2011 3rd International Conference on Electronics Computer Technology 2011
DOI: 10.1109/icectech.2011.5941989
|View full text |Cite
|
Sign up to set email alerts
|

Automated generation of test cases from output domain of an embedded system using Genetic algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 4 publications
0
8
0
1
Order By: Relevance
“…This revoked user must have signed some blocks earlier, which should be re-signed by present user. Before re-signing of existing user, he has to check the integrity of these blocks [16][17][18][19]. To do this, existing user has a burden to download all the blocks, verify correctness and resign the data.…”
Section: Homogeneous Authenticable Ring Signaturementioning
confidence: 99%
“…This revoked user must have signed some blocks earlier, which should be re-signed by present user. Before re-signing of existing user, he has to check the integrity of these blocks [16][17][18][19]. To do this, existing user has a burden to download all the blocks, verify correctness and resign the data.…”
Section: Homogeneous Authenticable Ring Signaturementioning
confidence: 99%
“…Since the reference application is actualized by programming just, it is adjusted by the outline of the equipment based OTP age so that the OTP age work and the critical information stockpiling capacity can be performed in conjunction with the OTP age motor of the IOT [11][12][13][14]. …”
Section: Verificationmentioning
confidence: 99%
“…CTMF is like a blueprint to organize cyber threats in a sophisticated manner. The major benefits are early detection of threats, instant recognization, and faster decision according to the incident or damage [37][38][39][40].…”
Section: Siem Technologymentioning
confidence: 99%