메뉴 건너뛰기




Volumn , Issue , 2010, Pages 141-149

Reverse engineering utility functions using genetic programming to detect anomalous behavior in software

Author keywords

Autonomic computing; Genetic programming; Software fault tolerance; Utility function

Indexed keywords

ANOMALOUS BEHAVIOR; AUTONOMIC COMPUTING; FALSE ALARMS; HIGH PRECISION; MEMORY USAGE; OPEN SOURCES; PRECISION AND RECALL; RELATIVE IMPORTANCE; RESOURCE USAGE; RUNTIMES; SECURITY ATTACKS; SOFTWARE ENGINEERS; SOFTWARE FAULT TOLERANCES; SOFTWARE SYSTEMS; SYSTEM RESOURCES; THRESHOLDING; UTILITY FUNCTIONS; WEB SERVERS;

EID: 78650634439     PISSN: 10951350     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCRE.2010.23     Document Type: Conference Paper
Times cited : (8)

References (23)
  • 5
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • Jan.
    • J. O. Kephart and D. M. Chess, "The vision of autonomic computing," IEEE Computer, vol. 36, no. 1, pp. 41-50, Jan. 2003.
    • (2003) IEEE Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.O.1    Chess, D.M.2
  • 9
    • 7244223259 scopus 로고    scopus 로고
    • Rainbow: Architecture-based self adaptation with reusable infrastructure
    • Oct.
    • D. Garlan, S.-W. Cheng, A.-C. Huang, B. Schmerl, and P. Steenkiste, "Rainbow: Architecture-based self adaptation with reusable infrastructure," IEEE Computer, vol. 37, no. 10, pp. 41-50, Oct. 2004.
    • (2004) IEEE Computer , vol.37 , Issue.10 , pp. 41-50
    • Garlan, D.1    Cheng, S.-W.2    Huang, A.-C.3    Schmerl, B.4    Steenkiste, P.5
  • 12
    • 33645833890 scopus 로고    scopus 로고
    • On the automatic modularization of software systems using the bunch tool
    • B. S. Mitchell and S. Mancoridis, "On the automatic modularization of software systems using the Bunch tool," IEEE Transactions on Software Engineering, vol. 32, no. 3, pp. 193-208, 2006.
    • (2006) IEEE Transactions on Software Engineering , vol.32 , Issue.3 , pp. 193-208
    • Mitchell, B.S.1    Mancoridis, S.2
  • 14
    • 34548108422 scopus 로고    scopus 로고
    • Using code metric histograms and genetic algorithms to perform author identification for software forensics
    • Jul.
    • R. C. Lange and S. Mancoridis, "Using code metric histograms and genetic algorithms to perform author identification for software forensics," in Proc. Genetic and Evolutionary Computation Conference, Jul. 2007, pp. 2082-2089.
    • (2007) Proc. Genetic and Evolutionary Computation Conference , pp. 2082-2089
    • Lange, R.C.1    Mancoridis, S.2
  • 21
    • 0034268828 scopus 로고    scopus 로고
    • Two fast tree-creation algorithms for genetic programming
    • S. Luke, "Two fast tree-creation algorithms for genetic programming," IEEE Transactions on Evolutionary Computation, vol. 4, no. 3, pp. 274-283.
    • IEEE Transactions on Evolutionary Computation , vol.4 , Issue.3 , pp. 274-283
    • Luke, S.1
  • 22
    • 33846323617 scopus 로고    scopus 로고
    • Linkage learning via probabilistic modeling in the extended compact genetic algorithm
    • J. Kacprzyk, Ed. Springer
    • G. R. Harik, F. G. Lobo, and K. Sastry, "Linkage learning via probabilistic modeling in the extended compact genetic algorithm," in Studies in Computational Intelligence, J. Kacprzyk, Ed. Springer, 2006, vol. 33, pp. 39-61.
    • (2006) Studies in Computational Intelligence , vol.33 , pp. 39-61
    • Harik, G.R.1    Lobo, F.G.2    Sastry, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.