L
Lijo Thomas
Researcher at Dakota State University
Publications - 7
Citations - 234
Lijo Thomas is an academic researcher from Dakota State University. The author has contributed to research in topics: Security information and event management & Test harness. The author has an hindex of 6, co-authored 7 publications receiving 206 citations. Previous affiliations of Lijo Thomas include Cognizant.
Papers
More filters
Journal ArticleDOI
Automated Security Test Generation with Formal Threat Models
TL;DR: This paper presents an approach to automated generation of security tests by using formal threat models represented as Predicate/Transition nets, which generates all attack paths from a threat model and converts them into executable test code according to the given Model-Implementation Mapping (MIM) specification.
Journal ArticleDOI
An Automated Test Generation Technique for Software Quality Assurance
TL;DR: This paper presents an automated test generation technique, called Model-based Integration and System Test Automation (MISTA), for integrated functional and security testing of software systems and demonstrates that MISTA can be highly effective in fault detection.
Proceedings ArticleDOI
A model-based approach to automated testing of access control policies
TL;DR: A model-based approach for automated testing of access control implementation in an industry-adopted test automation framework that supports the generation of test code in a variety of languages, such as Java, C, C++, C#, and HTML/Selenium IDE is presented.
Journal ArticleDOI
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets
TL;DR: The experiments show that the model-based approach is highly effective in detecting the seeded access control defects and has been implemented in an industry-adopted test automation framework that supports the generation of test code in a variety of languages.
Proceedings ArticleDOI
Phishing detection using stochastic learning-based weak estimators
Justin Zhan,Lijo Thomas +1 more
TL;DR: This paper proposes a method to detect and filter phishing emails in dynamic environment by applying a family of weak estimators and experimental results show the feasibility and effectiveness of the approach.