共 28 条
- [21] Automatically performing weak mutation with the aid of symbolic execution, concolic testing and search-based testing Software Quality Journal, 2011, 19
- [23] Combining Symbolic Execution and Search-Based Testing for Programs with Complex Heap Inputs PROCEEDINGS OF THE 26TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA'17), 2017, : 90 - 101
- [24] Branch Sequence Coverage Criterion for Testing-Based Formal Verification with Symbolic Execution 2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 205 - 212
- [25] Network Intrusion Detection Using an Evolutionary Fuzzy Rule-Based System WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 172 - 177
- [26] Automating Network Security Analysis at Packet-level by using Rule-based Engine PROCEEDINGS OF THE 6TH CONFERENCE ON THE ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS 2019), 2020,
- [27] An Automated Testing Tool for Java']Java Application Using Symbolic Execution based Test Case Generation 2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 2, 2013, : 93 - 98
- [28] Rule-Based Network Intrusion Detection System for Port Scanning with Efficient Port Scan Detection Rules Using Snort INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 339 - 350