Learn More
Keywords: Systematic literature review Cross-site scripting Security Web applications a b s t r a c t Context: Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack of sanitization of user inputs. The security vulnerability caused many problems for users and server applications. Objective: To(More)
A typical component-based system architecture comprises a set of components that have been purposefully designed and structured to ensure that they have "pluggable" interfaces and an acceptable match with a defined system context. However, the black-box nature of many software components means there is never a clean match between system specifications and(More)
Software reuse has been recognised as an attractive idea with an obvious payoff to achieve software that is faster, better and cheaper. One important component to be highlighted in designing reusable object-oriented software is design patterns. Design patterns describe a commonly recurring structure of communicating components that solve a general design(More)
Metaphor is a representation of object and situation that have meaning and comparable to real thing to convey the message to people. The purpose of using metaphor is to facilitate in making communication more direct and effective for particular user communities. This study reveals design metaphor issues for paddy farmer population in agriculture domain in(More)
Computer-based learning model acts as an important supplement to traditional teaching method that commonly using pen, paper or any material, which apply multi-senses application for students with dyslexia. The need to improve learning style for students with dyslexia raised by many researchers, teachers and also parents. Students with dyslexia have poor(More)
Dyslexia is one of the most common Specific Learning Difficulties (SpLDs) in the world. Students with dyslexia have poor fluency in reading, writing, spelling, speech, short-term memory, and also other related disorders. In addition emotion is recognised as important as the cognitive difficulty that affects dyslexia learning. Students with dyslexia often(More)
In recent times, there is an alarming increase in web application attacks, with significant cases, specifically, targeting Islamic websites. Since 2004, SQL Injection Vulnerabilities (SQLIVs) remains the most serious software security loopholes via which web applications are exploited. Fixing SQLIVs prior to deployment would provide very effective means of(More)
— Personal Information Management (PIM) is an important discipline that evolves with the technology advancements in their operating systems. The understanding of its four main activities in PIM: organizing, retrieving, deleting and archiving are crucial because the information growth in our desktop increased overtime. The paper presents the study conducted(More)
Teaching and learning for software design course at universities demands a sufficient supervision from the educators (e.g., instructors, lecturers, teachers, mentors and others) and also active communications between students and lecturers. With adequate practice of software design problems/exercises, it can enhance students' knowledge in software design. A(More)