Search
Search results
783 results found
Undergraduate Research Experience in Cybersecurity for Underrepresented Students and Students with Limited Research Opportunities
Yang, Dazhi, Dianxiang Xu, Jyh-Haw Yeh, and Yibo Fan. 2019. “Undergraduate Research Experience in Cybersecurity for Underrepresented Students and Students With Limited Research Opportunities”. Journal of STEM Education.
MINING DECISION TREES AS TEST ORACLES FOR JAVA BYTECODE.
Xu, Weifeng, Tao Ding, Dianxiang Xu, and Omar El Ariss. 2016. “MINING DECISION TREES AS TEST ORACLES FOR JAVA BYTECODE.”. International Journal for Computers & Their Applications 23 (3).
XPA: An Open Source IDE for XACML Policies
Shrestha, Roshan, Shuai Peng, Turner Lehmbecker, and Dianxiang Xu. 2018. “XPA: An Open Source IDE for XACML Policies.”
Forensic Analysis of Bitcoin Transactions
Wu, Yan, Anthony Luo, and Dianxiang Xu. 2019. “Forensic Analysis of Bitcoin Transactions”. 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), 167-69.
Interaction-based Reputation Model in Online Social Networks.
Alsmadi, Izzat, Dianxiang Xu, and Jin-Hee Cho. 2016. “Interaction-Based Reputation Model in Online Social Networks.”. ICISSP, 265-72.
Model-Based Metamorphic Testing: A Case Study.
Ding, Junhua, and Dianxiang Xu. 2012. “Model-Based Metamorphic Testing: A Case Study.”. SEKE, 363-68.
An Approach for Analyzing Software Specifications in Petri Nets.
Ding, Junhua, Dianxiang Xu, and Jidong Ge. 2013. “An Approach for Analyzing Software Specifications in Petri Nets.”. SEKE, 411-16.
Integrated modeling and analysis of attribute based access control policies and workflows in healthcare
Lakkaraju, Sandeep, and Dianxiang Xu. 2014. “Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare”. 2014 International Conference on Trustworthy Systems and Their Applications, 36-43.
System resilience modeling and enhancement for the cloud
Tu, Manghui, and Dianxiang Xu. 2013. “System Resilience Modeling and Enhancement for the Cloud”. 2013 International Conference on Computing, Networking and Communications (ICNC), 1021-25.