共 41 条
[1]
Aigner M., 1973, Journal of Combinatorial Theory, Series B, V14, P187, DOI 10.1016/0095-8956(73)90001-4
[2]
Amalfitano Domenico, 2010, Proceedings of the IEEE Third International Conference on Software Testing Verification and Validation - Workshops (ICSTW 2010), P274, DOI 10.1109/ICSTW.2010.34
[3]
Reverse Engineering Finite State Machines from Rich Internet Applications
[J].
FIFTEENTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS,
2008,
:69-+
[4]
Anderson I., 1987, AP FLEX
[5]
Anderson I., 1987, Combinatorics of finite sets
[6]
[Anonymous], 1951, NIEUW ARCH WISKD
[7]
[Anonymous], 2003, ACM Transactions on Internet Technology (TOIT), DOI DOI 10.1145/857166.857170
[8]
[Anonymous], 2001, ACM T INTERNET TECHN, DOI DOI 10.1145/383034.383035
[9]
State of the Art: Automated Black-Box Web Application Vulnerability Testing
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:332-345
[10]
Benjamin Kamara, 2010, Proceedings of the IEEE Third International Conference on Software Testing Verification and Validation - Workshops (ICSTW 2010), P403, DOI 10.1109/ICSTW.2010.46