Mark G. Pleszkoch

According to our database1, Mark G. Pleszkoch authored at least 23 papers between 1989 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Controlling Combinatorial Complexity in Software and Malware Behavior Computation.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2013
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Automated vulnerability detection for compiled smart grid software.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Automated Behavior Computation for Software Analysis and Validation.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Function Extraction Technology: Computing the Behavior of Malware.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Behavior computation for smart grid software analysis.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Computing the behavior of malware.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2008
Introducing function extraction into software testing.
Data Base, 2008

2007
A Semantic Recognizer Infrastructure for Computing Loop Behavior.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2004
Improving Network System Security with Function Extraction Technology for Automated Calculation of Program Behavior.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Function Extraction (FX) Technology: Automated Calculation of Program Behavior for High-Assurance Systems.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

Automated Detection of Injected Faults in a Differential Equation Solver Network Systems Development.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

1998
Classification Using Information.
Ann. Math. Artif. Intell., 1998

1996
The incremental development process in Cleanroom software engineering.
Decis. Support Syst., 1996

1995
Learning via Queries with Teams and Anomalies.
Fundam. Informaticae, 1995

1994
Classification Using Information.
Proceedings of the Algorithmic Learning Theory, 1994

1992
Learning vi Queries in [+, <].
J. Symb. Log., 1992

Eliminating non-traversable paths from structured programs.
Proceedings of the Conference on Software Maintenance, 1992

1990
Using Function Abstraction to Understand Program Behavior.
IEEE Softw., 1990

Learning Via Queries With Teams and Anomilies.
Proceedings of the Third Annual Workshop on Computational Learning Theory, 1990

Learning Via Queries in [+, <].
Proceedings of the Third Annual Workshop on Computational Learning Theory, 1990

1989
Learning via Queries to an Oracle.
Proceedings of the Second Annual Workshop on Computational Learning Theory, 1989


  Loading...