Sciweavers

1562 search results - page 16 / 313
» A case study in testing a network security algorithm
Sort
View
ICSE
2009
IEEE-ACM
13 years 5 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
TSE
2002
115views more  TSE 2002»
13 years 7 months ago
Simplifying and Isolating Failure-Inducing Input
Given some test case, a program fails. Which circumstances of the test case are responsible for the particular failure? The Delta Debugging algorithm generalizes and simplifies som...
Andreas Zeller, Ralf Hildebrandt
HAIS
2010
Springer
14 years 6 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
FLAIRS
2007
13 years 9 months ago
Pattern-Constrained Test Case Generation
In this paper we present a novel approach for patternconstrained test case generation. The generation of test cases with known characteristics is usually a non-trivial task. In co...
Martin Atzmüller, Joachim Baumeister, Frank P...
SAFECOMP
2005
Springer
14 years 26 days ago
Control and Data Flow Testing on Function Block Diagrams
As programmable logic controllers(PLCs) have been used in safety-critical applications, testing of PLC applications has become important. The previous PLC-based software testing te...
Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha