-
1
-
-
64249084113
-
Automated pseudo-live testing of firewall configuration enforcement
-
E. Al-Shaer, A. El-Atawy, and T. Samak. Automated pseudo-live testing of firewall configuration enforcement. Selected Areas in Communications, IEEE Journal on, 27(3):302-314, 2009.
-
(2009)
Selected Areas in Communications, IEEE Journal on
, vol.27
, Issue.3
, pp. 302-314
-
-
Al-Shaer, E.1
El-Atawy, A.2
Samak, T.3
-
2
-
-
84880168690
-
An orchestrated survey of methodologies for automated software test case generation
-
S. Anand, E. K. Burke, T. Y. Chen, J. Clark, M. B. Cohen, W. Grieskamp, M. Harman, M. J. Harrold, and P. McMinn. An orchestrated survey of methodologies for automated software test case generation. Journal of Systems and Software, 86(8):1978-2001, 2013.
-
(2013)
Journal of Systems and Software
, vol.86
, Issue.8
, pp. 1978-2001
-
-
Anand, S.1
Burke, E.K.2
Chen, T.Y.3
Clark, J.4
Cohen, M.B.5
Grieskamp, W.6
Harman, M.7
Harrold, M.J.8
McMinn, P.9
-
4
-
-
74049135306
-
Effective detection of SQL/XPath injection vulnerabilities in web services
-
N. Antunes, N. Laranjeiro, M. Vieira, and H. Madeira. Effective detection of SQL/XPath injection vulnerabilities in web services. In Proceedings of the 6th IEEE International Conference on Services Computing (SCC '09), pages 260-267, 2009.
-
(2009)
Proceedings of the 6th IEEE International Conference on Services Computing (SCC '09)
, pp. 260-267
-
-
Antunes, N.1
Laranjeiro, N.2
Vieira, M.3
Madeira, H.4
-
5
-
-
84929709792
-
Automated testing for SQL injection vulnerabilities: An input mutation approach
-
New York, NY, USA. ACM
-
D. Appelt, C. D. Nguyen, L. C. Briand, and N. Alshahwan. Automated testing for sql injection vulnerabilities: An input mutation approach. In Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA 2014, pages 259-269, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA 2014
, pp. 259-269
-
-
Appelt, D.1
Nguyen, C.D.2
Briand, L.C.3
Alshahwan, N.4
-
6
-
-
0003479517
-
-
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
-
W. Banzhaf, F. D. Francone, R. E. Keller, and P. Nordin. Genetic Programming: An Introduction: on the Automatic Evolution of Computer Programs and Its Applications. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1998.
-
(1998)
Genetic Programming: An Introduction: On the Automatic Evolution of Computer Programs and Its Applications
-
-
Banzhaf, W.1
Francone, F.D.2
Keller, R.E.3
Nordin, P.4
-
8
-
-
77954486920
-
Verified firewall policy transformations for test case generation
-
IEEE
-
A. D. Brucker, L. Brgger, P. Kearney, and B. Wolff. Verified firewall policy transformations for test case generation. In Software Testing, Verification and Validation (ICST), 2010 Third International Conference on, pages 345-354. IEEE, 2010.
-
(2010)
Software Testing, Verification and Validation (ICST), 2010 Third International Conference on
, pp. 345-354
-
-
Brucker, A.D.1
Brgger, L.2
Kearney, P.3
Wolff, B.4
-
9
-
-
79951827552
-
Locating software features in a soa composite application
-
J. Coffey, L. White, N. Wilde, and S. Simmons. Locating software features in a soa composite application. In Web Services (ECOWS), 2010 IEEE 8th European Conference on, pages 99-106, 2010.
-
(2010)
Web Services (ECOWS), 2010 IEEE 8th European Conference on
, pp. 99-106
-
-
Coffey, J.1
White, L.2
Wilde, N.3
Simmons, S.4
-
11
-
-
40449116802
-
A classification of SQL-injection attacks and countermeasures
-
Arlington, VA, USA
-
W. Halfond, J. Viegas, and A. Orso. A classification of sql-injection attacks and countermeasures. In Proceedings of the IEEE International Symposium on Secure Software Engineering, Arlington, VA, USA, pages 13-15, 2006.
-
(2006)
Proceedings of the IEEE International Symposium on Secure Software Engineering
, pp. 13-15
-
-
Halfond, W.1
Viegas, J.2
Orso, A.3
-
12
-
-
76749092270
-
The weka data mining software: An update
-
Nov.
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: An update. SIGKDD Explor. Newsl., 11(1):10-18, Nov. 2009.
-
(2009)
SIGKDD Explor. Newsl.
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
14
-
-
58149092995
-
Systematic structural testing of firewall policies
-
IEEE
-
J. Hwang, T. Xie, F. Chen, and A. X. Liu. Systematic structural testing of firewall policies. In Reliable Distributed Systems, 2008. SRDS'08. IEEE Symposium on, pages 105-114. IEEE, 2008.
-
(2008)
Reliable Distributed Systems, 2008. SRDS'08. IEEE Symposium on
, pp. 105-114
-
-
Hwang, J.1
Xie, T.2
Chen, F.3
Liu, A.X.4
-
15
-
-
84891450004
-
Specification-based testing of firewalls
-
In D. Bjørner, M. Broy, and A. Zamulin, editors. Springer Berlin Heidelberg
-
J. Jürjens and G. Wimmel. Specification-based testing of firewalls. In D. Bjørner, M. Broy, and A. Zamulin, editors, Perspectives of System Informatics, volume 2244 of Lecture Notes in Computer Science, pages 308-316. Springer Berlin Heidelberg, 2001.
-
(2001)
Perspectives of System Informatics, Volume 2244 of Lecture Notes in Computer Science
, pp. 308-316
-
-
Jürjens, J.1
Wimmel, G.2
-
16
-
-
37049007001
-
Testing input validation in web applications through automated model recovery
-
H. Liu and H. B. Kuan Tan. Testing input validation in web applications through automated model recovery. Journal of Systems and Software, 81(2):222-233, 2008.
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.2
, pp. 222-233
-
-
Liu, H.1
Kuan Tan, H.B.2
-
17
-
-
3142725712
-
Search-based software test data generation: A survey
-
P. McMinn. Search-based software test data generation: a survey. Software Testing, Verification and Reliability, 14(2):105-156, 2004.
-
(2004)
Software Testing, Verification and Reliability
, vol.14
, Issue.2
, pp. 105-156
-
-
McMinn, P.1
-
18
-
-
16244370108
-
Bypass testing of web applications
-
IEEE
-
J. Offutt, Y. Wu, X. Du, and H. Huang. Bypass testing of web applications. In Software Reliability Engineering, 2004. ISSRE 2004. 15th International Symposium on, pages 187-197. IEEE, 2004.
-
(2004)
Software Reliability Engineering, 2004. ISSRE 2004. 15th International Symposium on
, pp. 187-197
-
-
Offutt, J.1
Wu, Y.2
Du, X.3
Huang, H.4
-
19
-
-
24944508565
-
Firewall conformance testing
-
In F. Khendek and R. Dssouli, editors. Springer Berlin Heidelberg
-
D. Senn, D. Basin, and G. Caronni. Firewall conformance testing. In F. Khendek and R. Dssouli, editors, Testing of Communicating Systems, volume 3502 of Lecture Notes in Computer Science, pages 226-241. Springer Berlin Heidelberg, 2005.
-
(2005)
Testing of Communicating Systems, Volume 3502 of Lecture Notes in Computer Science
, pp. 226-241
-
-
Senn, D.1
Basin, D.2
Caronni, G.3
-
20
-
-
84908637366
-
Management of an academic HPC cluster: The UL experience
-
Bologna, Italy, July. IEEE
-
S. Varrette, P. Bouvry, H. Cartiaux, and F. Georgatos. Management of an Academic HPC Cluster: The UL Experience. In Proc. of the 2014 Intl. Conf. on High Performance Computing & Simulation (HPCS 2014), pages 959-967, Bologna, Italy, July 2014. IEEE.
-
(2014)
Proc. of the 2014 Intl. Conf. on High Performance Computing & Simulation (HPCS 2014)
, pp. 959-967
-
-
Varrette, S.1
Bouvry, P.2
Cartiaux, H.3
Georgatos, F.4
|