Citation: | HE Haitao, SHAN Chun, HE Hongdou, et al. “OSFPMiner: An Optimal Weighted Traversal Software Patterns Miner Based on Complex Network”. Chinese Journal of Electronics, vol. 29 no. 2. doi: 10.1049/cje.2020.01.002 |
Z. Yan and C. Prehofer, “Autonomic trust management for a component-based software system”, IEEE Transactions on Dependable & Secure Computing, Vol.8, No.6, pp.810-823, 2011.
|
P. Yan and Z. Yan, “A survey on dynamic mobile malware detection”, Software Quality Journal, Vol.26, No.3, pp.891-919, 2017.
|
F. Tong and Z. Yan, “A hybrid approach of mobile malware detection in Android”, Journal of Parallel and Distributed Computing, Vol.103, pp.22-31, 2017.
|
C. Li and L. Liu, “Complex networks with external degree”, Chinese Journal of Electronics, Vol.23, No.3, pp.442-447, 2014.
|
Q. Sun, K. R. Moniz and Y. Yuyu. “Ranking modules for integrate testing based on pagerank algorithm”, Chinese Journal of Electronics, Vol.26, No.5, pp.993-998, 2017.
|
H. Cheng, D. Lo, Y. Zhou, et al., “Identifying bug signatures using discriminative graph mining”, Proc. of the eighteenth international symposium on Software testing and analysis, Chicago, IL, USA, pp.141-152, 2009.
|
X. Su, T. T. Wang, S. J. Yang, et al., “Fault localization based on weighted software behavior graph mining”, Chinese Journal of Computers, Vol.39, No.11, pp.2175-2188, 2016.
|
Z. Abubakar, S. P. Lee and Y. Chong, “Simultaneous localization of software faults based on complex network theory”, IEEE Access, Vol.6, pp.23990-24002, 2018.
|
Y. Yang, J. Ai and F. Wang, “Defect prediction based on the characteristics of multilayer structure of software network”, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion, Lisbon, Portugal, pp.27-34, 2018.
|
H. He, J. Ren, G. Zhao, et al., “Mining of probabilistic controlling behavior model from dynamic software execution trace”, IEEE Access, vol.7, pp.79602-79616, 2019.
|
G. Huang, P. Zhang, B. Zhang, T. Yin and J. Ren, “The optimal community detection of software based on complex networks”, International Journal of Modern Physics C, Vol.27, No.8, pp.1650085, 2016.
|
A. Floratou, S. Tata and J. M. Patel, “Efficient and accurate discovery of patterns in sequence data sets”, IEEE Transactions on Knowledge and Data Engineering, Vol.23, No.8, pp.1154-1168, 2011.
|
K. Gouda, M. Hassaan and M. J. Zaki, “Prism: A primalencoding approach for frequent sequence mining”, Proc. of the 7th IEEE International Conference on Data Mining, Omaha, Nebraska, USA, pp.487-492, 2007.
|
D. Y. Chiu, Y. H. Wu and A. L. Chen, “Efficient frequent sequence mining by a dynamic strategy switching algorithm”, The VLDB Journal, Vol.18, No.1, pp.303-327, 2009.
|
R. Agrawal, T. Imielinski and A. Swami, “Mining association rules between sets of items in large database”, SIGMOD, Vol.22, No.2, pp.207-216, 1993.
|
J. Han, J. Pei and Y. Yin, “Mining frequent patterns without candidate generation”. SIGMOD, Vol.29, No.2, pp.1-12, 2000.
|
U. Yun and J. J. Leggett, “WSpan: Weighted sequential pattern mining in large sequence databases”, Proc. of the 3rd International IEEE Conference on Intelligent Systems, London, UK, pp.512-517, 2006.
|
D. L. Seong and H. C. Park, “Mining frequent patterns from weighted traversals on graph using confidence interval and pattern priority”, International Journal of Computer Science and Network Security, Vol.6, No.5A, pp.136-141, 2006.
|
D. L.Seong and H. C. Park, “Mining weighted frequent patterns from path traversals on weighted graph”, International Journal of Computer Science and Network Security, Vol.7, No.4, pp.140-148, 2007.
|
R. Geng, X. Dong and W. Xu, “Efficient algorithm for mining weighted sequential patterns based on graph traversals”, Journal of Control and Decision, Vol.24, No.5, pp.663-668, 2009.
|
M. Chen, J. S. Park and P. Yu, “Efficient data mining for path traversal patterns”, IEEE Transactions on Knowledge and Data Engineering, Vol.10, No.2, pp.209-221, 1998.
|
G. Lan, T. Hong and H. Lee, “An efficient approach for finding weighted sequential patterns from sequence databases”, Applied Intelligence, Vol.41, No.2, pp.439-452, 2014.
|
A. Mohan and R. Visakh, “Survey on weighted frequent pattern mining”, International Journal of Computer Trends & Technology, Vol.9, No.3, pp.102-106, 2014.
|
H. He, T. Yin, C. Pei, H. Wu and J. Ren, “Mining weighted frequent traversal pattern from software executing graph”, ICIC Express Letters, Vol.9, No.11, pp.2893-2900, 2015.
|
G. Huang, P. Zhang, Y. Li and J. Ren, “Mining the important nodes of software based on complex networks”, ICIC Express Letters, Vol.9, No.12, pp.3263-3268, 2015.
|