Symbolic Security Predicates: Hunt Program Weaknesses.
Alexey V. VishnyakovVlada LogunovaEli KobrinDaniil O. KutsDarya ParyginaAndrey FedotovPublished in: CoRR (2021)
Keyphrases
- security requirements
- access control
- intrusion detection
- information security
- security issues
- network security
- information assurance
- security mechanisms
- security policies
- high level
- security problems
- security measures
- neural network
- computer programs
- security systems
- security threats
- network management
- test cases
- logic programming
- security analysis
- intermediate level