Learning to produce direct tests for security verification using constrained process discovery
暂无分享,去创建一个
Wen Chen | Li-C. Wang | Jayanta Bhadra | Kuo-Kai Hsieh | Li-C. Wang | J. Bhadra | Wen Chen | Kuo-Kai Hsieh
[1] Li-C. Wang,et al. Automatic assertion extraction via sequential data mining of simulation traces , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).
[2] Sumeet Dua,et al. Data Mining and Machine Learning in Cybersecurity , 2011 .
[3] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] Sharad Malik,et al. Zchaff2004: An Efficient SAT Solver , 2004, SAT (Selected Papers.
[5] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[6] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[7] Colin de la Higuera,et al. A bibliographical study of grammatical inference , 2005, Pattern Recognit..
[8] Marcus A. Maloof,et al. Machine Learning and Data Mining for Computer Security , 2006 .
[9] Wil M. P. van der Aalst,et al. Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .
[10] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[11] Boudewijn F. van Dongen,et al. Process mining: a two-step approach to balance between underfitting and overfitting , 2008, Software & Systems Modeling.
[12] Dana Angluin,et al. Learning Regular Sets from Queries and Counterexamples , 1987, Inf. Comput..
[13] E. Mark Gold,et al. Language Identification in the Limit , 1967, Inf. Control..
[14] Pramod Subramanyan,et al. Formal verification of taint-propagation security properties in a commercial SoC design , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[15] Marcus A. Maloof,et al. Learning to Detect Malicious Executables , 2006 .
[16] Sandip Ray,et al. Security policy enforcement in modern SoC designs , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[17] Marcus A. Maloof,et al. Machine Learning and Data Mining for Computer Security: Methods and Applications (Advanced Information and Knowledge Processing) , 2005 .
[18] Gihwon Kwon,et al. Efficient CNF Encoding for Selecting 1 from N Objects , 2007 .