On the Completeness of Attack Mutation Algorithms. Rubin, S., Jha, S., & Miller, B. P. In Proceedings of IEEE Computer Security Foundations Workshop (CSFW), pages 43-56, 2006. Paper bibtex @inproceedings{ dblp3114555,
title = {On the Completeness of Attack Mutation Algorithms},
author = {Shai Rubin and Somesh Jha and Barton P. Miller},
author_short = {Rubin, S. and Jha, S. and Miller, B. P.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2006},
key = {dblp3114555},
id = {dblp3114555},
biburl = {http://www.dblp.org/rec/bibtex/conf/csfw/RubinJM06},
url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.21},
conference = {CSFW},
pages = {43-56},
text = {CSFW 2006:43-56},
booktitle = {Proceedings of IEEE Computer Security Foundations Workshop (CSFW)}
}
Downloads: 0
{"_id":"E3txeLeTtYykrwt54","bibbaseid":"rubin-jha-miller-onthecompletenessofattackmutationalgorithms-2006","downloads":0,"creationDate":"2014-12-14T05:19:29.998Z","title":"On the Completeness of Attack Mutation Algorithms","author_short":["Rubin, S.","Jha, S.","Miller, B. P."],"year":2006,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/csfw/RubinJM06","bibdata":{"title":"On the Completeness of Attack Mutation Algorithms","author":["Shai Rubin","Somesh Jha","Barton P. Miller"],"author_short":["Rubin, S.","Jha, S.","Miller, B. P."],"bibtype":"inproceedings","type":"inproceedings","year":"2006","key":"dblp3114555","id":"dblp3114555","biburl":"http://www.dblp.org/rec/bibtex/conf/csfw/RubinJM06","url":"http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.21","conference":"CSFW","pages":"43-56","text":"CSFW 2006:43-56","booktitle":"Proceedings of IEEE Computer Security Foundations Workshop (CSFW)","bibtex":"@inproceedings{ dblp3114555,\n title = {On the Completeness of Attack Mutation Algorithms},\n author = {Shai Rubin and Somesh Jha and Barton P. Miller},\n author_short = {Rubin, S. and Jha, S. and Miller, B. P.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2006},\n key = {dblp3114555},\n id = {dblp3114555},\n biburl = {http://www.dblp.org/rec/bibtex/conf/csfw/RubinJM06},\n url = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.21},\n conference = {CSFW},\n pages = {43-56},\n text = {CSFW 2006:43-56},\n booktitle = {Proceedings of IEEE Computer Security Foundations Workshop (CSFW)}\n}","bibbaseid":"rubin-jha-miller-onthecompletenessofattackmutationalgorithms-2006","role":"author","urls":{"Paper":"http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.21"},"downloads":0},"search_terms":["completeness","attack","mutation","algorithms","rubin","jha","miller"],"keywords":[],"authorIDs":[],"dataSources":["oS5BEfkJNbPqTZSB9"]}