共 22 条
- [1] Abraham A., 2012, DETECTING EXPLOITING
- [2] [Anonymous], 2013, P INT MULT ENG COMP
- [3] Bates D., 2010, P 19 INT C WORLD WID, P91, DOI [DOI 10.1145/1772690.1772701, 10.1145/1772690.1772701]
- [4] Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015), 2015, : 207 - 212
- [5] Security Testing Based on Attack Patterns [J]. 2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 4 - 11
- [6] Cha S. H., 2007, INT J MATH MODELS ME, V1
- [7] Adaptive Sequence Approach for OOS Test Case Prioritization [J]. 2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2016, : 205 - 212
- [8] Chen T. Y., 2007, P 2 ACM INT WORKSH R, P2
- [10] Choi H., 2017, P 2017 4 INT C COMP, P1