On the Completeness of Attack Mutation Algorithms. Rubin, S., Jha, S., & Miller, B. P. In CSFW, pages 43-56, 2006. IEEE Computer Society.
Link
Paper bibtex @inproceedings{conf/csfw/RubinJM06,
added-at = {2023-03-24T00:00:00.000+0100},
author = {Rubin, Shai and Jha, Somesh and Miller, Barton P.},
biburl = {https://www.bibsonomy.org/bibtex/2b964c56a2c77ed2ec2f0130c9e97bb39/dblp},
booktitle = {CSFW},
crossref = {conf/csfw/2006},
ee = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2006.21},
interhash = {3552cf34af5a9610454341b403b98d63},
intrahash = {b964c56a2c77ed2ec2f0130c9e97bb39},
isbn = {0-7695-2615-2},
keywords = {dblp},
pages = {43-56},
publisher = {IEEE Computer Society},
timestamp = {2024-04-10T11:42:59.000+0200},
title = {On the Completeness of Attack Mutation Algorithms.},
url = {http://dblp.uni-trier.de/db/conf/csfw/csfw2006.html#RubinJM06},
year = 2006
}
Downloads: 0
{"_id":"E3txeLeTtYykrwt54","bibbaseid":"rubin-jha-miller-onthecompletenessofattackmutationalgorithms-2006","downloads":0,"creationDate":"2014-12-14T05:19:29.998Z","title":"On the Completeness of Attack Mutation Algorithms.","author_short":["Rubin, S.","Jha, S.","Miller, B. P."],"year":2006,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Rubin?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2023-03-24T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Rubin"],"firstnames":["Shai"],"suffixes":[]},{"propositions":[],"lastnames":["Jha"],"firstnames":["Somesh"],"suffixes":[]},{"propositions":[],"lastnames":["Miller"],"firstnames":["Barton","P."],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2b964c56a2c77ed2ec2f0130c9e97bb39/dblp","booktitle":"CSFW","crossref":"conf/csfw/2006","ee":"https://doi.ieeecomputersociety.org/10.1109/CSFW.2006.21","interhash":"3552cf34af5a9610454341b403b98d63","intrahash":"b964c56a2c77ed2ec2f0130c9e97bb39","isbn":"0-7695-2615-2","keywords":"dblp","pages":"43-56","publisher":"IEEE Computer Society","timestamp":"2024-04-10T11:42:59.000+0200","title":"On the Completeness of Attack Mutation Algorithms.","url":"http://dblp.uni-trier.de/db/conf/csfw/csfw2006.html#RubinJM06","year":"2006","bibtex":"@inproceedings{conf/csfw/RubinJM06,\n added-at = {2023-03-24T00:00:00.000+0100},\n author = {Rubin, Shai and Jha, Somesh and Miller, Barton P.},\n biburl = {https://www.bibsonomy.org/bibtex/2b964c56a2c77ed2ec2f0130c9e97bb39/dblp},\n booktitle = {CSFW},\n crossref = {conf/csfw/2006},\n ee = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2006.21},\n interhash = {3552cf34af5a9610454341b403b98d63},\n intrahash = {b964c56a2c77ed2ec2f0130c9e97bb39},\n isbn = {0-7695-2615-2},\n keywords = {dblp},\n pages = {43-56},\n publisher = {IEEE Computer Society},\n timestamp = {2024-04-10T11:42:59.000+0200},\n title = {On the Completeness of Attack Mutation Algorithms.},\n url = {http://dblp.uni-trier.de/db/conf/csfw/csfw2006.html#RubinJM06},\n year = 2006\n}\n\n","author_short":["Rubin, S.","Jha, S.","Miller, B. P."],"key":"conf/csfw/RubinJM06","id":"conf/csfw/RubinJM06","bibbaseid":"rubin-jha-miller-onthecompletenessofattackmutationalgorithms-2006","role":"author","urls":{"Link":"https://doi.ieeecomputersociety.org/10.1109/CSFW.2006.21","Paper":"http://dblp.uni-trier.de/db/conf/csfw/csfw2006.html#RubinJM06"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"search_terms":["completeness","attack","mutation","algorithms","rubin","jha","miller"],"keywords":["dblp"],"authorIDs":[],"dataSources":["oS5BEfkJNbPqTZSB9","74JLffDBQLjrojguT"]}