Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[ספר][B] Secure systems development with UML
J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …
High-quality development of security-critical systems is difficult, mainly because of the …
Recent advances in model-based testing
This chapter gives an overview of the field of model-based testing (MBT), particularly the
recent advances in the last decade. It gives a summary of the MBT process, the modeling …
recent advances in the last decade. It gives a summary of the MBT process, the modeling …
Model‐based security testing: a taxonomy and systematic classification
Model‐based security testing relies on models to test whether a software system meets its
security requirements. It is an active research field of high relevance for industrial …
security requirements. It is an active research field of high relevance for industrial …
Metamorphic testing for web system security
Security testing aims at verifying that the software meets its security properties. In modern
Web systems, however, this often entails the verification of the outputs generated when …
Web systems, however, this often entails the verification of the outputs generated when …
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they
are to be used for constructing security-critical solutions, what do we do about assurance …
are to be used for constructing security-critical solutions, what do we do about assurance …
Model-based security testing
Security testing aims at validating software system requirements related to security
properties like confidentiality, integrity, authentication, authorization, availability, and non …
properties like confidentiality, integrity, authentication, authorization, availability, and non …
A threat model‐based approach to security testing
Software security issues have been a major concern in the cyberspace community, so a
great deal of research on security testing has been performed, and various security testing …
great deal of research on security testing has been performed, and various security testing …
Metamorphic security testing for web systems
Security testing verifies that the data and the resources of software systems are protected
from attackers. Unfortunately, it suffers from the oracle problem, which refers to the …
from attackers. Unfortunately, it suffers from the oracle problem, which refers to the …
Test case generation by OCL mutation and constraint solving
Fault-based testing is a technique where testers anticipate errors in a system under test in
order to assess or generate test cases. The idea is to have enough test cases capable of …
order to assess or generate test cases. The idea is to have enough test cases capable of …
Testing security properties of protocol implementations-a machine learning based approach
G Shu, D Lee - … on Distributed Computing Systems (ICDCS'07), 2007 - ieeexplore.ieee.org
Security and reliability of network protocol implementations are essential for communication
services. Most of the approaches for verifying security and reliability, such as formal …
services. Most of the approaches for verifying security and reliability, such as formal …