Towards Designing Shared Digital Forensics Instructional Materials | 0 | 0.34 | 2022 |
Towards a Theory on Testing XACML Policies | 0 | 0.34 | 2022 |
Quantifying Event Impact on the Bitcoin Blockchain | 0 | 0.34 | 2021 |
Mutation Analysis of NGAC Policies | 0 | 0.34 | 2021 |
Automated Strong Mutation Testing of XACML Policies | 0 | 0.34 | 2020 |
Vswitchguard: Defending Openflow Switches Against Saturation Attacks | 0 | 0.34 | 2020 |
Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic | 4 | 0.46 | 2020 |
Identifying suspicious addresses in Bitcoin thefts. | 2 | 0.35 | 2019 |
Deviant: A Mutation Testing Tool for Solidity Smart Contracts | 0 | 0.34 | 2019 |
Forensic Analysis of Bitcoin Transactions | 0 | 0.34 | 2019 |
Automated Coverage-Based Testing of XACML Policies. | 2 | 0.36 | 2018 |
Detecting Saturation Attacks in Software-Defined Networks | 1 | 0.36 | 2018 |
Model Checking of Security Properties in Industrial Control Systems (ICS). | 1 | 0.38 | 2018 |
XPA: An Open Soruce IDE for XACML Policies (S). | 0 | 0.34 | 2018 |
Model-Based Testing of Obligatory ABAC Systems | 0 | 0.34 | 2018 |
Message from the SEPT Symposium Program Chairs | 0 | 0.34 | 2018 |
Network slicing to improve multicasting in HPC clusters. | 0 | 0.34 | 2018 |
Software Security Testing via Misuse Case Modeling | 0 | 0.34 | 2017 |
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names | 1 | 0.36 | 2017 |
Automated Fault Localization of XACML Policies. | 2 | 0.36 | 2016 |
Interaction-based Reputation Model in Online Social Networks. | 1 | 0.36 | 2016 |
Message from the SEPT Organizing Committee | 0 | 0.34 | 2016 |
Conformance Testing of Balana: An Open Source Implementation of the XACML3.0 Standard. | 0 | 0.34 | 2016 |
Automated Integration Testing Using Logical Contracts. | 1 | 0.35 | 2016 |
Privacy and Social Capital in Online Social Networks. | 0 | 0.34 | 2016 |
Analysis of Healthcare Workflows in Accordance with Access Control Policies | 0 | 0.34 | 2016 |
Towards automatic repair of access control policies. | 0 | 0.34 | 2016 |
Detecting Incorrect Uses Of Combining Algorithms In Xacml 3.0 Policies | 0 | 0.34 | 2015 |
Security of Software Defined Networks: A survey | 13 | 0.67 | 2015 |
Message from SEPT Symposium Organizing Committee | 0 | 0.34 | 2015 |
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets | 9 | 0.58 | 2015 |
An Automated Test Generation Technique for Software Quality Assurance | 9 | 0.51 | 2015 |
Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies | 3 | 0.40 | 2015 |
Model-Based Testing of SDN Firewalls: A Case Study | 0 | 0.34 | 2015 |
Fault-Based Testing of Combining Algorithms in XACML3.0 Policies. | 3 | 0.40 | 2015 |
Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare | 2 | 0.38 | 2014 |
Automated Generation of Integration Test Sequences from Logical Contracts | 0 | 0.34 | 2014 |
Effectiveness of Automated Function Testing with Petri Nets: A Series of Controlled Experiments. | 0 | 0.34 | 2014 |
Toward a mature industrial practice of software test automation | 0 | 0.34 | 2014 |
Rule-Based Test Input Generation from Bytecode | 3 | 0.47 | 2014 |
A threat model-based approach to security testing | 13 | 0.84 | 2013 |
Software security testing of an online banking system: a unique research experience for undergraduates and computer teachers | 0 | 0.34 | 2013 |
An UML Behavior Diagram Based Automatic Testing Approach | 0 | 0.34 | 2013 |
Testing access control and obligation policies | 1 | 0.35 | 2013 |
System resilience modeling and enhancement for the cloud | 1 | 0.35 | 2013 |
Mining Test Oracles for Test Inputs Generated from Java Bytecode | 1 | 0.35 | 2013 |
Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing | 6 | 0.53 | 2013 |
An Approach for Analyzing Software Specifications in Petri Nets. | 1 | 0.37 | 2013 |
Automated Generation of Concurrent Test Code from Function Nets. | 0 | 0.34 | 2012 |
Model-Based Metamorphic Testing: A Case Study. | 2 | 0.37 | 2012 |