{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T21:36:03Z","timestamp":1648848963440},"reference-count":25,"publisher":"World Scientific Pub Co Pte Lt","issue":"08","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2017,10]]},"abstract":"<jats:p> The process of component security testing can produce massive amounts of monitor logs. Current approaches to detect implicit security exceptions (those which cannot be identified by visual inspection alone) compare correct execution sequences with fixed patterns mined from the execution of sequential patterns in the monitor logs. However, this is not efficient and is not suitable for mining large monitor logs. To enable effective mining of implicit security exceptions from large monitor logs, this paper proposes a method based on improved variable-length sequential pattern mining. The proposed method first mines the variable-length sequential patterns from correct execution sequences and from actual execution sequences, thus reducing the number of patterns. The sequential patterns are then detected using the Sunday string-searching algorithm. We conducted an experimental study based on this method, the results of which show that the proposed method can efficiently detect the implicit security exceptions of components. <\/jats:p>","DOI":"10.1142\/s0218194017500462","type":"journal-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T03:35:33Z","timestamp":1508816133000},"page":"1235-1268","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method"],"prefix":"10.1142","volume":"27","author":[{"given":"Jinfu","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, 301 Xuefu Road, Zhenjiang, P. R. China"}]},{"given":"Saihua","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, 301 Xuefu Road, Zhenjiang, P. R. China"}]},{"given":"Dave","family":"Towey","sequence":"additional","affiliation":[{"name":"School of Computer Science, The University of Nottingham Ningbo China, Ningbo, P. R. China"}]},{"given":"Lili","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, 301 Xuefu Road, Zhenjiang, P. R. China"}]},{"given":"Rubing","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, 301 Xuefu Road, Zhenjiang, P. R. China"}]},{"given":"Hilary","family":"Ackah-Arthur","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, 301 Xuefu Road, Zhenjiang, P. R. China"}]},{"given":"Michael","family":"Omari","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication Engineering, Jiangsu University, 301 Xuefu Road, Zhenjiang, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2017,10,23]]},"reference":[{"key":"S0218194017500462BIB001","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194012500039"},{"key":"S0218194017500462BIB002","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7488739"},{"key":"S0218194017500462BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6919819"},{"key":"S0218194017500462BIB005","first-page":"1127","volume":"46","author":"Chen J. F.","year":"2009","journal-title":"J. Comput. Res. Develop."},{"key":"S0218194017500462BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.256"},{"key":"S0218194017500462BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.094"},{"key":"S0218194017500462BIB010","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.002"},{"key":"S0218194017500462BIB014","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/14.1.55"},{"key":"S0218194017500462BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.03.281"},{"key":"S0218194017500462BIB016","first-page":"86","volume":"14","author":"Cheng X.","year":"2010","journal-title":"Comput. Sci. China"},{"key":"S0218194017500462BIB017","doi-asserted-by":"publisher","DOI":"10.1137\/0206024"},{"key":"S0218194017500462BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2009.11.010"},{"key":"S0218194017500462BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.10.018"},{"key":"S0218194017500462BIB020","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"S0218194017500462BIB021","doi-asserted-by":"publisher","DOI":"10.2991\/isci-15.2015.93"},{"key":"S0218194017500462BIB022","first-page":"166","volume":"13","author":"Li J. Y.","year":"2010","journal-title":"J. Hunan First Normal Univ."},{"key":"S0218194017500462BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_13"},{"key":"S0218194017500462BIB024","first-page":"18","volume":"15","author":"Patel B.","year":"2015","journal-title":"Int. J. Comput. Eng. Sci."},{"key":"S0218194017500462BIB026","first-page":"509","volume":"13","author":"Jonassen I.","year":"1997","journal-title":"Computer Appl. Biosci."},{"key":"S0218194017500462BIB027","doi-asserted-by":"publisher","DOI":"10.1145\/79173.79184"},{"key":"S0218194017500462BIB030","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2007.01.002"},{"key":"S0218194017500462BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.871569"},{"key":"S0218194017500462BIB035","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1189"},{"key":"S0218194017500462BIB036","first-page":"1","volume":"2013","author":"Chen J. F.","year":"2013","journal-title":"Sci. World J."},{"key":"S0218194017500462BIB037","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.05.049"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194017500462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T12:13:55Z","timestamp":1565093635000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194017500462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":25,"journal-issue":{"issue":"08","published-online":{"date-parts":[[2017,10,23]]},"published-print":{"date-parts":[[2017,10]]}},"alternative-id":["10.1142\/S0218194017500462"],"URL":"https:\/\/doi.org\/10.1142\/s0218194017500462","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10]]}}}