eXtreme Modeling: an approach to agile model-based development
2. eXtreme Modeling: an approach to agile model-based development

Shekoufeh Kolahdouz Rahimi; Kevin Lano; Hessa Alfraihi; Howard P.Haughton

Volume 6, Issue 2 , Summer and Autumn 2019, Pages 43-52

http://dx.doi.org/10.22108/jcs.2019.115445.1018

Abstract
  Model-based development (MBD) is the development of software systems using graphical and textual models such as UML class diagrams. MBD and related approaches such as Model-driven development ...  Read More
CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption
3. CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption

Bahare Hashemzade; Majid Abdolrazzagh-Nezhad

Volume 6, Issue 2 , Summer and Autumn 2019, Pages 53-63

http://dx.doi.org/10.22108/jcs.2020.115402.1017

Abstract
  Obfuscation, as one invasive strategy, is considered to be a defense strategy in the field of software and vital information protection against security threats. This paper proposes ...  Read More
BLProM: A black-box approach for detecting business-layer processes in the web applications
4. BLProM: A black-box approach for detecting business-layer processes in the web applications

Mitra Alidoosti; Alireza Nowroozi; Ahmad Nickabadi

Volume 6, Issue 2 , Summer and Autumn 2019, Pages 65-80

http://dx.doi.org/10.22108/jcs.2020.117223.1028

Abstract
  Web application vulnerability scanners cannot detect business logic vulnerabilities (vulnerabilities related to logic) because they are not able to understand the business logic of ...  Read More