Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
Free Online Productivity Tools
i2Speak
i2Symbol
i2OCR
iTex2Img
iWeb2Print
iWeb2Shot
i2Type
iPdf2Split
iPdf2Merge
i2Bopomofo
i2Arabic
i2Style
i2Image
i2PDF
iLatex2Rtf
Sci2ools
21
click to vote
ICST
2010
IEEE
favorite
Email
discuss
report
96
views
Software Engineering
»
more
ICST 2010
»
Verified Firewall Policy Transformations for Test Case Generation
13 years 6 months ago
Download
www.infsec.ethz.ch
Achim D. Brucker, Lukas Brügger, Paul Kearney
Real-time Traffic
ICST 2010
|
Software Engineering
|
claim paper
Related Content
»
An Automated Framework for Validating Firewall Policy Enforcement
»
Verifying TestHypotheses An Experiment in Test and Proof
»
Towards ModelDriven Testing of a Web Application Generator
»
Test Case Integration From Components to Systems
»
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
»
Testing Concurrent Java Programs using Randomized Scheduling
»
Model Checking for Verification of Mandatory Access Control Models and Properties
»
A Framework for Planning in Continuoustime Stochastic Domains
more »
Post Info
More Details (n/a)
Added
13 Feb 2011
Updated
13 Feb 2011
Type
Journal
Year
2010
Where
ICST
Authors
Achim D. Brucker, Lukas Brügger, Paul Kearney, Burkhart Wolff
Comments
(0)
Researcher Info
Software Engineering Study Group
Computer Vision