Search
Search results
152 results found
Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa.
Porttitor, J., P. Priya, M. Dotor, P Pretium, N. Lee-Walsh, and A. Li. 2023. “Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa..”
Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa.
Porttitor, J., P. Priya, M. Dotor, P Pretium, N. Lee-Walsh, and A. Li. 2022. “Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa..”
Integrating safety analysis with functional modeling
Ariss, Omar El, Dianxiang Xu, and Eric Wong. 2011. “Integrating Safety Analysis With Functional Modeling”. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 41 (4): 610-24.
Statistical unigram analysis for source code repository
Xu, Weifeng, Dianxiang Xu, Abdulrahman Alatawi, Omar El Ariss, and Yunkai Liu. 2018. “Statistical Unigram Analysis for Source Code Repository”. International Journal of Semantic Computing 12 (02): 237-60.
Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies
Xu, Dianxiang, Ning Shen, and Yunpeng Zhang. 2015. “Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies”. International Journal of Software Engineering and Knowledge Engineering 25 (09n10): 1551-71.
Testing aspect-oriented programs with finite state machines
Xu, Dianxiang, Omar El-Ariss, Weifeng Xu, and Linzhang Wang. 2012. “Testing Aspect-Oriented Programs With Finite State Machines”. Software Testing, Verification and Reliability 22 (4): 267-93.
Automated security test generation with formal threat models
Xu, Dianxiang, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, and Weifeng Xu. 2012. “Automated Security Test Generation With Formal Threat Models”. IEEE Transactions on Dependable and Secure Computing 9 (4): 526-40.
Modeling security attacks with statecharts
Ariss, Omar El, and Dianxiang Xu. 2011. “Modeling Security Attacks With Statecharts”. Proceedings of the Joint ACM SIGSOFT Conference—QoSA and ACM SIGSOFT Symposium—ISARCS on Quality of Software Architectures—QoSA and Architecting Critical Systems&Mdash;ISARCS, 123-32.
Model checking of security properties in industrial control systems (ICS)
Shrestha, Roshan, Hoda Mehrpouyan, and Dianxiang Xu. 2018. “Model Checking of Security Properties in Industrial Control Systems (ICS)”. Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 164-66.