Seguir
Paul Ammann
Paul Ammann
Associate Professor of Computer Science, George Mason University
E-mail confirmado em gmu.edu - Página inicial
Título
Citado por
Citado por
Ano
Introduction to software testing
P Ammann, J Offutt
Cambridge University Press, 2016
23012016
Scalable, graph-based network vulnerability analysis
P Ammann, D Wijesekera, S Kaushik
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
10652002
Using model checking to analyze network vulnerabilities
RW Ritchey, P Ammann
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 156-165, 2000
6482000
Data diversity: An approach to software fault tolerance
PE Ammann, JC Knight
Ieee transactions on computers 37 (4), 418-425, 1988
5131988
Using model checking to generate tests from specifications
PE Ammann, PE Black, W Majurski
Proceedings second international conference on formal engineering methods …, 1998
5091998
Generating test data from state‐based specifications
J Offutt, S Liu, A Abdurazik, P Ammann
Software testing, verification and reliability 13 (1), 25-53, 2003
4792003
Testing with model checkers: a survey
G Fraser, F Wotawa, PE Ammann
Software Testing, Verification and Reliability 19 (3), 215-261, 2009
2892009
Recovery from malicious transactions
P Ammann, S Jajodia, P Liu
IEEE transactions on knowledge and data engineering 14 (5), 1167-1185, 2002
2232002
A weakest-adversary security metric for network configuration security analysis
J Pamula, S Jajodia, P Ammann, V Swarup
Proceedings of the 2nd ACM workshop on Quality of protection, 31-38, 2006
2152006
Using formal methods to derive test frames in category-partition testing
P Ammann, J Offutt
Proceedings of COMPASS'94-1994 IEEE 9th Annual Conference on Computer …, 1994
1881994
Establishing theoretical minimal sets of mutants
P Ammann, ME Delamaro, J Offutt
2014 IEEE seventh international conference on software testing, verification …, 2014
1852014
A specification-based coverage metric to evaluate test sets
PE Ammann, PE Black
International Journal of Reliability, Quality and Safety Engineering 8 (04 …, 2001
1802001
Surviving information warfare attacks on databases
P Ammann, S Jajodia, CD McCollum, BT Blaustein
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
1491997
A host-based approach to network attack chaining analysis
P Ammann, J Pamula, R Ritchey, J Street
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-84, 2005
1442005
Coverage criteria for logical expressions
P Ammann, J Offutt, H Huang
14th International Symposium on Software Reliability Engineering, 2003 …, 2003
1382003
Rewriting histories: Recovering from malicious transactions
P Liu, P Ammann, S Jajodia
Security of Data and Transaction Processing, 7-40, 2000
1262000
Mutant subsumption graphs
B Kurtz, P Ammann, ME Delamaro, J Offutt, L Deng
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
872014
Mutation operators for testing Android apps
L Deng, J Offutt, P Ammann, N Mirzaei
Information and Software Technology 81, 154-168, 2017
862017
Ecodroid: An approach for energy-based ranking of android apps
RJ Behrouz, A Sadeghi, J Garcia, S Malek, P Ammann
2015 IEEE/ACM 4th International Workshop on Green and Sustainable Software, 8-14, 2015
862015
Analyzing the validity of selective mutation with dominator mutants
B Kurtz, P Ammann, J Offutt, ME Delamaro, M Kurtz, N Gökçe
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
832016
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20