Introduction to software testing P Ammann, J Offutt Cambridge University Press, 2016 | 2785 | 2016 |
Scalable, graph-based network vulnerability analysis P Ammann, D Wijesekera, S Kaushik Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 1204 | 2002 |
Using model checking to analyze network vulnerabilities RW Ritchey, P Ammann Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 156-165, 2000 | 693 | 2000 |
Data diversity: An approach to software fault tolerance PE Ammann, JC Knight Ieee transactions on computers 37 (4), 418-425, 1988 | 544 | 1988 |
Using model checking to generate tests from specifications PE Ammann, PE Black, W Majurski Proceedings second international conference on formal engineering methods …, 1998 | 520 | 1998 |
Generating test data from state‐based specifications J Offutt, S Liu, A Abdurazik, P Ammann Software testing, verification and reliability 13 (1), 25-53, 2003 | 492 | 2003 |
Testing with model checkers: a survey G Fraser, F Wotawa, PE Ammann Software Testing, Verification and Reliability 19 (3), 215-261, 2009 | 314 | 2009 |
A weakest-adversary security metric for network configuration security analysis J Pamula, S Jajodia, P Ammann, V Swarup Proceedings of the 2nd ACM workshop on Quality of protection, 31-38, 2006 | 231 | 2006 |
Recovery from malicious transactions P Ammann, S Jajodia, P Liu IEEE transactions on knowledge and data engineering 14 (5), 1167-1185, 2002 | 231 | 2002 |
Establishing theoretical minimal sets of mutants P Ammann, ME Delamaro, J Offutt 2014 IEEE seventh international conference on software testing, verification …, 2014 | 220 | 2014 |
Using formal methods to derive test frames in category-partition testing P Ammann, J Offutt Proceedings of COMPASS'94-1994 IEEE 9th Annual Conference on Computer …, 1994 | 209 | 1994 |
A specification-based coverage metric to evaluate test sets PE Ammann, PE Black International Journal of Reliability, Quality and Safety Engineering 8 (04 …, 2001 | 181 | 2001 |
A host-based approach to network attack chaining analysis P Ammann, J Pamula, R Ritchey, J Street 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-84, 2005 | 161 | 2005 |
Surviving information warfare attacks on databases P Ammann, S Jajodia, CD McCollum, BT Blaustein Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 150 | 1997 |
Coverage criteria for logical expressions P Ammann, J Offutt, H Huang 14th International Symposium on Software Reliability Engineering, 2003 …, 2003 | 148 | 2003 |
Rewriting histories: Recovering from malicious transactions P Liu, P Ammann, S Jajodia Security of Data and Transaction Processing, 7-40, 2000 | 129 | 2000 |
Mutation operators for testing Android apps L Deng, J Offutt, P Ammann, N Mirzaei Information and Software Technology 81, 154-168, 2017 | 118 | 2017 |
Mutant subsumption graphs B Kurtz, P Ammann, ME Delamaro, J Offutt, L Deng 2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014 | 113 | 2014 |
Analyzing the validity of selective mutation with dominator mutants B Kurtz, P Ammann, J Offutt, ME Delamaro, M Kurtz, N Gökçe Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 105 | 2016 |
Ecodroid: An approach for energy-based ranking of android apps RJ Behrouz, A Sadeghi, J Garcia, S Malek, P Ammann 2015 IEEE/ACM 4th International Workshop on Green and Sustainable Software, 8-14, 2015 | 105 | 2015 |