共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
Ahmad Mustafa Wan M. N. Wan-Kadir Noraini Ibrahim Muhammad Arif Shah Muhammad Younas Atif Khan Mahdi Zareei Faisal Alanazi 《计算机、材料和连续体(英文)》2021,67(2):1819-1833
Software testing is an important and cost intensive activity in software development. The major contribution in cost is due to test case generations. Requirement-based testing is an approach in which test cases are derivative from requirements without considering the implementation’s internal structure. Requirement-based testing includes functional and nonfunctional requirements. The objective of this study is to explore the approaches that generate test cases from requirements. A systematic literature review based on two research questions and extensive quality assessment criteria includes studies. The study identifies 30 primary studies from 410 studies spanned from 2000 to 2018. The review’s finding shows that 53% of journal papers, 42% of conference papers, and 5% of book chapters’ address requirements-based testing. Most of the studies use UML, activity, and use case diagrams for test case generation from requirements. One of the significant lessons learned is that most software testing errors are traced back to errors in natural language requirements. A substantial amount of work focuses on UML diagrams for test case generations, which cannot capture all the system’s developed attributes. Furthermore, there is a lack of UML-based models that can generate test cases from natural language requirements by refining them in context. Coverage criteria indicate how efficiently the testing has been performed 12.37% of studies use requirements coverage, 20% of studies cover path coverage, and 17% study basic coverage. 相似文献
4.
Muhammad Luqman Mohd-Shafie Wan Mohd Nasir Wan Kadir Muhammad Khatibsyarbini Mohd Adham Isa Israr Ghani Husni Ruslai 《计算机、材料和连续体(英文)》2022,71(3):4337-4354
Testing is an integral part of software development. Current fast-paced system developments have rendered traditional testing techniques obsolete. Therefore, automated testing techniques are needed to adapt to such system developments speed. Model-based testing (MBT) is a technique that uses system models to generate and execute test cases automatically. It was identified that the test data generation (TDG) in many existing model-based test case generation (MB-TCG) approaches were still manual. An automatic and effective TDG can further reduce testing cost while detecting more faults. This study proposes an automated TDG approach in MB-TCG using the extended finite state machine model (EFSM). The proposed approach integrates MBT with combinatorial testing. The information available in an EFSM model and the boundary value analysis strategy are used to automate the domain input classifications which were done manually by the existing approach. The results showed that the proposed approach was able to detect 6.62 percent more faults than the conventional MB-TCG but at the same time generated 43 more tests. The proposed approach effectively detects faults, but a further treatment to the generated tests such as test case prioritization should be done to increase the effectiveness and efficiency of testing. 相似文献
5.
Juan R. Bermejo Higuera Javier Bermejo Higuera Juan A. Sicilia Montalvo Javier Cubo Villalba Juan José Nombela Pérez 《计算机、材料和连续体(英文)》2020,64(3):1555-1577
To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance. Given the significant cost of commercial tools, this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project. Thus, the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project. The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality. 相似文献
6.
本文分析了铁路信号安全软件测试评估平台的结构,测试案例的生成,运行集的生成以及回归测试。运用测试平台能实现对微机联锁软件的功能测试和安全性测试,提高联锁软件的可靠性安全性。 相似文献
7.
介绍了塔机安全评估系统的各部分组成,通过现场检测与软件平台相结合的方式,经过研究,提出一种综合评估的方法,该系统的建立,为塔机安全评估的系统化迈出了新的进程。 相似文献
8.
高性能安全路由器BW7000的设计与实现 总被引:4,自引:0,他引:4
高性能和安全是计算机网络研究的两个主要问题。路由器在保证转发性能的前提下提供网络安全保护已经成为当前的研究热点。文章介绍了在完成国家\"八六三\"计划重大课题\"高性能安全路由器\"的过程中解决的若干关键技术问题。高性能安全路由器BW7000基于自主设计的高性能路由器操作系统HEROS。为保证高性能的路由转发,设计实现了基于RAM的高性能路由查找算法;为支持服务质量控制和安全管理,设计实现了基于无冲突HashTrie树的分组分类算法和基于反馈的分布式分组调度算法;为保证网络安全,提出了基于分布式密钥管理的路由器安 相似文献
9.
10.
针对在大规模企业分布式网络中快速实施安全评估这一分布式安全评估问题,提出一种面向任务、可重构的主控中心方案.实验验证了该方案在快速任务生成时是可行、有效的,具有以扫描策略为组件、面向任务、可重构特性. 相似文献
11.
中央控制系统(CCS,Central Control System)是卫星电气地面支持设备(EGSE,Electrical GroundSupport Equipment)的核心,其性能的优劣对卫星的地面测试有重要影响.针对设计的CCS提出了影响其性能的主要技术指标--网络连接响应时间、测试序列执行能力和数据处理能力,提出了CCS性能测试方案,设计了性能测试用例,进行了CCS性能测试并给出了测试结论.结果表明,该CCS具有较好的性能,满足当前卫星地面测试的要求. 相似文献
12.
Hamed Fazlollahtabar Seyed Taghi Akhavan Niaki 《Quality and Reliability Engineering International》2017,33(8):1709-1718
Availability of a system is a crucial factor for planning and optimization. The concept is more challenging for modern systems such as robots and autonomous systems consisting of a complex configuration of components. In this paper, a reliability evaluation framework is developed for a system of binary state autonomous robots in an automated manufacturing environment. In this framework, the concepts in functional block diagram, table of truth, and sum of state are employed simultaneously to develop a binary state reliability model. Due to inefficacy of the method for larger number of components involved in complex systems, an extension of the Bernoulli trials is proposed. In an implementation study, the effectiveness and computational efficiency of the proposed method are illustrated. In addition, an analysis on the failure rate using the maximum likelihood estimation and confidence interval is reported. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
13.
14.
15.
16.
17.
Sadeeq Jan Omer Bin Tauqeer Fazal Qudus Khan George Tsaramirsis Awais Ahmad Iftikhar Ahmad Imran Maqsood Niamat Ullah 《计算机、材料和连续体(英文)》2021,66(1):631-645
Over the last decade, a significant increase has been observed in the useof web-based Information systems that process sensitive information, e.g., personal, financial, medical. With this increased use, the security of such systemsbecame a crucial aspect to ensure safety, integrity and authenticity of the data.To achieve the objectives of data safety, security testing is performed. However,with growth and diversity of information systems, it is challenging to apply security testing for each and every system. Therefore, it is important to classify theassets based on their required level of security using an appropriate technique.In this paper, we propose an asset security classification technique to classifythe System Under Test (SUT) based on various factors such as system exposure,data criticality and security requirements. We perform an extensive evaluation ofour technique on a sample of 451 information systems. Further, we use securitytesting on a sample extracted from the resulting prioritized systems to investigatethe presence of vulnerabilities. Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments andalso found several vulnerabilities in them. 相似文献
18.
19.
20.
Julien Piwowar Eric Chtelet Patrick Laclmence 《Reliability Engineering & System Safety》2009,94(11):1869-1877
In daily life, we are all used to frequent ‘systems’: public transports, industrial parks, shopping areas, stadiums or many others. And with the exponential increase of technologies, we are now living in a kind of ‘open World’ within which goods, persons or information are moving increasingly faster. The consequence is an amazing new way of life and also a number of new threats for our society. To insure the security of all citizens, and also of infrastructures, national skills or anything else, we need to secure our systems efficiently. To do so, we need appropriate tools to accurately analyze vulnerabilities in order to counter all kinds of malevolence. After giving an overview of different methods linked to that problem, we will explain our process to analyze the vulnerabilities of a complex infrastructure and what points are fundamental to take into account facing human aggressions. 相似文献