Improving Network System Security with Function Extraction Technology for Automated Calculation of Program Behavior (2004)

Cached

Download Links

by Mark G. Pleszkoch , Richard C. Linger
Venue:In Proceedings of the 37th Annual Hawaii International Conference on System Sciences. IEEE
Citations:17 - 10 self

Active Bibliography

Applying FSQ Engineering Foundations to Automated Calculation of Program Behavior – Richard C. Linger - 2003
1 The Impact of Function Extraction – On Next-generation, Alan R. Hevner, Mark G. Pleszkoch, Stacy J. Prowell, Software Engineering, Software Engineering, Software Engineering, Software Engineering, Gwendolyn H. Walton, Richard C. Linger, Richard C. Linger, Rosann W. Collins, Christos Scondras - 2005
Function Extraction Technology: Computing the Behavior of Malware – Rick Linger, Kirk Sayre, Tim Daly, Mark Pleszkoch
1 Function Extraction (FX) Technology: Automated Calculation of Program Behavior for High-Assurance Systems – Richard C. Linger, Mark G. Pleszkoch
Semantic Foundations for Survivable System Analysis and Design – Richard Linger, Alan Hevner, Gwendolyn Walton, Ann Sobel, A Survivability
1 Technology Foundations for Computational Evaluation of Software Security Attributes – Gwendolyn H. Walton, Thomas A. Longstaff, Richard C. Linger, Gwendolyn H. Walton, Thomas A. Longstaff, Richard C. Linger - 2006
19 Cleanroom software engineering for zero-defect software – Richard C. Linger - 1993
Administration University of South Florida, – Richard C. Linger, Mark G. Pleszkoch, Luanne Burns, Alan R. Hevner, Gwendolyn H. Walton
8 Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior – Richard C. Linger, Mark G. Pleszkoch, Luanne Burns, Alan R. Hevner, Gwendolyn H. Walton
3 Introducing Function Extraction into Software Testing – Mark G. Pleszkoch, Richard C. Linger, Alan R. Hevner
2 FXplorer: Exploration of Computed Software Behavior: A New Approach to Understanding and Verification – Luanne Burns, Timothy Daly - 2009
Proceedings of the 43rd Hawaii International Conference on System Sciences- 2010 Concurrent Architecture for Automated Malware Classification – Timothy Daly, Luanne Burns
124 Program slicing – Keith Gallagher, David Binkley
The Application of Formal Methods to the Reverse Engineering of Imperative Program Code – Gerald C. Gannod, Gerald C. Gannod, Gerald C. Gannod, Gerald C. Gannod - 1994
9 Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software – Richard C. Linger - 1999
4 A Filter Model for Concurrent λ-Calculus – Mariangiola Dezani-ciancaglini, Ugo de'Liguoro, Adolfo Piperno - 1998
6 Detecting Feature Interactions on Relational Specifications – Frappier Mili, A. Mili, J. Desharnais - 1997
TRINETR: An Intrusion Detection Alert Management and Analysis System – Jinqiao Yu - 2004
1 Defining and Detecting Feature Interactions – M. Frappier, A. Mili, J. Desharnais - 1997