A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Impact Factor 2.365 GLOBAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGIES AND SCIENCES AUTOMATED VERIFICATION OF ACTIVITY DIAGRAM USING UMLSEC ON XMI DATA
unpublished
Vulnerability is outlined as any defect within the software package, which results attackers to induce access to confidential data. While vulnerabilities in code are well documented very little analysis has been done to find vulnerabilities in design per UML. The presence of vulnerability within the design model of the system makes it necessary to possess a tool that may facilitate developers to avoid or notice them within the design stage Here we describe mechanism to find the defect in
fatcat:b7v4rrzynre2tjagom2rimujom