2013
DOI: 10.1016/b978-0-12-408094-2.00003-5
|View full text |Cite
|
Sign up to set email alerts
|

Model Inference and Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…In the absence of literature available on the topic, we explored the closest relevant field that is identifying vulnerable android and web applications using machine learning algorithms [45,46]. Most of the techniques extract a set of features from web, android or other types of applications and then use the features to train machine learning algorithms to identify vulnerable applications [1,4,7,47,48].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the absence of literature available on the topic, we explored the closest relevant field that is identifying vulnerable android and web applications using machine learning algorithms [45,46]. Most of the techniques extract a set of features from web, android or other types of applications and then use the features to train machine learning algorithms to identify vulnerable applications [1,4,7,47,48].…”
Section: Related Workmentioning
confidence: 99%
“…Previous work use machine learning or deep learning algorithms for identification of similar category of vulnerabilities in platforms other than IoT applications, such as android and web applications. [1,2,11,4,7,39,40,41,42,43,44].…”
Section: Introductionmentioning
confidence: 99%
“…A counterexample is an input sequence in which the result of š» is different from the result of the SUL [2,11,41]. Then, the counterexample is used to update the observation table by adding prefixes or suffixes (for which several heuristics have been proposed) [23].…”
Section: Observation Tablementioning
confidence: 99%
“…Model inference [ 56 ] enables the prediction of LEC behaviors at run time. In contrast to software testing, where program inputs are generated to produce an intended system behavior, model inference deduces resulting system behavior from a given input.…”
Section: Introductionmentioning
confidence: 99%