scispace - formally typeset
L

Lijo Thomas

Researcher at Dakota State University

Publications -  7
Citations -  234

Lijo Thomas is an academic researcher from Dakota State University. The author has contributed to research in topics: Security information and event management & Test harness. The author has an hindex of 6, co-authored 7 publications receiving 206 citations. Previous affiliations of Lijo Thomas include Cognizant.

Papers
More filters
Journal ArticleDOI

Automated Security Test Generation with Formal Threat Models

TL;DR: This paper presents an approach to automated generation of security tests by using formal threat models represented as Predicate/Transition nets, which generates all attack paths from a threat model and converts them into executable test code according to the given Model-Implementation Mapping (MIM) specification.
Journal ArticleDOI

An Automated Test Generation Technique for Software Quality Assurance

TL;DR: This paper presents an automated test generation technique, called Model-based Integration and System Test Automation (MISTA), for integrated functional and security testing of software systems and demonstrates that MISTA can be highly effective in fault detection.
Proceedings ArticleDOI

A model-based approach to automated testing of access control policies

TL;DR: A model-based approach for automated testing of access control implementation in an industry-adopted test automation framework that supports the generation of test code in a variety of languages, such as Java, C, C++, C#, and HTML/Selenium IDE is presented.
Journal ArticleDOI

Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets

TL;DR: The experiments show that the model-based approach is highly effective in detecting the seeded access control defects and has been implemented in an industry-adopted test automation framework that supports the generation of test code in a variety of languages.
Proceedings ArticleDOI

Phishing detection using stochastic learning-based weak estimators

TL;DR: This paper proposes a method to detect and filter phishing emails in dynamic environment by applying a family of weak estimators and experimental results show the feasibility and effectiveness of the approach.