2009 First International Conference on Ubiquitous and Future Networks 2009
DOI: 10.1109/icufn.2009.5174311
|View full text |Cite
|
Sign up to set email alerts
|

Rule-based auditing system for software security assurance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 3 publications
0
0
0
Order By: Relevance
“…We are aware of two closely related works that assess risk using a rule-based approach (Jang et al, 2009, Shahriar & Zulkernine, 2011. Notably, the work of Jang et al, (2009) develops a rulebased security assurance system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We are aware of two closely related works that assess risk using a rule-based approach (Jang et al, 2009, Shahriar & Zulkernine, 2011. Notably, the work of Jang et al, (2009) develops a rulebased security assurance system.…”
Section: Related Workmentioning
confidence: 99%
“…We are aware of two closely related works that assess risk using a rule-based approach (Jang et al, 2009, Shahriar & Zulkernine, 2011. Notably, the work of Jang et al, (2009) develops a rulebased security assurance system. It relies on extracting the exploitation paths of an application, and then it represents the path as a Finite State Automata (FSA) that can be used as rule-based signatures to detect exploitations.…”
Section: Related Workmentioning
confidence: 99%