication]Costa, P. .N.d. and Marco Vieira and Madeira, H. and Silva, J.G. , "Plug and Play Fault Injector for Dependability Benchmarking", in First Latin-American Symposium on Dependable Computing, LADC, 2003 [citation][year=2013]Stefan Winter, Michael Tretter, Benjamin Sattler, and Neeraj Suri, “simFI: From Single to Simultaneous Software Fault Injections”, The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Budapest, Hungary, June 2013. [citation][year=2011]1. Gianpiero Cabodi, Marco Murciano, Massimo Violante, “Boosting software fault injection for dependability analysis of real-time embedded applications”, ACM Transactions on Embeded Computing Systems, Vol. 10, Issue 2, January 2011. [publication]Madeira, H. and Joao Duraes and Marco Vieira , "Emulation of Software Faults: Representativeness and Usefulness", in First Latin-American Symposium on Dependable Computing, LADC, 2003 [citation][year=2007]1. Pardo, J. Campelo, J.C. Ruiz, J.C. Gil, P., "Embedded Software Validation Using On-Chip Debugging Mechanisms", Software engineering of fault tolerant systems (P. Pelliccione, H. Muccini, N. Guelfi, A. Romanovsky Eds), Series on Software Engineering and Knowledge Engineering, World Scientific Publishing Co, Vol. 19, pp 121-149, 2007. [citation][year=2005]1. J.-C. Ruiz, J. Pardo, J.-C. Campelo, P. Gil, “On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software Components”, IEEE 11th International Sysmposium Pacific Rim Dependable Computing (PRDC2005), Changsha, Hunan, China, December 2005. 2002(3 publications) [publication]Marco Vieira and Madeira, H. , "Definition of Faultloads Based on Operator Faults for DMBS Recovery Benchmarking", in Pacific Rim International Symposium on Dependable Computing, PRDC2002, 2002 [citation][year=2010]1. Philipp Reinecke, Katinka Wolter, Miroslaw Malek, “#A Survey on Fault-Models for QoS Studies of Service-Oriented Systems”, Technical Report number B-2010-02, Freie Universität Berlin, February, 2010. [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008 [citation][year=2007]1. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]2. Andréas Johansson, “Robustness Evaluation of Operating Systems”, tese de doutoramento de Andréas Johansson, Vom Fachbereich Informatik der Technischen Universit, University of Darmstad, Germany, 2007. [citation][year=2007]3. Manuel Mendonça, Nuno Ferreira Neves, Localização de Vulnerabilidades de Segurança em Gestores de Dispositivos Wi-Fi com Técnicas de Fuzzing, Actas da 3ª Conferência Nacional Sobre Segurança Informática nas Organizações (SINO07), Lisbon, Portugal, October 2007. [citation][year=2006]1. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2006. [citation][year=2004]1. Aaron B. Brown, Leonard Chung, William Kakes, Calvin Ling, David A. Patterson, “Experience with Evaluating Human-Assisted Recovery Processes”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2004]2. Ali Kalakech, Karama Kanoun, Yves Crouzet and Jean Arlat, “Benchmarking The Dependability of Windows NT4, 2000 and XP”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2004]3. Ali Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, “Benchmarking Operating System Dependability: Windows 2000 as a Case Study”, 10th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC2004, Papeete, Tahiti, French Polynesia, March 3-5, 2004. [citation][year=2003]1. Aaron Brown, “A Recovery-Oriented Approach to Dependable Services: Reairing Past Errors with System-Wide Undo”, PhD Thesis, EECS Computer Science Division - University of California, Berkeley, California, USA, December 2003. [citation][year=2003]2. Kersten Buchacker, Mario Dal Cin, H. Hoxer, R. Karch, Volkmar Sieh, Oliver Tschache, "Reproducible dependability benchmarking experiments based on unambiguous benchmark setup descriptions", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2003, San Francisco, California, USA, June 22-25, 2003. [publication]Marco Vieira and Madeira, H. , "Recovery and Performance Balance of a COTS DBMS in the Presence of Operator Faults", in The International Symposium on Dependable Systems and Networks, DSN-IPDS 2002, 2002 [citation][year=2012]Bo Yang, Ji Wu, Chao Liu, "Mining Data Chain Graph for Fault Localization", IEEE 36th Annual Computer Software and Applications Conference Workshops, COMPSACW 2012, Izmir, Turkey, July 16-20, 2012. [citation][year=2011]Gong Zhang, Ling Liu, "Why do migrations fail and what can we do about it?", 25th international conference on Large Installation System Administration, LISA'11, Boston, MA, USA, December 4-9, 2011. [citation][year=2011]Gong Zhang, "Data and Application Migration in Cloud Based Data Centers: Architectures and Techniques", PhD Thesis, Georgia Institute of Technology, USA, August 2011. [citation][year=2010]1. Nikola Milanovic, Bratislav Milic, “Automatic Generation of Service Availability Models”, IEEE Transactions on Services Computing, no. 1, ISSN: 1939-1374, March 2010. [citation][year=2008]1. Lakshmi Narayanan Bairavasundaram, “Characteristics, Impact, and Tolerance of Partial Disk Failures”, PhD Thesis, University of Wisconsin–Madison, USA, 2008. [citation][year=2008]2. Lorenzo Keller, Prasang Upadhyaya, George Candea, “ConfErr: A Tool for Assessing Resilience to Human Configuration Errors”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, Anchorage, Alaska, USA, June 24-27, 2008. [citation][year=2008]3. Bogdan Tomoyuki Nassu, Kiyonobu Uehara, Takashi Nanya, “Injecting Inconsistent Values Caused by Interaction Faults for Experimental Dependability Evaluation”, Seventh European Dependable Computing Conference, EDCC 2008, Kaunas, Lithuania, May 7-9, 2008. [citation][year=2007]1. Andréas Johansson, “Robustness Evaluation of Operating Systems”, PhD Thesis, Vom Fachbereich Informatik der Technischen Universit, University of Darmstad, Germany, 2007. [citation][year=2007]Eliane Martins, Regina Moraes, "Research in Software Testing at State University of Campinas", Technical Report - REVVIS Project, 2007. [citation][year=2005]1. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [citation][year=2005]2. Regina Moraes, Eliane Martins, Naaliel Mendes, "Fault injection approach based on dependence analysis", 29th Annual International Conference on Computer Software and Applications, COMPSAC 2005, Edinburgh, Scotland, UK, July 26-28, 2005. [citation][year=2004]1. Aaron B. Brown, Leonard Chung, William Kakes, Calvin Ling, David A. Patterson, “Experience with Evaluating Human-Assisted Recovery Processes”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2003]1. Aaron Brown, “A Recovery-Oriented Approach to Dependable Services: Reairing Past Errors with System-Wide Undo”, PhD Thesis, EECS Computer Science Division - University of California, Berkeley, California, USA, December 2003. [citation][year=2003]2. Regina Morais, Eliane Martins, "A strategy for validating an ODBMS Component Using a High-Level Software Fault Injection Tool", First Latin-American Symposium on Dependable Computing, LADC 2003, São Paulo, Brazil, October 21-24, 2003. [citation][year=2002]1. David Oppenheimer, Aaron B. Brown, Jonathan Traupman, Pete Broadwell, David A. Patterson, “Practical Issues in Dependability Benchmarking”, Second Workshop on Evaluating and Architecting System Dependability (EASY), São Jose, California, USA, October 6, 2002. [publication]Madeira, H. and Costa, J.P. and Marco Vieira and Costa, D. , "Data warehousing approach for the analysis of dependability benchmarking experiments (Fast Abstract)", in Fourth European Dependable Computing Conference (EDCC-4), 2002 2001(2 publications) [publication]Costa, D. and Rilho, T. and Marco Vieira and Madeira, H. , "ESFFI - A novel technique for the Emulation of Software Faults in COTS Components", in 8th Annual IEEE International Conference on the Engineering of Computer-Based Systems, ECBS 2001, 2001 [citation][year=2012]Adesh Panwar, "Verification Platform for FPGA Based Architecture", International Conference on Advances in Computing, ICADC 2012, Bangalore, Karnataka, India, July 4-6, 2012. [citation][year=2011]LIU Jia-xiang, JIANG Jian-hui, JIN Ang, LOU Jun-gang, "A Static Fault Injection Tool for Java Programs", Acta Scientiarum Naturalium Universitatis Neimongol, 42(5), 2011. [citation][year=2010]1. M. Di Marzio, M. Grosso, M. Sonza Reorda, L. Sterpone, G. Audisio, M. Sabatini, “A Novel Scalable and Reconfigurable Emulation Platform for Embedded Systems Verification”, IEEE International Symposium on Circuits and Systems, ISCS 2010, Paris, France, May 30 – June 2, 2010. [citation][year=2009]1. Ang Jin, Jian-hui Jiang, "Fault Injection Scheme for Embedded Systems at Machine Code Level and Verification", 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC'09, Shanghai, China, November 2009. [citation][year=2008]1. Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou, "A PIN-Based Dynamic Software Fault Injection System", The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp.2160-2167, November 18-21, 2008. [citation][year=2005]1. Ruben Alexandersson, D. Krishna Chaitanya, Peter Öhman, Yasir Sira, “A technique for fault tolerance assessment of COTS Based Systems”, International Conference on Computer Safety, Reliability and Security (SAFECOMP2005), Fredrikstad, Norway, September 2005. [citation][year=2005]2. Wu Ji, JIA Xiaoxia, Liu Chang, Y Haiyan, Liu Chao, “Finds in Testing Experiments for Model Evaluation”, Tsinghua Science and Technology Journal, Vol.10 No.3 P.298-303, 2005. [citation][year=2003]1. Saraswati Bharthipudi, “Comparison of Numerical Result Checking Mechanisms for FFT Computations Under Faults”, PhD Thesis, School of Electrical and Computer Engineering, Georgia Institute of Technology, USA, December 2003. [citation][year=2003]2. Tahar Jarboui, “Surete de Fonctionnement de Systemes Informatiques – Étalonage et Representativite des Fautes”, PhD Thesis, LAAS-CNRS, Toulouse, France, May 2003. [citation][year=2003]Raviteja Varanasi, "Software Faults and Fault Injection Models", CSC532 - Advanced Software Engineering, Louisiana Tech University, 2003. [citation][year=2002]1. Andreas Johansson, “Software Implemented Fault Injection Used for Software Evaluation”, Predicting System Trustworthiness for Software Component Trustworthiness, Artech House, July 2002. [publication]Costa, D. and Marco Vieira and Madeira, H. , "Optimization of Performance and Recovery of Database Systems in the Presence of Operation Faults (Fast Abstract)", in The International Conference on Dependable Systems and Networks, DSN-2001, 2001 2000(2 publications) [publication]Madeira, H. and Marco Vieira and Costa, D. , "On the Emulation of Software Faults by Software Fault Injection", in Dependable Systems and Networks Conference â?? DSN-2000, 2000 [citation][year=2013]K. Jayashree, Sheila Anand, "Web Service Diagnoser Model for managing faults in web services", Computer Standards & Interfaces, Elsevier, July 2013. [citation][year=2013]Patrick Pape, "A Methodology for Increasing the Dependability of Open Source Software Components", PhD Thesis, Auburn University, Auburn, Alabama, May 2013. [citation][year=2012]Piotr Gawkowski, Mariusz Markowski, Grzegorz Smulko, ?ukasz Karolewski, "Fault Injection Techniques Towards Software Quality Assessment", Modern ICT for Evaluation of Business Information Systems - Information Systems in Management XVI, Warsaw University of Life Sciences, Warsaw, Poland, 2012. [citation][year=2012]Xavier Kauffmann-Tourkestansky, “Analyses sécuritaires de code de carte à puce sous attaques physiques simulées”, PhD Thesis, Université D’Orléans, France, November 2012. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]Joon S. Park, Pratheep Chandramohan, Avinash T. Suresh, Joseph V. Giordano, Kevin A. Kwiat, "Component survivability at runtime for mission-critical distributed systems", The Journal of Supercomputing, September 2012 [citation][year=2012]Thorsten Piper, Stefan Winter, Paul Manns, Neeraj Suri, "Instrumenting AUTOSAR for dependability assessment: A guidance framework", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 2012. [citation][year=2012]Domenico Cotroneo, Anna Lanzaro, Roberto Natella, Ricardo Barbosa, "Experimental Analysis of Binary-Level Software Fault Injection in Complex Software", Ninth European Dependable Computing Conference, EDCC-9, Sibiu, Romania, May 2012. [citation][year=2011]John Thomson, Andre Guerreiro, Paulo Trezentos, Jeff Johnson, "Package Upgrade Robustness: An Analysis for GNU/Linux Package Management Systems", Open Source Systems: Grounding Research, IFIP Advances in Information and Communication Technology, (Eds. Scott Hissam, Barbara Russo, Manoel de Mendonça Neto, Fabio Kon), Springer Boston, ISBN: 978-3-642-24417-9, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]Y. Oyama, Y. Hoshi, "A Hypervisor for Injecting Scenario-Based Attack Effects", 2011 IEEE 35th Annual Computer Software and Applications Conference (COMPSAC 2011), Munich, Germany, July 2011. [citation][year=2011]Gabriela Jacques-Silva, Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Ravishankar K. Iyer, “Fault injection-based assessment of partial fault tolerance in stream processing applications”, 5th ACM international conference on Distributed event-based system, DEBS '11, New York, NY, USA, July 11-15, 2011. [citation][year=2011]Daniele Esposito, “Strategie per il miglioramento dei log applicativi basate su Software Fault Injection”, Tesi di Laurea, Facoltà di Ingegneria, Universita' degle Studi di Napoli Federico II, 2011. [citation][year=2011]A. Bondavalli, P. Lollini, A. Bovenzi, M. Colajanni, L. Coppolino, C. Esposito, M. Fixxo, C. di Martino, L. Montecchi, R. Natella, A. Peccia, "D3.1: Modeling and Evaluation: State-of-the-art", deliverable of the project: Dependable Off-The-Shelf based Middleware Systems for Large-scale Complex Critical Infrastructures (DOTS-LCCI Project: PRIN 2008LWRBHF), Italy, March 2011. [citation][year=2010]1. S.M. Nematollahzadeh, A. A. Jamshidifar, "Simulation of the Effects of Radiation on a Satellite Memory and Improving Its Fault-Tolerant Ability, Using SIHFT", Book Title: Ultra-Wideband, Short Pulse Electromagnetics 9, ISBN: 978-0-387-77845-7, Springer New York, 2010. [citation][year=2010]2. Ravishankar K. Iyer, Nithin Nakka, Zbigniew Kalbarczyk, Weining Gu, "Fault Injection, Encyclopedia of Software Engineering, Ch 25, Nov 2010. [citation][year=2010]3. Hameed, K., Williams, R., Smith, J., "Analytically redundant controllers for fault tolerance: Implementation with separation of concerns," American Control Conference, ACC 2010, B altimore, Maryland, USA, June 30 - July 2, 2010. [citation][year=2010]4. Roberto Natella, Domenico Cotroneo, “Emulation of Transient Software Faults for Dependability Assessment: A Case Study”, Eigth European Dependable Computing Conference, EDCC 2010, Valencia, Spain, April 2010. [citation][year=2009]1. Anderson Nunes Paiva Morais, "injecção de Ataques Baseado em Modelo para Teste de Protocolos de Segurança", MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Campinas, Brazil, 2009. [citation][year=2009]2. Giuseppe Scafuti, "Valutazione sperimentale di tecniche di testing per software in relazione ai tipi di fault", Tesi de Laurea, Universita degli Studi di Napoli Federico II, Naples, Italy, May 2009. [citation][year=2009]3. Stefano Rago, “Un approccio per la Software Fault Injection in Sistemi Software Complessi e Distribuiti”, MSc Thesis, Universita' degli Studi di Napoli Federico II, Facoltà de Ingegneria, Italy, 2009. [citation][year=2009]4. Christopher Dabrowski, “Reliability in grid computing systems”, Concurrency and Computation: Practice and Experience, Wiley InterScience, John Wiley & Sons, 2009. [citation][year=2008]1. Gabriella Carrozza, “Software Faults Diagnosis in Complex, OTS-Based, Critical Systems”, tese de doutoramento de Gabriella Carrozza, “FEDERICO II” University of Naples, Naples, Italy, November 2008. [citation][year=2008]2. Jeffrey Michael Napper, “Robust Multithreaded Applications”, PhD Thesis, Graduate School of The University of Texas at Austin, USA, 2008. [citation][year=2008]3. Douglas John Buettner, "Designing an Optimal Software Intensive System Acquisition: A Game Theoretic Approach", Phd Thesis, University of Southern California, September 2008. [citation][year=2007]1. E. Touloupis, J. A. Flint, V. A. Chouliaras, and D. Ward, “Study of the Effects of SEU-Induced Faults on a Pipeline Protected Microprocessor”, IEEE Transactions on Computers, Vol. 56, issue 12, December 2007. [citation][year=2007]2. Pardo, J. Campelo, J.C. Ruiz, J.C. Gil, P., "Embedded Software Validation Using On-Chip Debugging Mechanisms", Software engineering of fault tolerant systems (P. Pelliccione, H. Muccini, N. Guelfi, A. Romanovsky Eds), Series on Software Engineering and Knowledge Engineering, World Scientific Publishing Co, Vol. 19, pp 121-149, 2007. [citation][year=2007]3. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]4. Andréas Johansson, “Robustness Evaluation of Operating Systems”, tese de doutoramento de Andréas Johansson, Vom Fachbereich Informatik der Technischen Universit, University of Darmstad, Germany 2007. [citation][year=2007]5. S. Bruning, S. Weißleder, M. Malek, “A fault taxonomy for service-oriented architecture”, Humboldt-Universit¨at zu Berlin, Tech. Rep. 215, 2007. [citation][year=2007]6. Joon S. Park, Joseph Giordano, "Software component survivability in information warfare", Cyber Warfare and Cyber Terrorism, Information Science Reference, IGI-Gloabl, ISBN: 1591409918. 2007. [citation][year=2007]7. Joon Park, “Dynamic Hybrid Component Test For Mission-Critical Distributed Systems”, Technical Report AFRL-IF-RS-TR-2007-149, Syracuse University, Air Force Research Laboratory, Information Directorate, Rome Research Site, Rome, New York,USA, June 2007. [citation][year=2006]1. V.V. Phoha, S. Phoha, A. Ray, K.S. Balagani, A.U. Nadgar, R. Varanasi, "Embedded Soft Sensing for Anomaly Detection in Mobile Robotic Networks", Sensor Network Operations, IEEE Press/Wiley, ISBN 0-387-19826-1, eds. S. Phoha, T. LaPorta and C. Griffin, Chapter 10, 2006. [citation][year=2006]2. Juan Pardo, José-Carlos Campelo, Juan-Carlos Ruiz, Pedro Gil, "Temporal Characterization of Embedded Systems Using Nexus", Sixth European Dependable Computing Conference, EDCC-6, Coimbra, Portugal, October 18-20, 2006. [citation][year=2006]3. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2006. [citation][year=2006]4. L. Strigini et al., “Resilience-Building Technologies: State of Knowledge – ReSIST NoE Deliverable D12”, deliverable of the project: ReSIST: Resilience for Survivability in IST - A European Network of Excellence (ReSIST: Contract Number: 026764), September 2006. [citation][year=2006]5. Richard Torkar, “Towards Automated Software Testing: Techniques, Classifications and Frameworks”, PhD Thesis, Blekinge Institute of Technology, Sweden, 2006. [citation][year=2006]6. Cheng-Chun Tu, “Modeling Component Failures in Embedded Systems”, Master's Thesis, International Master’s Program in Dependable Computer Systems, Chalmers University of Technology, Department of Computer Science and Engineering, Goteborg, Sweden, 2006. [citation][year=2005]1. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [citation][year=2005]2. Arnaud Albinet, “Caractérisation de Systèmes D’exploitation en Présence de Pilotes Défaillants”, PhD Thesis, Laboratoire d’Analyse et d’Architecture des Systèmes (LAAS-CNRS), Toulouse, France, 2005. [citation][year=2005]3. N. Looker, M. Munro, J. Xu, "Simulating Errors in Web Services", International Journal of Simulation: Systems, Science & Technology, Vol. 5 No. 5 ISSN 1473-804x, 2005. [citation][year=2005]4. Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano, “Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems”, Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, Chiba, Japan, May 30-June 1, 2005. [citation][year=2005]5. Ruben Alexandersson, Peter Öhman, “A technique for fault tolerance assessment of COTS”, International Conference on Computer Safety, Reliability and Security (SAFECOMP2005), Fredrikstad, Norway, September 2005. [citation][year=2005]6. J.-C. Ruiz, J. Pardo, J.-C. Campelo, P. Gil, “On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software Components”, IEEE 11th International Symposium Pacific Rim Dependable Computing (PRDC2005), Changsha, Hunan, China, December 2005. [citation][year=2005]7. Wu Ji, JIA Xiaoxia, Liu Chang, Y Haiyan, Liu Chao, “Finds in Testing Experiments for Model Evaluation”, Tsinghua Science and Technology Journal, Vol.10 No.3 P.298-303, 2005. [citation][year=2005]8. Jonas Myhrman, “Studying Fault Injection in WCDMA Base Station Processors Using Simics Simulator”, tese de mestrado de Jonas Myhrman, Chalmers University of Technology, Gothenburg, Sweden, 2005. [citation][year=2005]9. M. F. Lau, Y. T. Yu, “An extended fault class hierarchy for specification-based testing”, ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 14 , Issue 3 , July 2005. [citation][year=2005]10. J. Pardo, J. C. Ruiz, J.-C. Campelo, P. Gil, "A Non-Intrusive SWIFI Technique for RTOS Robustness Testing" 5th European Dependable Computing Conference, EDCC5, Budapest, Hungary, April 2005. [citation][year=2005]11. D. Coppit, J. M. Haddox-Schatz, “On the Use of Specification-Based Assertions as Test Oracles”, 29th Annual IEEE/NASA Software Engineering Workshop (SEW’05), Greenbelt, MA, USA, April 2005. [citation][year=2004]1. S. Bagchi, Z. Kalbarczyk, R. Iyer, and Y. Levendel. "Design and Evaluation of Preemptive Control Signature (PECOS) Checking", IEEE Transactions on Computers, September 2004. [citation][year=2004]2. Ana – Elena Rugina, “Etalonnage de la sûreté de fonctionnement de systèmes d’exploitation”, Stage de Recherche, Institut National Polytechnique de Toulouse, Ecole Nationale Supérieure d’Electrotechnique, d’Electronique, d’Informatique, d’Hydraulique Et des Télécommunications, 2004. [citation][year=2004]3. M. Hiller, A. Jhumka, N. Suri, “EPIC: Profiling the Propagation and Effect of Data Errors in Software”, IEEE Trans. on Computers, 53(5):512–530, May 2004. [citation][year=2004]4. Marco Serafini, “Una Metodologia per Modellizzare e Valutare la Dependability di Sistemi Safety-Critical”, PhD thesis, Universit a degli Studi di Firenze (University of Florence), Italy, 2004. [citation][year=2004]5. G. Pintér and I. Majzik, “Impact of Statechart Implementation Techniques on the Effectiveness of Fault Detection Mechanisms”, Proceedings of the 30th IEEE EUROMICRO Conference (EUROMICRO’04), Rennes – France, September 1-3, 2004. [citation][year=2004]6. H. R. Zarandi, S. G. Miremadi, S. Hessabi, A. Ejlali, “A Mixed-Mode Simulation-based Environment to Test and Dependability Assessment of HDL Models”, in the Proceedings of International Conference on Embedded Systems and Applications (ESA 2004), USA, June 2004. [citation][year=2004]7. D. Xu, D. Berleant, G. Takle, and Z. Pan, “A better understanding of the effects of software defects in weather simulation”, WRF/MM5 User’s Workshop poster session, Boulder, June 2004. [citation][year=2004]8. Nik Looker, Malcolm Munro, Jie Xu, “Testing Web Services”, The 16th IFIP International Conference on Testing of Communicating Systems, Oxford, UK, March 17-19, 2004. [citation][year=2004]9. Éric Marsden, “Caractérisation de la Sûreté de Fonctionnement de Systèmes à base d’Intergiciel”, PhD Thesis, Laboratoire d’Analyse et d’Architecture des Systèmes du CNRS, Toulouse, France, February 2004. [citation][year=2004]10. Gergely Pinter and Istvan Majzik, “Impact of statechart implementation techniques on the effectiveness of fault detection mechanisms” In Proceedings of the 30th EUROMICRO Conference, IEEE Computer Society Press, 2004. [citation][year=2003]1. Pedro Yeste Pérez, “Contribución a la Validación de la Confiabilidad en los Sistemas Empotrados Tolerantes a Fallos”, tese de doutoramento de Pedro Yeste Pérez, Universidad Politécnica de Valencia, Departamento de Informática de Sistemas Y Computadores, Valencia, Spain, 2003. [citation][year=2003]2. A. Pataricza and G. Pintér “Data Mining in Fault Injection”, In Proc. DDECS 2003. IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems, Poznan, Poland, April, 2003. [citation][year=2003]3. H. R. Zarandi, S. G. Miremadi and A. R. Ejlali, "Fault Injection into Verilog Models for Dependability Evaluation of Digital Systems," in the Proceedings of the International Symposium on Parallel and Distributed Computing (ISPDC 2003), IEEE-CS Press, Slovenia, October 2003. [citation][year=2003]4. Pedro Yuste, Juan-Carlos Ruiz-Garcia, Lenin Lemus, Pedro J. Gil, “Non-intrusive Software-Implemented Fault Injection in Embedded Systems", First Latin-American Symposium on Dependable Computing, LADC 2003, São Paulo, Brazil, October 21-24, 2003. [citation][year=2003]5. Shu Xiao, Lijun Deng, Sheng Li, Xiangrong Wang, “Integrated TCP/IP Protocol Software Testing for Vulnerability Detection”, 2003 International Conference on Computer Networks and Mobile Computing, ICCNMC’03, Shanghai, China, October 20-23, 2003. [citation][year=2003]6. Jean Arlat, Yves Crouzet, Johan Karlsson, Peter Folkesson, Emmerich Fuchs, Günther H. Leber, “Comparison of Physical and Software-Implemented Fault Injection Techniques,” IEEE Transactions on Computers Archive, Volume 52, Issue 9, September de 2003. [citation][year=2003]7. Tahar Jarboui, “Surete de Fonctionnement de Systemes Informatiques – Étalonage et Representativite des Fautes”, PhD Thesis, LAAS-CNRS, Toulouse, France, May 2003. [citation][year=2003]8. Shu Xiao, Sheng Li, Xiangrong Wang, Lijun Deng, “Fault-oriented Software Robustness Assessment for Multicast Protocols”, Second IEEE International Symposium on Network Computing and Applications, Cambridge, Massachusetts, USA, April 16-18, 2003. [citation][year=2003]9. András Pataricza, Gergely Pinter, “Data Mining in Fault Injection”, 6th IEEE International Workshop on Design and Diagnostics of Electronic Circuits and Systems, DDECS-2003, Poznan, Poland, April 14-16, 2003 [citation][year=2003]10. Ravi Iyer, "Design of Reliable Systems and Networks", ECE 442/CS 436, Course Papers, Spring 2003, Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, Urbana, IL, USA, 2003. (http://courses.ece.uiuc.edu/ece442/papers.htm). [citation][year=2002]1. Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, T. Marteau, "Analysis of the Effect of Real and Injected Software Faults: Linux as a Case Study", Pacific Rim International Symposium on Dependable Computing, PRDC2002, Tsukuba, Japan, December 16-18, 2002. [citation][year=2002]2. Eric Marsden, Jean-Charles Fabre, Jean Arlat, “Dependability of CORBA Systems: Service Characterization by Fault Injection”, 21st IEEE Symposium on Reliable Distributed Systems, SRDS02, Osaka University, Suita, Japan, October 13-16, 2002. [citation][year=2002]3. Manuel Rodriguez, “Technologie d’empaquetage pour la surete de fonctionnement des systemes temps-reel”, PhD Thesis, LAAS-CNRS, Toulouse, France, July 2002. [citation][year=2002]4. B. Floering, B. Brothers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “An Adaptive Architecture for Monitoring and Failure Analysis of High-Speed Networks”, 2002 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]5. Manuel Rodriguez, Arnaud Albinet, Jean Arlat, "MAFALDA-RT, a tool for dependability assessment of real-time systems", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]6. Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, "Experimental analysis of the errors induced into linux by three fault injection techniques", EEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]7. Eliane Martins, Cecilia Rubira, Nelson Leme, "Jaca: a reflective fault injection tool based on patterns", EEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]8. Jean Arlat, Yves Crouzet, "Faultload representativeness for dependability benchmarking", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]9. Eric Marsden, Jean-Charles Fabre, Jean Arlat, "Characterization approaches for CORBA systems by fault injection", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]10. Jean Arlat, “From Experimental Assessment of Fault-Tolerant Systems to Dependability Benchmarking”, 16th International Parallel and Distributed Processing Symposium, IPDPS 2002, Fort Lauderdale, Florida, USA, April 15-19, 2002. [citation][year=2002]11. Jean Arlat, Jean-Charles Fabre, Manuel Rodriguez, Frédéric Salles, "Dependability of COTS microkernel-based systems", IEEE Transactions on Computers, 51 (2): pp. 138-163, February 2002. [citation][year=2002]12. Jean Arlat, “From Experimental Assessment of Fault-Tolerant Systems to Dependability Benchmarking”, Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS’02), 2002. [citation][year=2002]13. Jean Arlat, "From Fault Injection Experiments to Dependability Benchmarking", Workshop "Challenges and Directions for Dependable Computing, 41st Meeting of IFIP WG 10.4, Saint John, US, January 4-8, 2002. [citation][year=2001]1. Eric Marsden, Jean-Charles Fabre, “Failure Mode Analysis of CORBA Service Implementations”, Middleware 2001: IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Heidelberg, Germany, November 12-16, 2001. [citation][year=2001]2. Eric Marsden, Jean-Charles Fabre, “Failure analysis of an ORB in presence of faults”, DSoS. IST-1999-11585. Dependable Systems of Systems, DSoS Project (IST-1999-11585), Deliverable IC3, October 2001. [citation][year=2001]3. Maitrayi Sabaratnam, “Improving Dependability in Database Management Systems”, PhD Thesis, University of Trondheim, Trondheim, Norway, November 2001. [citation][year=2001]4. Laurent Réveillère, Gilles Muller, “Improving Driver Robustness: an Evaluation of the Devil Approach”, IEEE/IFIP International Dependable Systems and Networks Conference, DSN 2001, Gothenburg, Sweden, July 1-4, 2001. [citation][year=2001]5. Elisa Nakagawa, José C. Maldonado, "Software-Fault Injection Based on Mutant Operators", IX Brazilian Symposium on Fault-Tolerant Computing, SCTF 2001, Florianópolis, Santa Catarina, Brazil, March 5-7, 2001. [publication]Rilho, T. and Costa, D. and Marco Vieira and Madeira, H. , "Run-time Software Implemented Fault-Injection (RTSWIFI): an Approach to Emulate Software Faults in COTS (Fast Abstract)", in Dependable Systems and Networks Conference, DSN-2000, 2000 Edited Books 2014(1 publication) [publication]Majzik, I. and Marco Vieira ,Proceedings of the 6th International Workshop on Software Engineering for Resilient Systems , "Proceedings of the 6th International Workshop on Software Engineering for Resilient Systems", vol. 8785, 2014 2013(1 publication) [publication]Marco Vieira and Cunha, J.C. ,Proceedings of the 14th European Workshop on Dependable Computing , "Dependable Computing - 14th European Workshop, EWDC 2013", vol. 7869, 2013 2012(1 publication) [publication]Marco Vieira and Gashi, I. ,Proceedings of the 9th European Dependable Computing Conference, EDCC 2012 , "Fast Abstracts & Student Forum Proceedings – EDCC 2012", 2012 Book Chapters 2017(2 publications) [publication]Laranjeiro, N. and Pereira, G. and Soydemir, S.N. and Barbosa, R. and Jorge Bernardino and Areias, C. and Nuno Antunes and Cunha, J.C. and Marco Vieira and Madeira, H. , "Robustness and Fault Injection for the Validation of Critical Systems", in Certifications of Critical Systems – The CECRIS Experience, pp. 247-274, 2017 [publication]Silva, N. and Moreira, F. and Cunha, J.C. and Marco Vieira , "A Process for Finding and Tackling the Main Root Causes that Affect Critical Systems Quality", in Certifications of Critical Systems – The CECRIS Experience, pp. 81-102, 2017 2013(7 publications) [publication]Nuno Antunes and Marco Vieira , "Security Testing in SOAs: Techniques and Tools", in Innovative technologies for dependable OTS-based critical systems, vol. 1, pp. 159-174, 2013 [citation][year=2015]Krishnaveni, S., Prabakaran, and Sivamohan, S., “Survey on Software Security Testing Techniques in Cloud Computing,” Advances in Engineering Applications, 2015. [citation][year=2015]D. Nigam, V. Malik, and S. Nigam, “Methods and Techniques of Security Testing: A Survey,” International Journal of Advanced Engineering and Global Technology, vol. 3, no. 1, 2015. [publication]Napolitano, A. and Carrozza, G. and Laranjeiro, N. and Marco Vieira , "Robustness Testing of Web Services", in Innovative Technologies for Dependable OTS-Based Critical Systems, pp. 55-68, 2013 [publication]José Fonseca and Marco Vieira , "A Survey on Secure Software Development Lifecycles", in Software Development Techniques for Constructive Information Systems Design, vol. 1, pp. 57-73, 2013 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "A Hypotension Surveillance and Prediction System for Critical Care", in Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care, vol. 1, pp. 341-355, 2013 [publication]Marco Vieira and Nuno Antunes , "Introduction to Software Security Concepts", in Innovative technologies for dependable OTS-based critical systems, vol. 1, pp. 29-38, 2013 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "Using Data Masking for Balancing Security and Performance in Data Warehousing", in Handbook of Research on Computational Intelligence for Engineering, Science, and Business, vol. 1, pp. 384-409, 2013 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "DBMS Application Layer Intrusion Detection for Data Warehouses", in Building Sustainable Information Systems, vol. 1, pp. 493-507, 2013 2012(7 publications) [publication]Laranjeiro, N. and Marco Vieira , "Adapting Test-Driven Development to Build Robust Web Services", in Agile and Lean Service-Oriented Development: Foundations, Theory and Practice, 2012 [publication]Micskei, Z. and Majzik, I. and Madeira, H. and Marco Vieira and Nuno Antunes and Avritzer, A. , "Robustness Testing Techniques and Tools", in Resilience Assessment and Evaluation of Computing Systems, 2012 [citation][year=2014]S. Mostadi and F. Mourlin, “Training Oriented Mobile Device to Learn Software Architecture,” in eLmL 2014, The Sixth International Conference on Mobile, Hybrid, and On-line Learning, 2014, pp. 75–81. [publication]Araújo Neto, A.C.d. and Marco Vieira , "Assessing the Security of Software Configurations", in Threats, Countermeasures, and Advances in Applied Information Security, vol. 1, pp. 129-157, 2012 [publication]Joao Duraes and José Fonseca and Madeira, H. and Marco Vieira , "Field Studies on Resilience: Measurements and Repositories", in Resilience Assessment and Evaluation, vol. na, pp. 213-237, 2012 [publication]Barbosa, R. and Karlsson, J. and Marco Vieira and Madeira, H. , "Fault Injection", in Resilience Assessment and Evaluation, vol. 1, pp. 263-282, 2012 [publication]Ricardo Jorge Santos and Jorge Bernardino and Marco Vieira , "Using Data Masking for Balancing Security and Performance in Data Warehousing", in Handbook of Research on Computational Intelligence for Engineering, Science and Business, vol. 2, pp. 384-409, 2012 [publication]Marco Vieira and Madeira, H. and Sachs, K. and Kounev, S. , "Resilience Benchmarking", in Resilience Assessment and Evaluation of Computing Systems, 2012 [citation][year=2012]Anja Bog, "Benchmarking Composite Transaction and Analytical Processing Systems", University of Potsdam/Hasso-Plattner-Institut, Potsdam, Germany, June 2012. 2011(3 publications) [publication]Rodrigues, D. and Estrella, J. and Nuno Antunes and Mónaco, F. and Branco, K. and Marco Vieira , "Engineering Secure Web Services", in Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, 2011 [citation][year=2015]M. I. Palma Salas and E. Martins, “A Black-Box Approach to Detect Vulnerabilities in Web Services Using Penetration Testing,” Latin America Transactions, IEEE (Revista IEEE America Latina), vol. 13, no. 3, pp. 707–712, 2015. [citation][year=2014]T. Francke, Innovative Applications and Developments of Micro-Pattern Gaseous Detectors. IGI Global, 2014. [citation][year=2014]F. Alam, Using Technology Tools to Innovate Assessment, Reporting, and Teaching Practices in Engineering Education. IGI Global, 2014. [citation][year=2014]M. I. P. Salas and E. Martins, “Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security,” in Electronic Notes in Theoretical Computer Science, 2014, vol. 302, pp. 133–154. [citation][year=2012]I. Alsmadi, Ed., Advanced Automated Software Testing: Frameworks for Refined Practice: Frameworks for Refined Practice. IGI Global, 2012. [citation][year=2011]B. Hollunder, A. Al-Moayed, and A. Wahl, “A Tool Chain for Constructing QoS-aware Web Services,” in in Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, V. Cardellini, E. Casalicchio, K. Castelo Branco, J. Estrella, and F. Monaco, Eds. Hershey: IGI Global, 2011, pp. 189–211. [publication]Nuno Antunes and Marco Vieira , "Detecting Vulnerabilities in Web Services: Can Developers Rely on Existing Tools?", in Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, 2011 [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Building Web Services with Time Requirements", in Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, 2011 2009(1 publication) [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Robustness Validation in Service Oriented Architectures", in Architecting Dependable Systems VI, vol. 6, 2009 [citation][year=2013]Antonio Bovenzi, Aniello Napolitano, Christian Esposito, and Gabriella Carrozza, “JFIT: an Automatic Tool for Assessing Robustness of DDS-Compliant Middleware,” Innovative Technologies for Dependable OTS-Based Critical Systems, ed by. Domenico Cotroneo, 69–81, Springer Milan, ISBN: 978-88-470-2771-8, 978-88-470-2772-5. http://link.springer.com/chapter/10.1007/978-88-470-2772-5_6, 1 January 2013. [citation][year=2012]1. Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, and Yannis Soupionis, “Formal analysis for robust anti-SPIT protection using model checking,” International Journal of Information Security, doi:10.1007/s10207-012-0159-4, February 2012. [citation][year=2011]1. A. Napolitano, G. Carrozza, A. Bovenzi, C. Esposito, "Automatic Robustness Assessment of DDS-Compliant Middleware", 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC), Pasadena, CA, USA, December 2011. 2008(2 publications) [publication]Joao Duraes and Marco Vieira and Madeira, H. , "Dependability Benchmarking of Web-Servers", in Dependability Benchmarking for Computer Systems (ISBN: 978-0-470-23055-8), 2008 [publication]Marco Vieira and Joao Duraes and Madeira, H. , "Dependability Benchmarks for OLTP Systems", in Dependability Benchmarking for Computer Systems (ISBN: 978-0-470-23055-8), 2008 [citation][year=2010]1. Anakreon Mentis, Panagiotis Katsaros, Lefteris Angelis, George Kakarontzas, “Quantification of interacting runtime qualities in software architectures: insights from transaction processing in client-server architectures”, Information and Software Technology, Volume 52, Issue 12, December 2010. PhD Theses 2005(1 publication) [publication]Marco Vieira , "Dependability Benchmarking for Transactional Systems", 2005 [citation][year=2007]1. Emanuel Teixeira, “Ferramenta de Análise de Código para Detecção de Vulnerabilidades”, MSc Thesis, Departament of Informatics, University of Lisbon, Lisbon, Portugal, November 2007. [citation][year=2007]2. Emanuel Teixeira, João Antunes, Nuno Ferreira Neves, "Avaliação de Ferramentas de Análise Estática de Código para Detecção de Vulnerabilidades", 3rd Conferência Nacional sobre Segurança Informática nas Organizações, SINO’07, Lisbon, Portugal, October 2007. MSc Theses 2003(1 publication) [publication]Marco Vieira , "Optimização e Avaliação do Desempenho e Recuperação em SGBD na Presença de Falhas de Operador", 2003 Tech Report 2014(1 publication) [publication]Milenkoski, A. and Marco Vieira and Payne, B.D. and Nuno Antunes and Kounev, S. , "Technical Information on Vulnerabilities of Hypercall Handlers", 2014 2013(1 publication) [publication]Milenkoski, A. and Kounev, S. and Avritzer, A. and Nuno Antunes and Marco Vieira , "On Benchmarking Intrusion Detection Systems in Virtualized Environments", 2013 [citation][year=2015]T. Huang, Y. Zhu, Y. Wu, S. Bressan, and G. Dobbie, “Anomaly detection and identification scheme for VM live migration in cloud infrastructure,” Future Generation Computer Systems, 2015. [citation][year=2015]G. V. KRISHNA, “Intrusion Detection System as a Service,” MSc Thesis, Blekinge Institute of Technology, Karlskrona, Sweden, 2015. 2003(1 publication) [publication]Marco Vieira and Madeira, H. , "DBench ' OLTP: A Dependability Benchmark for OLTP Application Environments", 2003 [citation][year=2008]1. Joyce Coleman, Tony Lau, Bhushan Lokhande, Peter Shum, Robert Wisniewski, Mary Peterson Yost, “The Autonomic Computing Benchmark”, Dependability Benchmarking for Computer Systems, Lisa Spainhower & Karama Kanoun Eds., August 2008. [citation][year=2006]1. Bhushan Lokhande, “Quantifying System Resiliency – Autonomic Computing Benchmark”, 4th Proactive Problem Prediction, Avoidance and Diagnosis Conference, IBM T.J. Watson Research Center, Yorktown Heights, New York, USA, April 25-26, 2006. [citation][year=2005]1. A.B. Brown and P. Shum, “Measuring Resiliency of IT Systems,” presentation to the Workshop on Dependability Benchmarking organized by the Special Interest Group on Dependability Benchmarking (SIGDeB), Chicago, November 2005, http://www.laas. fr/~kanoun/Ws_SIGDeB/5-IBM.pdf. [citation][year=2005]2. Ricardo Gimenes, “Avaliação da Confiabilidade da Informação Utilizada em Sistemas de Informação e em Sistemas Críticos”, MSc Thesis, University of São Paulo, Brazil, 2005. [citation][year=2004]1. Oliver Tschache, “Deriving Dependability Measures of Measurements Recorded in a Matrix”, Organic and Pervasive Computing - International Conference on Architecture of Computing Systems, ARCS 2004, Augsburg, Germany, March 26, 2004.