2009 Second International Symposium on Electronic Commerce and Security 2009
DOI: 10.1109/isecs.2009.158
|View full text |Cite
|
Sign up to set email alerts
|

Mutation Analysis for Testing Finite State Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…Mutation analysis has been applied effectively on different kind of models, e.g. [16], [17], [18]. However, in the context of SPLs, it has not yet been introduced.…”
Section: Challenges Of Software Product Line Testingmentioning
confidence: 99%
“…Mutation analysis has been applied effectively on different kind of models, e.g. [16], [17], [18]. However, in the context of SPLs, it has not yet been introduced.…”
Section: Challenges Of Software Product Line Testingmentioning
confidence: 99%
“…tions by other nodes [26,35,50] 2. RSN replaces each starting node for edge introductions by other nodes [35,50] 3.…”
Section: Rtn Replaces Each Target Node For Edge Introduc-mentioning
confidence: 99%
“…RSN replaces each starting node for edge introductions by other nodes [35,50] 3. RSI replaces each synchronization event at edge introductions by other synchronization events [18,29,50] 4.…”
Section: Rtn Replaces Each Target Node For Edge Introduc-mentioning
confidence: 99%
“…Fuzz Testing is often used to discover DoS, buffer overflow, format string and other kinds of serious vulnerabilities of network protocols. There are two methods to do Fuzz, mutation-based fuzzers, mutate existing data samples to create test data; or generation-based fuzzers, define new test data based on models of the input [4][5][6].…”
Section: Introductionmentioning
confidence: 99%