Sciweavers

752 search results - page 17 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
FORTE
2004
13 years 9 months ago
Model-Checking Plus Testing: From Software Architecture Analysis to Code Testing
Software Model-Checking and Testing are some of the most used techniques to analyze software systems and identify hidden faults. While software model-checking allows for an exhaust...
Antonio Bucchiarone, Henry Muccini, Patrizio Pelli...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 3 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
USS
2010
13 years 6 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
USS
2008
13 years 10 months ago
Experiences with Model Inference Assisted Fuzzing
In this paper we introduce the idea of model inference assisted fuzzing aimed to cost effectively improve software security. We experimented with several model inference technique...
Joachim Viide, Aki Helin, Marko Laakso, Pekka Piet...
ICASSP
2011
IEEE
13 years 4 days ago
Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures
The vulnerability of smart grid systems is a growing concern. Signal detection theory is employed here to detect a change in the system. We employ a discrete-time linear state spa...
Qian He, Rick S. Blum