One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches

AC Viana, S Maag, F Zaidi - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Wireless self-organizing networks (WSONs) have attracted considerable attention from the
network research community; however, the key for their success is the rigorous validation of …

Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection

Y Meng, LF Kwok - Computer Communications, 2014 - Elsevier
Signature-based intrusion detection systems (IDSs) have been widely deployed in network
environments aiming to defend against different kinds of attacks. However, a large number …

Passive conformance testing of service choreographies

HN Nguyen, P Poizat, F Zaïdi - Proceedings of the 27th Annual ACM …, 2012 - dl.acm.org
Choreography supports the specification, with a global perspective, of the interactions
between the roles played by partners in a collaboration. These roles are the basis for the …

Ensuring interoperability for the Internet of Things: Experience with CoAP protocol testing

N Chen, C Viho, A Baire, X Huang, J Zha - automatika, 2013 - Taylor & Francis
Constrained Application Protocol (CoAP) is a specialized web transfer protocol, designed for
realizing interoperation with constrained networks and nodes for machine to machine …

Online verification of value-passing choreographies through property-oriented passive testing

HN Nguyen, P Poizat, F Zaïdi - 2012 IEEE 14th International …, 2012 - ieeexplore.ieee.org
Choreography supports the specification, with a global perspective, of the interactions
between roles played by peers in a collaboration. Choreography conformance testing aims …

[PDF][PDF] Overview of applications of passive testing techniques

I Itkin, R Yavorskiy - Modeling and Analysis of Complex Systems and …, 2019 - ceur-ws.org
We present here the overview of recent research on passive testing methods and tools,
which covers 104 manually selected papers most relevant to this topic. The papers were …

Automatically complementing protocol specifications from network traces

J Antunes, N Neves - Proceedings of the 13th European workshop on …, 2011 - dl.acm.org
Network servers can be tested for correctness by resorting to a specification of the
implemented protocol. However, producing a protocol specification can be a time …

Diveinto: Supporting diversity in intrusion-tolerant systems

J Antunes, N Neves - 2011 IEEE 30th International Symposium …, 2011 - ieeexplore.ieee.org
Intrusion tolerant services are usually implemented as replicated systems. If replicas execute
identical software, then they share the same vulnerabilities and the whole system can be …

Passive interoperability testing for communication protocols

N Chen - 2013 - theses.hal.science
In the field of networking, testing of communication protocols is an important activity to
validate protocol applications before commercialisation. Generally, the services that must be …

一种协议互操作测试系统开发框架

董书瀚, 艾中良 - 计算机与现代化, 2013 - cam.org.cn
鉴于现有的协议互操作测试方法自动化程度不高, 本文给出一种用于描述分布式通信系统的有限
状态机模型, 并基于该形式化模型和被动测试的思想提出一种协议互操作测试系统开发框架 …