Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa. Publication: Journal Porttitor, J., P. Priya, M. Dotor, P Pretium, N. Lee-Walsh, and A. Li. 2022. “Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa..”
Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa. Publication: Journal Porttitor, J., P. Priya, M. Dotor, P Pretium, N. Lee-Walsh, and A. Li. 2019. “Povutpat Egestas Erat Rhoncus Dapibus Congue Fringippa..”
An automated test generation technique for software quality assurance Publication: Journal Article Xu, Dianxiang, Weifeng Xu, Michael Kent, Lijo Thomas, and Linzhang Wang. 2014. “An Automated Test Generation Technique for Software Quality Assurance”. IEEE Transactions on Reliability 64 (1): 247-68.
Analysis of Healthcare Workflows in Accordance with Access Control Policies Publication: Journal Article Lakaraju, Sandeep, Dianxiang Xu, and Yong Wang. 2016. “Analysis of Healthcare Workflows in Accordance With Access Control Policies”. International Journal of Healthcare Information Systems and Informatics (IJHISI) 11 (1): 1-20.
UML-based modeling and analysis of security threats Publication: Journal Article Kong, Jun, Dianxiang Xu, and Xiaoqin Zeng. 2010. “UML-Based Modeling and Analysis of Security Threats”. International Journal of Software Engineering and Knowledge Engineering 20 (06): 875-97.
Resilience as a New System Engineering for Cloud Computing. Publication: Journal Article Tu, Manghui, and Dianxiang Xu. 2013. “Resilience As a New System Engineering for Cloud Computing.”. J. Commun. 8 (4): 267-74.
Automated model-based testing of role-based access control using predicate/transition nets Publication: Journal Article Xu, Dianxiang, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, and Yves Le Traon. 2014. “Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets”. IEEE Transactions on Computers 64 (9): 2490-2505.
Security of software defined networks: A survey Publication: Journal Article Alsmadi, Izzat, and Dianxiang Xu. 2015. “Security of Software Defined Networks: A Survey”. Computers & Security 53: 79-108.
Handbook of Finite State Based Models and Applications Publication: Book Wang, Jiacun. 2012. Handbook of Finite State Based Models and Applications. CRC press.
Identifying suspicious addresses in Bitcoin thefts Publication: Journal Article Wu, Yan, Anthony Luo, and Dianxiang Xu. 2019. “Identifying Suspicious Addresses in Bitcoin Thefts”. Digital Investigation 31: 200895.