Author:
Xue JingFeng,Zhang Yan,Hu ChangZhen,Ren HongYu,Li ZhiQiang
Publisher
Springer International Publishing
Reference11 articles.
1. Wang, X.Z., Sun, L.C., Lu, Y.L.: Intrusion detection approach towards software behavior trustworthiness. J. Univ. Sci. Technol. China 41(7), 626–635 (2011)
2. Peng, G.J., Tao, F., Zhang, H.G.: Research on theory model of software dynamic trustiness based on behavior integrity. In: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security, pp. 130–134. Washington, DC, USA (2009)
3. Godefroid, E., Levin, M.Y., Molnar, D.: Automated whitebox fuzz testing. In: Proceedings of the 16th Annual Network & Distributed System Security Symposium, pp. 1–10. San Diego, USA (2008)
4. Borger, E.: Abstract state machines and high-level system design and analysis. Theor. Comput. Sci. 336(2), 205–207 (2005)
5. Quante, J., Koschke, R.: Dynamic protocol recovery. In: Proceedings of the 14th International Working Conference on Reverse Engineering, pp. 219–228. Vancouver, Canada (2007)