Verified Firewall Policy Transformations for Test Case Generation.
Achim D. BruckerLukas BrüggerPaul KearneyBurkhart WolffPublished in: ICST (2010)
Keyphrases
- test case generation
- test cases
- software testing
- object oriented systems
- test data generation
- optimal policy
- intrusion detection
- test suite
- network security
- real time
- java programs
- intrusion detection system
- static analysis
- genetic algorithm ga
- software systems
- source code
- object oriented
- query language
- multi objective
- information systems
- database