Author:
Thomas Sam L.,Garcia Flavio D.,Chothia Tom
Publisher
Springer International Publishing
Reference21 articles.
1. Bradbury, D.: SCADA: a critical vulnerability. Comput. Fraud Secur. 2012(4), 11–14 (2012)
2. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
3. Lecture Notes in Computer Science;D Brumley,2011
4. Cadar, C., Dunbar, D., Engler, D.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI 08. USENIX Association (2008)
5. Chen, D.D., Egele, M., Woo, M., Brumley, D.: Towards automated dynamic analysis for linux-based embedded firmware. In: Network and Distributed System Security (NDSS) Symposium, NDSS 2016 (2016)
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献