ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Learning to Produce Direct Tests for Security Verification Using Constrained Process Discovery
Proceedings of the 54th Annual Design Automation Conference 2017 on - DAC '17
◽
10.1145/3061639.3062271
◽
2017
◽
Cited By ~ 1
Author(s):
Kuo-Kai Hsieh
◽
Li-C. Wang
◽
Wen Chen
◽
Jayanta Bhadra
Keyword(s):
Process Discovery
◽
Security Verification
Download Full-text
Related Documents
Cited By
References
Security Verification in Web Browser Extensions
SSRN Electronic Journal
◽
10.2139/ssrn.3168418
◽
2018
◽
Cited By ~ 1
Author(s):
Chinmay Agarwal
◽
Medhavini Kulshrestha
◽
Himanshu Rathore
◽
Kamalakannan J
Keyword(s):
Web Browser
◽
Security Verification
◽
Browser Extensions
Download Full-text
Runtime Security Verification for Itinerary-Driven Mobile Agents
2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
◽
10.1109/dasc.2006.42
◽
2006
◽
Cited By ~ 3
Author(s):
Zijiang Yang
◽
Shiyong Lu
◽
Ping Yang
Keyword(s):
Mobile Agents
◽
Security Verification
Download Full-text
The Algorithm of Sub-process Discovery for BPEL Process Based on Variable Dependence
2010 International Conference on Communications and Mobile Computing
◽
10.1109/cmc.2010.271
◽
2010
◽
Cited By ~ 2
Author(s):
Deng Min
◽
Deng Na
◽
Peng Yong
◽
Cheng Bo
Keyword(s):
Process Discovery
Download Full-text
Process Discovery Algorithms Using Numerical Abstract Domains
IEEE Transactions on Knowledge and Data Engineering
◽
10.1109/tkde.2013.156
◽
2014
◽
Vol 26
(12)
◽
pp. 3064-3076
◽
Cited By ~ 14
Author(s):
Josep Carmona
◽
Jordi Cortadella
Keyword(s):
Process Discovery
◽
Numerical Abstract Domains
◽
Abstract Domains
◽
Discovery Algorithms
Download Full-text
Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key
10.1109/icact.2005.246179
◽
2005
◽
Author(s):
Youngsoo Kim
◽
Tackyong Nam
Keyword(s):
Digital Signatures
◽
High Security
◽
Security Verification
Download Full-text
Process Mining Crimes – A Threat to the Validity of Process Discovery Evaluations
Lecture Notes in Business Information Processing - Business Process Management Forum
◽
10.1007/978-3-319-98651-7_1
◽
2018
◽
pp. 3-19
Author(s):
Jana-Rebecca Rehse
◽
Peter Fettke
Keyword(s):
Process Mining
◽
Process Discovery
Download Full-text
Using Life Cycle Information in Process Discovery
Business Process Management Workshops - Lecture Notes in Business Information Processing
◽
10.1007/978-3-319-42887-1_17
◽
2016
◽
pp. 204-217
◽
Cited By ~ 13
Author(s):
Sander J. J. Leemans
◽
Dirk Fahland
◽
Wil M. P. van der Aalst
Keyword(s):
Life Cycle
◽
Process Discovery
Download Full-text
Property Based Formal Security Verification for Hardware Trojan Detection
2018 IEEE 3rd International Verification and Security Workshop (IVSW)
◽
10.1109/ivsw.2018.8494858
◽
2018
◽
Author(s):
Maoyuan Qin
◽
Wei Hu
◽
Dejun Mu
◽
Yu Tai
Keyword(s):
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Security Verification
Download Full-text
Hierarchical Process Discovery
Encyclopedia of Big Data Technologies
◽
10.1007/978-3-319-63962-8_94-1
◽
2018
◽
pp. 1-7
Author(s):
Raffaele Conforti
Keyword(s):
Process Discovery
Download Full-text
Data Mining for Process Modeling: A Clustered Process Discovery Approach
Proceedings of the 2020 Federated Conference on Computer Science and Information Systems
◽
10.15439/2020f95
◽
2020
◽
Author(s):
Renato Cirne
◽
Caio Melquiades
◽
Renan Leite
◽
Eronita Leijden
◽
Alexandre Maciel
◽
...
Keyword(s):
Data Mining
◽
Process Modeling
◽
Process Discovery
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close