1 | Dominik Holling and Sebastian Banescu and Marco Probst and Ana Petrovska and Alexander Pretschner Nequivack: Assessing Mutation Score Confidence Ninth {IEEE} International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops 2016, Chicago, IL, USA, April 11-15, 2016, 2016. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{HollingBPPP16,
author = {Dominik Holling and Sebastian Banescu and Marco Probst and Ana Petrovska and Alexander Pretschner},
title = {Nequivack: Assessing Mutation Score Confidence},
booktitle = {Ninth {IEEE} International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops 2016, Chicago, IL, USA, April 11-15, 2016},
year = {2016},
address = {},
month = {},
pages = {152--161}
} |
2 | Ilinca Ciupa and Alexander Pretschner and Manuel Oriol and Andreas Leitner and Bertrand Meyer On the number and nature of faults found by random testing Softw. Test., Verif. Reliab., 21(1), 2011. |
|
| Abstract: Available soon... |
| @ARTICLE{CiupaPOLM11,
author = {Ilinca Ciupa and Alexander Pretschner and Manuel Oriol and Andreas Leitner and Bertrand Meyer},
title = {On the number and nature of faults found by random testing},
journal = {Softw. Test., Verif. Reliab.},
year = {2011},
month = {},
volume = {21},
number = {1},
pages = {3--28}
} |
3 | Alexander Pretschner and Tejeddine Mouelhi and Yves Le Traon Model-Based Tests for Access Control Policies Proceedings of the 1st International Conference on Software Testing, Verification, and Validation (ICST '08)Lillehammer, Norway, 9-11 April 2008. |
|
| Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| @INPROCEEDINGS{PretschnerMT08,
author = {Alexander Pretschner and Tejeddine Mouelhi and Yves Le Traon},
title = {Model-Based Tests for Access Control Policies},
booktitle = {Proceedings of the 1st International Conference on Software Testing, Verification, and Validation (ICST '08)},
year = {2008},
address = {Lillehammer, Norway},
month = {9-11 April},
pages = {338-347}
} |