Name
Affiliation
Papers
DIANXIANG XU
National Center for the Protection of the Financial Infrastructure, Dakota State University, Madison, SD
131
Collaborators
Citations 
PageRank 
178
790
73.83
Referers 
Referees 
References 
1535
1936
1405
Search Limit
1001000
Title
Citations
PageRank
Year
Towards Designing Shared Digital Forensics Instructional Materials00.342022
Towards a Theory on Testing XACML Policies00.342022
Quantifying Event Impact on the Bitcoin Blockchain00.342021
Mutation Analysis of NGAC Policies00.342021
Automated Strong Mutation Testing of XACML Policies00.342020
Vswitchguard: Defending Openflow Switches Against Saturation Attacks00.342020
Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic40.462020
Identifying suspicious addresses in Bitcoin thefts.20.352019
Deviant: A Mutation Testing Tool for Solidity Smart Contracts00.342019
Forensic Analysis of Bitcoin Transactions00.342019
Automated Coverage-Based Testing of XACML Policies.20.362018
Detecting Saturation Attacks in Software-Defined Networks10.362018
Model Checking of Security Properties in Industrial Control Systems (ICS).10.382018
XPA: An Open Soruce IDE for XACML Policies (S).00.342018
Model-Based Testing of Obligatory ABAC Systems00.342018
Message from the SEPT Symposium Program Chairs00.342018
Network slicing to improve multicasting in HPC clusters.00.342018
Software Security Testing via Misuse Case Modeling00.342017
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names10.362017
Automated Fault Localization of XACML Policies.20.362016
Interaction-based Reputation Model in Online Social Networks.10.362016
Message from the SEPT Organizing Committee00.342016
Conformance Testing of Balana: An Open Source Implementation of the XACML3.0 Standard.00.342016
Automated Integration Testing Using Logical Contracts.10.352016
Privacy and Social Capital in Online Social Networks.00.342016
Analysis of Healthcare Workflows in Accordance with Access Control Policies00.342016
Towards automatic repair of access control policies.00.342016
Detecting Incorrect Uses Of Combining Algorithms In Xacml 3.0 Policies00.342015
Security of Software Defined Networks: A survey130.672015
Message from SEPT Symposium Organizing Committee00.342015
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets90.582015
An Automated Test Generation Technique for Software Quality Assurance90.512015
Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies30.402015
Model-Based Testing of SDN Firewalls: A Case Study00.342015
Fault-Based Testing of Combining Algorithms in XACML3.0 Policies.30.402015
Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare20.382014
Automated Generation of Integration Test Sequences from Logical Contracts00.342014
Effectiveness of Automated Function Testing with Petri Nets: A Series of Controlled Experiments.00.342014
Toward a mature industrial practice of software test automation00.342014
Rule-Based Test Input Generation from Bytecode30.472014
A threat model-based approach to security testing130.842013
Software security testing of an online banking system: a unique research experience for undergraduates and computer teachers00.342013
An UML Behavior Diagram Based Automatic Testing Approach00.342013
Testing access control and obligation policies10.352013
System resilience modeling and enhancement for the cloud10.352013
Mining Test Oracles for Test Inputs Generated from Java Bytecode10.352013
Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing60.532013
An Approach for Analyzing Software Specifications in Petri Nets.10.372013
Automated Generation of Concurrent Test Code from Function Nets.00.342012
Model-Based Metamorphic Testing: A Case Study.20.372012
  • 1
  • 2