Runtime Verification Method for Social Network Security Based on Source Code Instrumentation.
Xiaobing WangWenxuan GuoLiang ZhaoXinfeng ShuPublished in: SOFL+MSVL (2018)
Keyphrases
- source code
- network security
- verification method
- open source
- model checking
- software systems
- intrusion detection
- intrusion detection system
- computer networks
- temporal logic
- open source software
- traffic analysis
- network traffic
- information security
- software projects
- anomaly detection
- risk assessment
- software maintenance
- security policies
- software evolution
- program understanding
- free software
- legacy software
- case study
- high level
- database systems
- plagiarism detection
- decision making
- text files
- data mining techniques
- software repositories
- information retrieval
- machine learning