Auswahl der wissenschaftlichen Literatur zum Thema „Model fuzzing“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Model fuzzing" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Model fuzzing"

1

Zhu, Xue Yong, und Zhi Yong Wu. „A New Fuzzing Technique Using Niche Genetic Algorithm“. Advanced Materials Research 756-759 (September 2013): 4050–58. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.4050.

Der volle Inhalt der Quelle
Annotation:
Current advanced Fuzzing technique can only implement vulnerability mining on a single vulnerable statement each time, and this paper proposes a new multi-dimension Fuzzing technique, which uses niche genetic algorithm to generate test cases and can concurrently approach double vulnerable targets with the minimum cost on the two vulnerable statements each time. For that purpose, a corresponding mathematical model and the minimum cost theorem are presented. The results of the experiment show that the efficiency of the new proposed Fuzzing technique is much better than current advanced Fuzzing techniques.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kim, Minho, Seongbin Park, Jino Yoon, Minsoo Kim und Bong-Nam Noh. „File Analysis Data Auto-Creation Model For Peach Fuzzing“. Journal of the Korea Institute of Information Security and Cryptology 24, Nr. 2 (30.04.2014): 327–33. http://dx.doi.org/10.13089/jkiisc.2014.24.2.327.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Song, Guang Jun, Chun Lan Zhao und Ming Li. „Study on Software Vulnerability Dynamic Discovering System“. Applied Mechanics and Materials 151 (Januar 2012): 673–77. http://dx.doi.org/10.4028/www.scientific.net/amm.151.673.

Der volle Inhalt der Quelle
Annotation:
Developed a new system model of software vulnerability discovering, which was based on fuzzing, feature matching of API sequences and data mining. Overcame the disadvantages of old techniques, this new method effectively improves the detection of potential unknown security vulnerabilities in software. Besides, this method is more automated and performs better in finding new security vulnerabilities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Guan, Quan Long, Guo Xiang Yao, Kai Bin Ni und Mei Xiu Zhou. „Research on Fuzzing Test Data Engine for Web Vulnerability“. Advanced Materials Research 211-212 (Februar 2011): 500–504. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.500.

Der volle Inhalt der Quelle
Annotation:
With the rapid growth of e-commerce, various types of complex applications appear in web environments. web-based system testing is different from traditional software testing. The unpredictability of Internet and web systems makes it difficult to test web-based system. This paper presents an engine for Fuzzing test data towards web control vulnerabilities, and introduces "heuristic rules" and "tagged words" to generate the test data. This method can increase the intelligence of security testing and build the foundation of web vulnerability detection model.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Zeng, Yingpei, Mingmin Lin, Shanqing Guo, Yanzhao Shen, Tingting Cui, Ting Wu, Qiuhua Zheng und Qiuhua Wang. „MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols“. Sensors 20, Nr. 18 (11.09.2020): 5194. http://dx.doi.org/10.3390/s20185194.

Der volle Inhalt der Quelle
Annotation:
The publish/subscribe model has gained prominence in the Internet of things (IoT) network, and both Message Queue Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) support it. However, existing coverage-based fuzzers may miss some paths when fuzzing such publish/subscribe protocols, because they implicitly assume that there are only two parties in a protocol, which is not true now since there are three parties, i.e., the publisher, the subscriber and the broker. In this paper, we propose MultiFuzz, a new coverage-based multiparty-protocol fuzzer. First, it embeds multiple-connection information in a single input. Second, it uses a message mutation algorithm to stimulate protocol state transitions, without the need of protocol specifications. Third, it uses a new desockmulti module to feed the network messages into the program under test. desockmulti is similar to desock (Preeny), a tool widely used by the community, but it is specially designed for fuzzing and is 10x faster. We implement MultiFuzz based on AFL, and use it to fuzz two popular projects Eclipse Mosquitto and libCoAP. We reported discovered problems to the projects. In addition, we compare MultiFuzz with AFL and two state-of-the-art fuzzers, MOPT and AFLNET, and find it discovering more paths and crashes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Gao, Sudi, Yueying Luo und Tan Yang. „Research on River Water Environmental Capacity Based on Triangular Fuzzy Technology“. E3S Web of Conferences 236 (2021): 03018. http://dx.doi.org/10.1051/e3sconf/202123603018.

Der volle Inhalt der Quelle
Annotation:
Based on the randomness and ambiguity characteristics of the river water environment system, as well as the lack and inaccuracy of data information, the water environment system parameters are defined as triangular fuzzy numbers. On this basis, by fuzzing the parameters of the conventional deterministic model, a fuzzy model for calculating river water environmental capacity is established. According to this model, the river water environment capacity in the form of triangular fuzzy numbers can be calculated. According to the requirements of a given level of credibility, the water environment capacity can be further converted from triangular fuzzy numbers to interval values. Research shows that compared with conventional deterministic methods, the results obtained are more scientific and reasonable
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Dong, Guofang, Pu Sun, Wenbo Shi und Chang Choi. „A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems“. Applied Soft Computing 70 (September 2018): 896–902. http://dx.doi.org/10.1016/j.asoc.2018.02.036.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Dai, Xinghua, Shengrong Gong, Shan Zhong und Zongming Bao. „Bilinear CNN Model for Fine-Grained Classification Based on Subcategory-Similarity Measurement“. Applied Sciences 9, Nr. 2 (16.01.2019): 301. http://dx.doi.org/10.3390/app9020301.

Der volle Inhalt der Quelle
Annotation:
One of the challenges in fine-grained classification is that subcategories with significant similarity are hard to be distinguished due to the equal treatment of all subcategories in existing algorithms. In order to solve this problem, a fine-grained image classification method by combining a bilinear convolutional neural network (B-CNN) and the measurement of subcategory similarities is proposed. Firstly, an improved weakly supervised localization method is designed to obtain the bounding box of the main object, which allows the model to eliminate the influence of background noise and obtain more accurate features. Then, sample features in the training set are computed by B-CNN so that the fuzzing similarity matrix for measuring interclass similarities can be obtained. To further improve classification accuracy, the loss function is designed by weighting triplet loss and softmax loss. Extensive experiments implemented on two benchmarks datasets, Stanford Cars-196 and Caltech-UCSD Birds-200-2011 (CUB-200-2011), show that the newly proposed method outperforms in accuracy several state-of-the-art weakly supervised classification models.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wang, Xiandong, Jianmin He und Shouwei Li. „Compound Option Pricing under Fuzzy Environment“. Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/875319.

Der volle Inhalt der Quelle
Annotation:
Considering the uncertainty of a financial market includes two aspects: risk and vagueness; in this paper, fuzzy sets theory is applied to model the imprecise input parameters (interest rate and volatility). We present the fuzzy price of compound option by fuzzing the interest and volatility in Geske’s compound option pricing formula. For eachα, theα-level set of fuzzy prices is obtained according to the fuzzy arithmetics and the definition of fuzzy-valued function. We apply a defuzzification method based on crisp possibilistic mean values of the fuzzy interest rate and fuzzy volatility to obtain the crisp possibilistic mean value of compound option price. Finally, we present a numerical analysis to illustrate the compound option pricing under fuzzy environment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Liu, Xiao, Xiaoting Li, Rupesh Prajapati und Dinghao Wu. „DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing“. Proceedings of the AAAI Conference on Artificial Intelligence 33 (17.07.2019): 1044–51. http://dx.doi.org/10.1609/aaai.v33i01.33011044.

Der volle Inhalt der Quelle
Annotation:
Compilers are among the most fundamental programming tools for building software. However, production compilers remain buggy. Fuzz testing is often leveraged with newlygenerated, or mutated inputs in order to find new bugs or security vulnerabilities. In this paper, we propose a grammarbased fuzzing tool called DEEPFUZZ. Based on a generative Sequence-to-Sequence model, DEEPFUZZ automatically and continuously generates well-formed C programs. We use this set of new C programs to fuzz off-the-shelf C compilers, e.g., GCC and Clang/LLVM. We present a detailed case study to analyze the success rate and coverage improvement of the generated C programs for fuzz testing. We analyze the performance of DEEPFUZZ with three types of sampling methods as well as three types of generation strategies. Consequently, DEEPFUZZ improved the testing efficacy in regards to the line, function, and branch coverage. In our preliminary study, we found and reported 8 bugs of GCC, all of which are actively being addressed by developers.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Model fuzzing"

1

Duchene, Fabien. „Detection of web vulnerabilities via model inference assisted evolutionary fuzzing“. Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM022/document.

Der volle Inhalt der Quelle
Annotation:
Le test est une approche efficace pour détecter des bogues d'implémentation ayant un impact sur la sécurité, c.a.d. des vulnérabilités. Lorsque le code source n'est pas disponible, il est nécessaire d'utiliser des techniques de test en boîte noire. Nous nous intéressons au problème de détection automatique d'une classe de vulnérabilités (Cross Site Scripting alias XSS) dans les applications web dans un contexte de test en boîte noire. Nous proposons une approche pour inférer des modèles de telles applications et frelatons des séquences d'entrées générées à partir de ces modèles et d'une grammaire d'attaque. Nous inférons des automates de contrôle et de teinte, dont nous extrayons des sous-modèles afin de réduire l'espace de recherche de l'étape de frelatage. Nous utilisons des algorithmes génétiques pour guider la production d'entrées malicieuses envoyées à l'application. Nous produisons un verdict de test grâce à une double inférence de teinte sur l'arbre d'analyse grammaticale d'un navigateur et à l'utilisation de motifs de vulnérabilités comportant des annotations de teinte. Nos implémentations LigRE et KameleonFuzz obtiennent de meilleurs résultats que les scanneurs boîte noire open-source. Nous avons découvert des XSS ``0-day'' (c.a.d. des vulnérabilités jusque lors inconnues publiquement) dans des applications web utilisées par des millions d'utilisateurs
Testing is a viable approach for detecting implementation bugs which have a security impact, a.k.a. vulnerabilities. When the source code is not available, it is necessary to use black-box testing techniques. We address the problem of automatically detecting a certain class of vulnerabilities (Cross Site Scripting a.k.a. XSS) in web applications in a black-box test context. We propose an approach for inferring models of web applications and fuzzing from such models and an attack grammar. We infer control plus taint flow automata, from which we produce slices, which narrow the fuzzing search space. Genetic algorithms are then used to schedule the malicious inputs which are sent to the application. We incorporate a test verdict by performing a double taint inference on the browser parse tree and combining this with taint aware vulnerability patterns. Our implementations LigRE and KameleonFuzz outperform current open-source black-box scanners. We discovered 0-day XSS (i.e., previously unknown vulnerabilities) in web applications used by millions of users
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Venger, Adam. „Black-box analýza zabezpečení Wi-Fi“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445533.

Der volle Inhalt der Quelle
Annotation:
Zariadenia, na ktoré sa každodenne spoliehame, sú stále zložitejšie a využívajú zložitejšie protokoly. Jedným z týchto protokolov je Wi-Fi. S rastúcou zložitosťou sa zvyšuje aj potenciál pre implementačné chyby. Táto práca skúma Wi-Fi protokol a použitie fuzz testingu pre generovanie semi-validných vstupov, ktoré by mohli odhaliť zraniteľné miesta v zariadeniach. Špeciálna pozornosť bola venovaná testovaniu Wi-Fi v systéme ESP32 a ESP32-S2. Výsledkom práce je fuzzer vhodný pre testovanie akéhokoľvek Wi-Fi zariadenia, monitorovací nástroj špeciálne pre ESP32 a sada testovacích programov pre ESP32. Nástroj neodhalil žiadne potenciálne zraniteľnosti.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Ahmad, Abbas. „Model-Based Testing for IoT Systems : Methods and tools“. Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD008/document.

Der volle Inhalt der Quelle
Annotation:
L'internet des objets (IoT) est aujourd'hui un moyen d'innovation et de transformation pour de nombreuses entreprises. Les applications s'étendent à un grand nombre de domaines, tels que les villes intelligentes, les maisons intelligentes, la santé, etc. Le Groupe Gartner estime à 21 milliards le nombre d'objets connectés d'ici 2020. Le grand nombre d'objets connectés introduit des problèmes, tels que la conformité et l'interopérabilité en raison de l'hétérogénéité des protocoles de communication et de l'absence d'une norme mondialement acceptée. Le grand nombre d'utilisations introduit des problèmes de déploiement sécurisé et d'évolution du réseau des IoT pour former des infrastructures de grande taille. Cette thèse aborde la problématique de la validation de l'internet des objets pour répondre aux défis des systèmes IoT. Pour cela, nous proposons une approche utilisant la génération de tests à partir de modèles (MBT). Nous avons confronté cette approche à travers de multiples expérimentations utilisant des systèmes réels grâce à notre participation à des projets internationaux. L'effort important qui doit être fait sur les aspects du test rappelle à tout développeur de système IoT que: ne rien faire est plus cher que de faire au fur et à mesure
The Internet of Things (IoT) is nowadays globally a mean of innovation and transformation for many companies. Applications extend to a large number of domains, such as smart cities, smart homes, healthcare, etc. The Gartner Group estimates an increase up to 21 billion connected things by 2020. The large span of "things" introduces problematic aspects, such as conformance and interoperability due to the heterogeneity of communication protocols and the lack of a globally-accepted standard. The large span of usages introduces problems regarding secure deployments and scalability of the network over large-scale infrastructures. This thesis deals with the problem of the validation of the Internet of Things to meet the challenges of IoT systems. For that, we propose an approach using the generation of tests from models (MBT). We have confronted this approach through multiple experiments using real systems thanks to our participation in international projects. The important effort which is needed to be placed on the testing aspects reminds every IoT system developer that doing nothing is more expensive later on than doing it on the go
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Lone, Sang Fernand. „Protection des systèmes informatiques contre les attaques par entrées-sorties“. Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00863020.

Der volle Inhalt der Quelle
Annotation:
Les attaques ciblant les systèmes informatiques vont aujourd'hui au delà de simples logiciels malveillants et impliquent de plus en plus des composants matériels. Cette thèse s'intéresse à cette nouvelle classe d'attaques et traite, plus précisément, des attaques par entrées-sorties qui détournent des fonctionnalités légitimes du matériel, tels que les mécanismes entrées-sorties, à différentes fins malveillantes. L'objectif est d'étudier ces attaques, qui sont extrêmement difficiles à détecter par des techniques logicielles classiques (dans la mesure où leur mise en oeuvre ne nécessite pas l'intervention des processeurs) afin de proposer des contre-mesures adaptées, basées sur des composants matériels fiables et incontournables. Ce manuscrit se concentre sur deux cas : celui des composants matériels qui peuvent être délibérément conçus pour être malveillants et agissants de la même façon qu'un programme intégrant un cheval de Troie ; et celui des composants matériels vulnérables qui ont été modifiés par un pirate informatique, localement ou au travers du réseau, afin d'y intégrer des fonctions malveillantes (typiquement, une porte dérobée dans son firmware). Pour identifier les attaques par entrées-sorties, nous avons commencé par élaborer un modèle d'attaques qui tient compte des différents niveaux d'abstraction d'un système informatique. Nous nous sommes ensuite appuyés sur ce modèle d'attaques pour les étudier selon deux approches complémentaires : une analyse de vulnérabilités traditionnelle, consistant à identifier une vulnérabilité, développer des preuves de concept et proposer des contre-mesures ; et une analyse de vulnérabilités par fuzzing sur les bus d'entrées-sorties, reposant sur un outil d'injection de fautes que nous avons conçu, baptisé IronHide, capable de simuler des attaques depuis un composant matériel malveillant. Les résultats obtenus pour chacunes de ces approches sont discutés et quelques contre-mesures aux vulnérabilités identifiées, basées sur des composants matériels existants, sont proposées.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Liao, Feng-Ze, und 廖峰澤. „Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/34522736060995439796.

Der volle Inhalt der Quelle
Annotation:
碩士
國立交通大學
網路工程研究所
103
Internet applications have made our daily life fruitful. However, they also cause many security problems if these applications are leveraged by intruders. Thus, it is important to find and fix vulnerabilities timely to prevent application vulnerabilities from being exploited. Fuzz testing is a popular methodology that effectively finds vulnerabilities in application programs with seed input mutation. However, it is not a satisfied solution for the web browsers. In this work, we propose a solution, called scheduled DOM fuzzing (SDF), which integrates several related browser fuzzing tools and the fuzzing framework called BFF. To explore more crash possibilities, we revise the browser fuzzing architecture and schedule seed input selection and mutation dynamically. We also propose two probability computing methods in scheduling mechanism which tries to improve the performance by determining which combinations of seed and mutation would produce more crashes. Our experiments show that SDF is 2.27 time more efficient in terms of the number of crashes and vulnerabilities found at most. SDF also has the capacity for finding 23 exploitable crashes in Windows 7 within five days. The experimental results reveals that a good scheduling method for seed and mutations in browser fuzzing is able to find more exploitable crashes than fuzzers with the fixed seed input.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Model fuzzing"

1

Wikert, Steven Micheal. Cherish me always: Teddy bears & warm fuzzies : antique photographs of children with stuffed animals. Grantsville, Md: Hobby House Press, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wikert, Steven Micheal, und Mary McMurray Wikert. Teddy Bears & Warm Fuzzies: Antique Photographs of Children with Stuffed Animals. Hobby House Press, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Model fuzzing"

1

Chen, Chen, Zhouguo Chen, Yongle Hao und Baojiang Cui. „Mocov: Model Based Fuzzing Through Coverage Guided Technology“. In Advances on Broad-Band Wireless Computing, Communication and Applications, 404–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69811-3_37.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Widl, Magdalena. „Test Case Generation by Grammar-Based Fuzzing for Model-Driven Engineering“. In Hardware and Software: Verification and Testing, 278–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_28.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Chen, Yixiong, Yang Yang, Zhanyao Lei, Mingyuan Xia und Zhengwei Qi. „Bootstrapping Automated Testing for RESTful Web Services“. In Fundamental Approaches to Software Engineering, 46–66. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_3.

Der volle Inhalt der Quelle
Annotation:
AbstractModern RESTful services expose RESTful APIs to integrate with diversified applications. Most RESTful API parameters are weakly typed, which greatly increases the possible input value space. This poses difficulties for automated testing tools to generate effective test cases to reveal web service defects related to parameter validation. We call this phenomenon the type collapse problem. To remedy this problem, we introduce FET (Format-encoded Type) techniques, including the FET, the FET lattice, and the FET inference to model fine-grained information for API parameters. Enhanced by FET techniques, automated testing tools can generate targeted test cases. We demonstrate Leif, a trace-driven fuzzing tool, as a proof-of-concept implementation of FET techniques. Experiment results on 27 commercial services show that FET inference precisely captures documented parameter definitions, which helps Leif to discover 11 new bugs and reduce $$72\% \sim 86\%$$ 72 % ∼ 86 % fuzzing time as compared to state-of-the-art fuzzers.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Alshmrany, Kaled M., Rafael S. Menezes, Mikhail R. Gadelha und Lucas C. Cordeiro. „FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution)“. In Fundamental Approaches to Software Engineering, 363–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_19.

Der volle Inhalt der Quelle
Annotation:
AbstractWe describe and evaluate a novel white-box fuzzer for C programs named , which combines fuzzing and symbolic execution, and applies Bounded Model Checking (BMC) to find security vulnerabilities in C programs. explores and analyzes C programs (1) to find execution paths that lead to property violations and (2) to incrementally inject labels to guide the fuzzer and the BMC engine to produce test-cases for code coverage. successfully participates in Test-Comp’21 and achieves first place in the category and second place in the category.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Idowu, Peter Adebayo, Sarumi Olusegun Ajibola, Jeremiah Ademola Balogun und Oluwadare Ogunlade. „Development of a Fuzzy Logic-Based Model for Monitoring Cardiovascular Risk“. In Coronary and Cardiothoracic Critical Care, 172–90. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8185-7.ch009.

Der volle Inhalt der Quelle
Annotation:
Cardiovascular diseases (CVD) are top killers with heart failure as one of the most leading cause of death in both developed and developing countries. In Nigeria, the inability to consistently monitor the vital signs of patients has led to the hospitalization and untimely death of many as a result of heart failure. Fuzzy logic models have found relevance in healthcare services due to their ability to measure vagueness associated with uncertainty management in intelligent systems. This study aims to develop a fuzzy logic model for monitoring heart failure risk using risk indicators assessed from patients. Following interview with expert cardiologists, the different stages of heart failure was identified alongside their respective indicators. Triangular membership functions were used to fuzzify the input and output variables while the fuzzy inference engine was developed using rules elicited from cardiologists. The model was simulated using the MATLAB® Fuzzy Logic Toolbox.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jaggi, Chandra K., Bimal Kumar Mishra und T. C. Panda. „A Fuzzy EOQ Model for Deteriorating Items With Allowable Shortage and Inspection Under the Trade Credit“. In Handbook of Research on Promoting Business Process Improvement Through Inventory Control Techniques, 233–49. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3232-3.ch014.

Der volle Inhalt der Quelle
Annotation:
This chapter develops an economic order quantity model for deteriorating items with initial inspection, allowable shortage under the condition of permissible delay in payment by fuzzify the demand rate, deterioration rate and inspection parameter of non-defective parameter based on as triangular fuzzy numbers to fit the real word. The total fuzzy cost function has been defuzzified using signed distance and centroid method. Comparison between these two methods has also been discussed. The validity of the model has been established with the help of a hypothetical numerical example.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Chakraborti, Debjani, Valentina E. Balas und Bijay Baran Pal. „Genetic Algorithm for FGP Model of a Multiobjective Bilevel Programming Problem in Uncertain Environment“. In Handbook of Research on Natural Computing for Optimization Problems, 870–88. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0058-2.ch035.

Der volle Inhalt der Quelle
Annotation:
This chapter describes a Genetic Algorithm (GA) based Fuzzy Goal Programming (FGP) model to solve a Multiobjective Bilevel Programming Problem (MOBLPP) with a set of chance constraints within a structure of decentralized decision problems. To formulate the model, the chance constraints are converted first to their crisp equivalents to employ FGP methodology. Then, the tolerance membership functions associated with fuzzily described goals of the objective functions are defined to measure the degree of satisfaction of Decision Makers (DMs) with achievement of objective function values and also to obtain the degree of optimality of vector of decision variables controlled by upper-level DM in the decision system. In decision-making process, a GA scheme is adopted to solve the problem and thereby to obtain a proper solution for balancing execution powers of DMs in uncertain environment. A numerical example is provided to illustrate the method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Kumar, Mousumi, Valentina E. Balas und Bijay Baran Pal. „Using Fuzzy Goal Programming with Penalty Functions for Solving EEPGD Problem via Genetic Algorithm“. In Handbook of Research on Natural Computing for Optimization Problems, 847–69. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0058-2.ch034.

Der volle Inhalt der Quelle
Annotation:
This chapter presents how the concept of penalty functions is incorporated within the framework of Fuzzy Goal Programming (FGP) for modelling and solving Economic-Environmental Power Generation and Dispatch (EEPGD) problems by employing genetic algorithms. In model formulation, first penalty functions to measuring membership values of defined fuzzy goals are presented. Then, minsum FGP method is used to obtain rank based solution in imprecise environment. In the process of solving the problem, a GA scheme is implemented at two different stages. At the first stage, optimal solutions of objective functions are determined for fuzzy representation of each of them. At the second stage, evaluation of achievement function to arrive at the highest membership value of fuzzily described objective goals is taken into account. The standard IEEE 6-Generator 30-Bus test system is considered to illustrate the approach. A comparison of model solution with the solutions of conventional approaches is also made to highlight the potential use of the approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Saha, Sumana, und Tripti Chakrabarti. „Imprecise Inventory Model for Items With Imperfect Quality Subject to Learning Effects Having Shortages“. In Handbook of Research on Promoting Business Process Improvement Through Inventory Control Techniques, 284–304. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3232-3.ch016.

Der volle Inhalt der Quelle
Annotation:
The fundamental assumption of an economic order quantity (EOQ) model is that 100% of items in an ordered lot are perfect. This assumption is not always pertinent for production processes because of process deterioration or other factors. This paper develops an EOQ model for that each ordered lot contains some defective items and shortages backordered. Here, an inventory model is developed to deal the impreciseness present in market demand. It is assumed that the received items are not of perfect quality and after screening, imperfect items are withdrawn from inventory and sold at discounted price. However, in practice, errors occur in screening test. So, the screening process fails to be perfect. Due to acquaintance with handling methodology and system, holding cost and ordering cost are gradually decreases from one shipment to another. So, learning effect is incorporated on holding cost, ordering cost and number of defective items present in each lot. Due to impreciseness in market demand and in different inventory costs, profit expression is fuzzy in nature. To fuzzify the profit expression, Extension Principle is used and for defuzzification Signed distance method is applied. Finally, the feasibility of proposed model and the effect of learning on optimal solution are shown through numerical example.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

„Development of Fuzzy Multi-Objective Stochastic Fractional Programming Models“. In Multi-Objective Stochastic Programming in Fuzzy Environments, 128–76. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8301-1.ch004.

Der volle Inhalt der Quelle
Annotation:
In this chapter, two methodologies for solving multi-objective linear fractional stochastic programming problems containing fuzzy numbers (FNs) and fuzzy random variables (FRVs) associated with the system constraints are developed. In the model formulation process, the fuzzy probabilistic constraints are converted into equivalent fuzzy constraints by applying chance constrained programming (CCP) technique in a fuzzily defined probabilistic decision-making situation. Then two techniques, -cut and defuzzification methods, are used to convert the model into the corresponding deterministic model. In the method of using -cut for FNs, the tolerance level of FNs is considered, and the constraints are reduced to constraints with interval coefficients. Alternatively, in using defuzzification method, FNs are replaced by their defuzzified values. Consequently, the constraints are modified into constraints in deterministic form. In the next step, the constraints with interval coefficients are customized into its equivalent form by using the convex combination of each interval. If the parameters of the objectives are triangular FNs, then on the basis of their tolerance ranges each objective is decomposed into three objectives with crisp coefficients. Then each objective is solved independently to find their best and worst values and those values are used to construct membership function of each objective. Finally, the compromise solution of multi-objective linear fractional CCP problems is obtained by applying any of the approaches: priority-based fuzzy goal programming (FGP) method, Zimmermann's approach, -connective process, or minimum bounded sum operator technique. To demonstrate the efficiency of the above-described techniques, two illustrative examples, studied previously, are solved, and the solutions are compared with the existing methodology.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Model fuzzing"

1

Schneider, Martin, Jurgen Grossmann, Ina Schieferdecker und Andrej Pietschker. „Online Model-Based Behavioral Fuzzing“. In 2013 IEEE 6th International Conference On Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2013. http://dx.doi.org/10.1109/icstw.2013.61.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wang, Jiajie, Puhan Zhang, Lei Zhang, Haowen Zhu und Xiaojun Ye. „A model-based fuzzing approach for DBMS“. In 2013 8th International Conference on Communications and Networking in China (CHINACOM). IEEE, 2013. http://dx.doi.org/10.1109/chinacom.2013.6694634.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Pham, Van-Thuan, Marcel Böhme und Abhik Roychoudhury. „Model-based whitebox fuzzing for program binaries“. In ASE'16: ACM/IEEE International Conference on Automated Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2970276.2970316.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Gao, Zicong, Weiyu Dong, Rui Chang und Chengwei Ai. „The Stacked Seq2seq-attention Model for Protocol Fuzzing“. In 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2019. http://dx.doi.org/10.1109/iccsnt47585.2019.8962499.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

He, HuiHui, und YongJun Wang. „PNFUZZ: A Stateful Network Protocol Fuzzing Approach Based on Packet Clustering“. In 6th International Conference on Computer Science, Engineering And Applications (CSEA 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101805.

Der volle Inhalt der Quelle
Annotation:
Due to the interactivity of stateful network protocol, network protocol fuzzing has higher blindness and lower testcase validity. The existing blackbox-based fuzzing has the disadvantages of high randomness and blindness. The manual description of protocol specification which requires more expert knowledge, is tedious and does not support the protocol without public document, which limits the effect of current network protocol fuzzer. In this paper, we present PNFUZZ, a fuzzer that adopts the state inference based on packet clustering algorithm and coverage oriented mutation strategy. We train a clustering model through the target protocol packet, and use the model to identify the server’s protocol state, thereby optimizing the process of testcase generation. The experimental results show that the proposed approach has a certain improvement in fuzzing effect.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Sun, Xiaoshan, Yu Fu, Yun Dong, Zhihao Liu und Yang Zhang. „Improving Fitness Function for Language Fuzzing with PCFG Model“. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2018. http://dx.doi.org/10.1109/compsac.2018.00098.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Duchene, Fabien, Roland Groz, Sanjay Rawat und Jean-Luc Richier. „XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing“. In 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2012. http://dx.doi.org/10.1109/icst.2012.181.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Wang, Jiajie, Tao Guo, Puhan Zhang und Qixue Xiao. „A Model-Based Behavioral Fuzzing Approach for Network Service“. In 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC). IEEE, 2013. http://dx.doi.org/10.1109/imccc.2013.250.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Xu, Haoran, Yongjun Wang, Shuhui Fan, Peidai Xie und Aizhi Liu. „DSmith: Compiler Fuzzing through Generative Deep Learning Model with Attention“. In 2020 International Joint Conference on Neural Networks (IJCNN). IEEE, 2020. http://dx.doi.org/10.1109/ijcnn48605.2020.9206911.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Johansson, William, Martin Svensson, Ulf E. Larson, Magnus Almgren und Vincenzo Gulisano. „T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols“. In 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2014. http://dx.doi.org/10.1109/icst.2014.45.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie