Computer Science ›› 2006, Vol. 33 ›› Issue (9): 266-269.
Previous Articles Next Articles
Online:
Published:
Abstract: The security of application software is more important in network days. A kind of adversary pattern to find out security bugs in a software is raised which can be used in all testing steps. We discuss the software decomposition ways and application of the
Key words: Security testing, Attack, Adversary pattern, Randomized algorithm, Software's lifetime
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I9/266
Cited