Mutation Testing Framework for Ad-hoc Networks Protocols
暂无分享,去创建一个
[1] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[2] Wynne Hsu,et al. DESIGN OF MUTANT OPERATORS FOR THE C PROGRAMMING LANGUAGE , 2006 .
[3] Hossain Shahriar,et al. OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[4] Huai Liu,et al. Conformance Testing of Network Simulators Based on Metamorphic Testing Technique , 2009, FMOODS/FORTE.
[5] A. Jefferson Offutt,et al. MuJava: an automated class mutation system , 2005, Softw. Test. Verification Reliab..
[6] Hong Zhu,et al. Software unit test coverage and adequacy , 1997, ACM Comput. Surv..
[7] Abdellah Ezzati,et al. Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET , 2014 .
[8] Aamer Nadeem,et al. A Fault Based Approach to Test Case Prioritization , 2017, 2017 International Conference on Frontiers of Information Technology (FIT).
[9] Wen Tang,et al. A model guided security vulnerability discovery approach for network protocol implementation , 2011, 2011 IEEE 13th International Conference on Communication Technology.
[10] Anneliese Amschler Andrews,et al. Fail-Safe Testing of Safety-Critical Systems , 2014, 2014 23rd Australian Software Engineering Conference.
[11] Mohammad Zulkernine,et al. Mutation-Based Testing of Buffer Overflow Vulnerabilities , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.
[12] Alexander L. Wolf,et al. Simulation-based test adequacy criteria for distributed systems , 2006, SIGSOFT '06/FSE-14.
[13] Mohammad Zulkernine,et al. Mutation-Based Testing of Format String Bugs , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[14] Rami Bahsoon,et al. Reduction-based methods and metrics for selective regression testing , 2002, Inf. Softw. Technol..
[15] O. P. Sangwan,et al. A systematic review on fault based mutation testing techniques and tools for Aspect-J programs , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[16] Wen Tang,et al. An effective fuzz input generation method for protocol testing , 2011, 2011 IEEE 13th International Conference on Communication Technology.