共 24 条
[12]
Bandit based Monte-Carlo planning
[J].
MACHINE LEARNING: ECML 2006, PROCEEDINGS,
2006, 4212
:282-293
[13]
Lin F. J., 1987, Computer Communication Review, V17, P126, DOI 10.1145/55483.55496
[14]
Mooney C. Z., 1997, Monte Carlo Simulation
[16]
All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask)
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:317-331
[17]
Sen K, 2007, P 22 IEEE ACM INT C, P571, DOI [10.1145/1321631.1321746, DOI 10.1145/1321631.1321746]
[18]
Sen Koushik, 2005, Proc. ESEC/FSE, P263, DOI DOI 10.1145/1081706.1081750
[19]
Sharma A., TECHNICAL REPORT
[20]
Shoshitaishvili Y., 2016, IEEE S SEC PRIV S P