-
1
-
-
63849251457
-
-
Apache Tomcat. http://www.akarta.apache.org/tomcat
-
Apache Tomcat
-
-
-
2
-
-
70349932871
-
-
The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
-
The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
-
-
-
-
3
-
-
70349925750
-
Towards Practical Automatic Generation of Multipath Vulnerability Signatures
-
Technical Report, Carnegie Mellon University, April
-
D. Brumley, Z. Liang, J. Newsome, D. Song. "Towards Practical Automatic Generation of Multipath Vulnerability Signatures". Technical Report, Carnegie Mellon University, April 2007.
-
(2007)
-
-
Brumley, D.1
Liang, Z.2
Newsome, J.3
Song, D.4
-
4
-
-
33751056900
-
-
D. Brumley, J. Newsome, D. Song, H. Wang, S. Jha. Towards Automatic Generation of Vulnerability-Based Signatures. Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 2006, pp. 2-16.
-
D. Brumley, J. Newsome, D. Song, H. Wang, S. Jha. "Towards Automatic Generation of Vulnerability-Based Signatures". Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 2006, pp. 2-16.
-
-
-
-
6
-
-
33748704060
-
Clique-detection models in computational biochemistry and genomics
-
S. Butenko and W. E. Wilhelm, "Clique-detection models in computational biochemistry and genomics", European Journal of Operational Research, 173(1), pp. 1-17, 2006.
-
(2006)
European Journal of Operational Research
, vol.173
, Issue.1
, pp. 1-17
-
-
Butenko, S.1
Wilhelm, W.E.2
-
7
-
-
0032639445
-
Dynamically Discovering Likely Program Invariants to Support Program Evolution
-
99, Los Angeles, CA, USA, May
-
st International Conference on Software Engineering (ICSE '99), Los Angeles, CA, USA, May 1999, pp. 213-224.
-
(1999)
st International Conference on Software Engineering (ICSE
, pp. 213-224
-
-
Ernst, M.1
Cockrell, J.2
Griswold, W.3
Notkin, D.4
-
8
-
-
70349100099
-
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, W. Gong. Anomaly Detection using Call Stack Information. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003, p. 62.
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, W. Gong. "Anomaly Detection using Call Stack Information". Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003, p. 62.
-
-
-
-
9
-
-
0029716418
-
-
S. Forrest, S. Hofmeyr, A. Somayaji, T. longstaff. A Sense of Self for Unix Processes. Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, May 1996, pp. 120-128.
-
S. Forrest, S. Hofmeyr, A. Somayaji, T. longstaff. "A Sense of Self for Unix Processes". Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, May 1996, pp. 120-128.
-
-
-
-
10
-
-
33750298577
-
Automated Discovery of Mimicry Attacks
-
Hamburg, Germany, September
-
J. Giffin, S. Jha, B. Miller. "Automated Discovery of Mimicry Attacks". Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID '06), Hamburg, Germany, September 2006, pp. 41-60.
-
(2006)
Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID '06)
, pp. 41-60
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
11
-
-
70349900992
-
Computing Unique Input/Output Sequences using Genetic Algorithms
-
Montreal, Canada, October
-
Q. Guo, R.M. Hierons, M. Harman, K. Derderian, "Computing Unique Input/Output Sequences using Genetic Algorithms". Proceedings of the 3rd International Workshop on Formal Approaches to Software Testing (FATES '03), Montreal, Canada, October 2003, pp. 1098-1100.
-
(2003)
Proceedings of the 3rd International Workshop on Formal Approaches to Software Testing (FATES '03)
, pp. 1098-1100
-
-
Guo, Q.1
Hierons, R.M.2
Harman, M.3
Derderian, K.4
-
12
-
-
0031167903
-
A genetic algorithm-based heuristic for solving the weighted maximum independent set and some equivalent problems
-
M. Hifi, "A genetic algorithm-based heuristic for solving the weighted maximum independent set and some equivalent problems". The Journal of the Operational Research Society, 48(6), pp. 612-622, 1997.
-
(1997)
The Journal of the Operational Research Society
, vol.48
, Issue.6
, pp. 612-622
-
-
Hifi, M.1
-
13
-
-
0036040176
-
Visualization of Test Information to Assist Fault Localization
-
Orlando, Florida, USA, May
-
Jones J., Harrold M. J., and Stasko J. "Visualization of Test Information to Assist Fault Localization". In Proceedings of the 24th International Conference on Software Engineering, Orlando, Florida, USA, May 2002, pp. 467-477.
-
(2002)
Proceedings of the 24th International Conference on Software Engineering
, pp. 467-477
-
-
Jones, J.1
Harrold, M.J.2
Stasko, J.3
-
14
-
-
85084163246
-
-
th USENIX Security Symposium, San Diego, California, August 2004, pp. 271-286.
-
th USENIX Security Symposium, San Diego, California, August 2004, pp. 271-286.
-
-
-
-
15
-
-
0142157009
-
-
C. Kruegel, D. Mutz, F. Valeur, G. Vigna. On the Detection of Anomalous System Call Arguments. Proceedings of the 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 2003, pp. 326-343.
-
C. Kruegel, D. Mutz, F. Valeur, G. Vigna. "On the Detection of Anomalous System Call Arguments". Proceedings of the 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 2003, pp. 326-343.
-
-
-
-
16
-
-
77950880816
-
Securing Web Applications with Static and Dynamic Information Flow Tracking
-
San Francisco, California, USA, January
-
M. Lam, M. Martin, B. Livshits, J. Whaley. "Securing Web Applications with Static and Dynamic Information Flow Tracking". Proceedings of the 2008 ACM SIGPLAN symposium on Partial Evaluation and Semantics-based Program Manipulation (PEPM'08), San Francisco, California, USA, January 2008, pp. 3-12.
-
(2008)
Proceedings of the 2008 ACM SIGPLAN symposium on Partial Evaluation and Semantics-based Program Manipulation (PEPM'08)
, pp. 3-12
-
-
Lam, M.1
Martin, M.2
Livshits, B.3
Whaley, J.4
-
17
-
-
34047189734
-
Search Algorithms for Regression Test Case Prioritization
-
Z. Li, M. Harman, R.M. Hierons, "Search Algorithms for Regression Test Case Prioritization", IEEE Transactions on Software Engineering, 33(4), pp. 225-237, 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.4
, pp. 225-237
-
-
Li, Z.1
Harman, M.2
Hierons, R.M.3
-
18
-
-
84923564816
-
Finding Security Vulnerabilities in Java Applications with Static Analysis
-
Baltimore, Maryland, USA, July/August
-
th conference on USENIX Security Symposium (USENIX '05), Baltimore, Maryland, USA, July/August 2005, pp. 271-286.
-
(2005)
th conference on USENIX Security Symposium (USENIX '05)
, pp. 271-286
-
-
Livshits, B.1
Lam, M.S.2
-
19
-
-
47349109259
-
Towards Self-Protecting Enterprise Applications
-
Trollhättan, Sweden, November
-
D. Lorenzoli, L. Mariani, M. Pezza. "Towards Self-Protecting Enterprise Applications". Proceedings of the 18th IEEE International Symposium on Software Reliability (ISSRE '07), Trollhättan, Sweden, November 2007.
-
(2007)
Proceedings of the 18th IEEE International Symposium on Software Reliability (ISSRE '07)
-
-
Lorenzoli, D.1
Mariani, L.2
Pezza, M.3
-
21
-
-
31744432699
-
Finding Application Errors and Security Flaws using PQL: A Program Query Language
-
San Diego, California, USA, October
-
th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications (OOPSLA '05), San Diego, California, USA, October 2005, pp. 365-383.
-
(2005)
th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications (OOPSLA '05)
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.3
-
22
-
-
53049096535
-
Application-based Anomaly Intrusion Detection with Dynamic Information Flow Analysis
-
W. Masri, A. Podgurski. "Application-based Anomaly Intrusion Detection with Dynamic Information Flow Analysis". Computers and Security (ELSEVIER), 27(5-6), pp. 176-187, 2008.
-
(2008)
Computers and Security (ELSEVIER)
, vol.27
, Issue.5-6
, pp. 176-187
-
-
Masri, W.1
Podgurski, A.2
-
23
-
-
34250772325
-
An Empirical Study of Test Case Filtering Techniques Based On Exercising Information Flows
-
July
-
W. Masri, A. Podgurski and D. Leon. "An Empirical Study of Test Case Filtering Techniques Based On Exercising Information Flows". IEEE Transactions on Software Engineering, 33(7), pp. 454, July 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.7
, pp. 454
-
-
Masri, W.1
Podgurski, A.2
Leon, D.3
-
24
-
-
32544433135
-
A hybrid heuristic for the maximum clique problem
-
A. Singh and A.K. Gupta, "A hybrid heuristic for the maximum clique problem", Journal of Heuristics, 12(1-2), pp. 5-22, 2006.
-
(2006)
Journal of Heuristics
, vol.12
, Issue.1-2
, pp. 5-22
-
-
Singh, A.1
Gupta, A.K.2
-
25
-
-
0034836394
-
-
D. Wagner, D. Dean. Intrusion Detection via Static Analysis. Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2001, pp. 156-168.
-
D. Wagner, D. Dean. "Intrusion Detection via Static Analysis". Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2001, pp. 156-168.
-
-
-
-
26
-
-
0038011184
-
-
D. Wagner, P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. Proceedings of the 9th ACM conference on Computer and Communications Security, Washington, DC, USA, November 2002, pp. 255-264.
-
D. Wagner, P. Soto. "Mimicry Attacks on Host-Based Intrusion Detection Systems". Proceedings of the 9th ACM conference on Computer and Communications Security, Washington, DC, USA, November 2002, pp. 255-264.
-
-
-
|