Exciting FPGA Cryptographic Trojans using Combinatorial Testing P Kitsos, DE Simos, J Torres-Jimenez, AG Voyiatzis 26th IEEE International Symposium on Software Reliability Engineering (ISSRE …, 2015 | 65 | 2015 |
The Hardness of Code Equivalence over and Its Application to Code-Based Cryptography N Sendrier, DE Simos Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013 …, 2013 | 57 | 2013 |
On the applicability of combinatorial testing to web application security testing: a case study B Garn, I Kapsalis, DE Simos, S Winkler Proceedings of the 2014 Workshop on Joining AcadeMiA and Industry …, 2014 | 47 | 2014 |
An Efficient Design and Implementation of the In-Parameter-Order Algorithm K Kleine, DE Simos Mathematics in Computer Science 12 (1), 51-67, 2018 | 41 | 2018 |
Attack pattern-based combinatorial testing with constraints for web security testing J Bozic, B Garn, I Kapsalis, D Simos, S Winkler, F Wotawa 2015 IEEE International Conference on Software Quality, Reliability and …, 2015 | 41 | 2015 |
Attack pattern-based combinatorial testing J Bozic, DE Simos, F Wotawa Proceedings of the 9th International Workshop on Automation of Software Test …, 2014 | 36 | 2014 |
Eris: A tool for combinatorial testing of the linux system call interface B Garn, DE Simos 2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014 | 34 | 2014 |
CAgen: a fast combinatorial test generation tool with support for constraints and higher-index arrays M Wagner, K Kleine, DE Simos, R Kuhn, R Kacker 2020 IEEE International Conference on Software Testing, Verification and …, 2020 | 33 | 2020 |
Combinatorial Methods in Security Testing. DE Simos, R Kuhn, AG Voyiatzis, R Kacker IEEE Computer 49 (10), 80-83, 2016 | 32 | 2016 |
E (s2)-optimal and minimax-optimal cyclic supersaturated designs via multi-objective simulated annealing C Koukouvinos, K Mylona, DE Simos Journal of Statistical Planning and Inference 138 (6), 1639-1646, 2008 | 32 | 2008 |
A survey on the state of the art of complexity problems for covering arrays L Kampel, DE Simos Theoretical Computer Science 800, 107-124, 2019 | 29 | 2019 |
E-voting Authentication with QR-codes S Falkner, P Kieseberg, DE Simos, C Traxler, E Weippl Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 28 | 2014 |
Evaluation of the IPO-family algorithms for test case generation in web security testing J Bozic, B Garn, DE Simos, F Wotawa 2015 IEEE Eighth International Conference on Software Testing, Verification …, 2015 | 27 | 2015 |
Automated combinatorial testing for detecting SQL vulnerabilities in web applications DE Simos, J Zivanovic, M Leithner 2019 IEEE/ACM 14th International Workshop on Automation of Software Test …, 2019 | 26 | 2019 |
Combinatorial Methods for Explainable AI DR Kuhn, RN Kacker, Y Lei, DE Simos 2020 IEEE International Conference on Software Testing, Verification and …, 2020 | 25 | 2020 |
How easy is code equivalence over F_q? N Sendrier, D Simos WCC 2013, 2013 | 23 | 2013 |
Coveringcerts: combinatorial methods for x. 509 certificate testing K Kleine, DE Simos 2017 IEEE International conference on software testing, verification and …, 2017 | 22 | 2017 |
Exploring k-circulant supersaturated designs via genetic algorithms C Koukouvinos, K Mylona, DE Simos Computational statistics & data analysis 51 (6), 2958-2968, 2007 | 22 | 2007 |
Testing TLS using planning-based combinatorial methods and execution framework DE Simos, J Bozic, B Garn, M Leithner, F Duan, K Kleine, Y Lei, F Wotawa Software quality journal 27 (2), 703-729, 2019 | 19 | 2019 |
Encryption schemes based on hadamard matrices with circulant cores C Koukouvinos, DE Simos Journal of Applied Mathematics and Bioinformatics, 2013 | 18 | 2013 |