Login / Signup

A New Security Testing Method and Its Application to the Secure Xenix Kernel.

Virgil D. GligorC. Sekar ChandersekaranW. ChengWen-Der JiangAbhai JohriGary L. LuckenbaughL. Edward Reich
Published in: IEEE Symposium on Security and Privacy (1986)
Keyphrases
  • objective function
  • feature set
  • similarity function
  • security requirements
  • similarity measure
  • pairwise
  • clustering method
  • test data
  • security management