Login / Signup
Mining mutation testing simulation traces for security and testbench debugging.
Nicole Fern
Kwang-Ting Cheng
Published in:
ICCAD (2017)
Keyphrases
</>
mutation testing
access control
intrusion detection
test sequences
data mining
information security
execution traces
database applications
databases
artificial intelligence
itemsets