Paul Ammann
Paul Ammann
Associate Professor of Computer Science, George Mason University
Dirección de correo verificada de gmu.edu - Página principal
TítuloCitado porAño
Introduction to software testing
P Ammann, J Offutt
Cambridge University Press, 2016
16112016
Scalable, graph-based network vulnerability analysis
P Ammann, D Wijesekera, S Kaushik
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
9292002
Using model checking to analyze network vulnerabilities
RW Ritchey, P Ammann
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 156-165, 2000
5872000
Using model checking to generate tests from specifications
PE Ammann, PE Black, W Majurski
Proceedings Second International Conference on Formal Engineering Methods …, 1998
4461998
Generating test data from state‐based specifications
J Offutt, S Liu, A Abdurazik, P Ammann
Software testing, verification and reliability 13 (1), 25-53, 2003
4412003
Data diversity: An approach to software fault tolerance
PE Ammann, JC Knight
Ieee transactions on computers 37 (4), 418-425, 1988
4401988
Testing with model checkers: a survey
G Fraser, F Wotawa, PE Ammann
Software Testing, Verification and Reliability 19 (3), 215-261, 2009
2362009
Recovery from malicious transactions
P Ammann, S Jajodia, P Liu
IEEE Transactions on Knowledge and Data Engineering 14 (5), 1167-1185, 2002
2022002
A weakest-adversary security metric for network configuration security analysis
J Pamula, S Jajodia, P Ammann, V Swarup
Proceedings of the 2nd ACM workshop on Quality of protection, 31-38, 2006
1872006
Using formal methods to derive test frames in category-partition testing
P Ammann, J Offutt
Proceedings of COMPASS'94-1994 IEEE 9th Annual Conference on Computer …, 1994
1701994
A specification-based coverage metric to evaluate test sets
PE Ammann, PE Black
International Journal of Reliability, Quality and Safety Engineering 8 (04 …, 2001
1672001
A semantic-based transaction processing model for multilevel transactions 1
I Ray, P Ammann, S Jajodia
Journal of Computer Security 6 (3), 181-217, 1998
1621998
Surviving information warfare attacks on databases
P Ammann, S Jajodia, CD McCollum, BT Blaustein
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
1451997
Coverage criteria for logical expressions
P Ammann, J Offutt, H Huang
14th International Symposium on Software Reliability Engineering, 2003 …, 2003
1252003
A host-based approach to network attack chaining analysis
P Ammann, J Pamula, R Ritchey, J Street
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-84, 2005
1222005
Rewriting histories: Recovering from malicious transactions
P Liu, P Ammann, S Jajodia
Security of Data and Transaction Processing, 7-40, 2000
1182000
Establishing theoretical minimal sets of mutants
P Ammann, ME Delamaro, J Offutt
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
1172014
Using a model checker to test safety properties
P Ammann, W Ding, D Xu
Proceedings Seventh IEEE International Conference on Engineering of Complex …, 2001
742001
Distributed timestamp generation in planar lattice networks
P Ammann, S Jajodia
ACM Transactions on Computer Systems (TOCS) 11 (3), 205-225, 1993
731993
Abstracting formal specifications to generate software tests via model checking
P Ammann, PE Black
Gateway to the New Millennium. 18th Digital Avionics Systems Conference …, 1999
651999
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20