Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks
|
2020 |
(Mihaita), Alexandra-Elena Mocanu |
Methods for Live Testing of Cloud Services
|
2020 |
Jebbar, Oussama |
Using Model Learning for the Generation of Mock Components
|
2020 |
Salva, Sebastien |
Interrogating Virtual Agents: In Quest of Security Vulnerabilities
|
2020 |
Bozic, Josip |
APPregator: A Large-Scale Platform for Mobile Security Analysis
|
2020 |
Verderame, Luca |
Automatic Fairness Testing of Machine Learning Models
|
2020 |
Sharma, Arnab |
Learning Abstracted Non-deterministic Finite State Machines
|
2020 |
Pferscher, Andrea |
Trigger Alarm: A Smart NFC Sniffer for High-Precision Measuremets
|
2020 |
Erb, Martin |
A Technique for Parallel GUI Testing of Android Applications
|
2020 |
Tramontana, Porfirio |
Automated Transition Coverage in Behavioural Conformance Testing
|
2020 |
Marsso, Lina |
An Executable Mechanised Formalisation of an Adaptive State Counting Algorithm
|
2020 |
Sachtleben, Robert |
Inspecting Code Churns to Prioritize Test Cases
|
2020 |
Altiero, Francesco |
A. Comparative Study on Combinatorial and Random Testing for Highly Configurable Systems
|
2020 |
Jin, Hao |
Giving a Model-Based Testing Language a Formal Semantics via Partial MAX-SAT
|
2020 |
Aichernig, Bernhard K. |
About the Robustness and Looseness of Yara Rules
|
2020 |
Canfora, Gerardo |
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities
|
2020 |
Castiglione, Arcangelo |
Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server
|
2020 |
Catillo, Marta |
Enabling Next-Generation Cyber Ranges with Mobile Security Components
|
2020 |
Russo, Enrico |
Using an SMT Solver for Checking the Completeness
|
2020 |
Vinarskii, Evgenii |
Architecture Based on Keyword Driven Testing with Domain Specific Language for a Testing System
|
2020 |
Pereira, Ricardo B. |