Learn More
Keywords: Systematic literature review Cross-site scripting Security Web applications a b s t r a c t Context: Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack of sanitization of user inputs. The security vulnerability caused many problems for users and server applications. Objective: To(More)
A typical component-based system architecture comprises a set of components that have been purposefully designed and structured to ensure that they have "pluggable" interfaces and an acceptable match with a defined system context. However, the black-box nature of many software components means there is never a clean match between system specifications and(More)
Software reuse has been recognised as an attractive idea with an obvious payoff to achieve software that is faster, better and cheaper. One important component to be highlighted in designing reusable object-oriented software is design patterns. Design patterns describe a commonly recurring structure of communicating components that solve a general design(More)
Metaphor is a representation of object and situation that have meaning and comparable to real thing to convey the message to people. The purpose of using metaphor is to facilitate in making communication more direct and effective for particular user communities. This study reveals design metaphor issues for paddy farmer population in agriculture domain in(More)
Computer-based learning model acts as an important supplement to traditional teaching method that commonly using pen, paper or any material, which apply multi-senses application for students with dyslexia. The need to improve learning style for students with dyslexia raised by many researchers, teachers and also parents. Students with dyslexia have poor(More)
— Personal Information Management (PIM) is an important discipline that evolves with the technology advancements in their operating systems. The understanding of its four main activities in PIM: organizing, retrieving, deleting and archiving are crucial because the information growth in our desktop increased overtime. The paper presents the study conducted(More)
  • 1