3[3]David P.Gilliam,John D.Powell,Matt Bishop.Application of Lightweight Formal Methods to Software Security.In proc.14th IEEE International Workshops on Enabling Technologies (WETICE 2005),13-15 June 2005,Link ping,Sweden.pp.160-165.
4[4]Ramaswamy Chandramouli,Mark Blackburn.Automated Testing of Security Functions Using a Combined Model and InterfaceDriven Approach.In proc.37th Hawaii International Conference on System Sciences (HICSS-37 2004),5-8 January 2004,Big Island,HI,USA.
5[5]Oded Tal,Scott Knight,Tom Dean:Syntax-based Vulnerability Testing of Frame-based Network Protocols.In proc.Second Annual Conference on Privacy,Security and Trust,October 13-15,2004,Wu Centre,University of New Brunswick,Fredericton,New Brunswick,Canada (PST 2004).pp.155-160.
6[6]Du Wenliang,Mathur A P.Vulnerability Testing of Software System Using Fault Injection.Coast TR 98-02,1998.
7[7]George Fink,Matt Bishop.Property Based Testing:A New Approach to Testing for Assurance.ACM SIGSOFT Software Engineering Notes,1997,22(4):74-80.
8[8]Ben Breech,Lori Pollock.A Framework for Testing Security Mechanisms for Program-Based Attacks.ACM SIGSOFT Software Engineering Notes,2005,30(4).