-
1
-
-
84955606787
-
Applying Practical Formal Methods to the Specification and Analysis of Security Properties
-
Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. Springer, Heidelberg
-
Heitmeyer, C.: Applying Practical Formal Methods to the Specification and Analysis of Security Properties. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 84-89. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2052
, pp. 84-89
-
-
Heitmeyer, C.1
-
2
-
-
0020204093
-
On testing non-testable programs
-
Weyuker, E.J.: On testing non-testable programs. Computer Journal 25, 465-470 (1982)
-
(1982)
Computer Journal
, vol.25
, pp. 465-470
-
-
Weyuker, E.J.1
-
5
-
-
84864299917
-
Secure Coding in C and C++
-
Robert, C.: Secure Coding in C and C++. Person Education (2010)
-
(2010)
Person Education
-
-
Robert, C.1
-
6
-
-
73149094741
-
Mutation-based Testing of Integer Overflow Vulnerabilities
-
IEEE Press, Beijing
-
Zeng, F., Mao, L., Chen, Z., Cao, Q.: Mutation-based Testing of Integer Overflow Vulnerabilities. In: The 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, September 24-26. IEEE Press, Beijing (2009)
-
(2009)
The 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, September 24-26
-
-
Zeng, F.1
Mao, L.2
Chen, Z.3
Cao, Q.4
-
7
-
-
33750183958
-
Case studies on the selection of useful relations in metamorphic testing
-
Chen, T.Y., Huang, D.H., Tse, T.H., et al.: Case studies on the selection of useful relations in metamorphic testing. In: Proceeding of the 4th Ibero-American Symposium on Software Engineering and Knowledge Engineering, JIISIC 2004, Polytechnic University of Madrid, Madrid Spain, pp. 569-583 (2004)
-
(2004)
Proceeding of the 4th Ibero-American Symposium on Software Engineering and Knowledge Engineering, JIISIC 2004, Polytechnic University of Madrid, Madrid Spain
, pp. 569-583
-
-
Chen, T.Y.1
Huang, D.H.2
Tse, T.H.3
-
8
-
-
78149234453
-
TCAS software verification using Constraint Programming
-
vol. 00:0, Cambridge University Press
-
Gotlieb, A.: TCAS software verification using Constraint Programming. The Knowledge Engineering Review, vol. 00:0, pp. 1-15. Cambridge University Press (2009)
-
(2009)
The Knowledge Engineering Review
, pp. 1-15
-
-
Gotlieb, A.1
-
9
-
-
23744438363
-
Metamorphic testing and special case testing: A case study
-
Wu, P., Shi, X.C., Tang, J.J., Lin, H.M., Chen, T.Y.: Metamorphic testing and special case testing: A case study. Journal of Software 16(7), 1210-1220 (2005)
-
(2005)
Journal of Software
, vol.16
, Issue.7
, pp. 1210-1220
-
-
Wu, P.1
Shi, X.C.2
Tang, J.J.3
Lin, H.M.4
Chen, T.Y.5
-
10
-
-
78649868028
-
Security Assurance with Metamorphic Testing and Genetic Algorithm
-
Dong, G.W., Wu, S.Z., Wang, G.S., Guo, T., Huang, Y.G.: Security Assurance with Metamorphic Testing and Genetic Algorithm. In: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 368-373 (2010)
-
(2010)
IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, pp. 368-373
-
-
Dong, G.W.1
Wu, S.Z.2
Wang, G.S.3
Guo, T.4
Huang, Y.G.5
|