Minatory 发表于 2025-3-26 23:33:30

http://reply.papertrans.cn/47/4676/467517/467517_31.png

不自然 发表于 2025-3-27 01:50:28

Safety-Critical Standards for Verification and Validationce, international organizations have issued regulations to disciple how these activities have to be performed in order to achieve systems of high quality. In particular, each of them indicates a definition of what safety means, proper qualitative and quantitative properties for evaluating the qualit

绑架 发表于 2025-3-27 05:54:36

Robustness Testing of Web Servicesticularly suitable for detecting robustness issues in web services. In fact, several research works have been conducted in the past leading to the proposal of different robustness testing techniques for such environments. However, although of utmost importance, most techniques do not consider the ne

云状 发表于 2025-3-27 11:49:15

http://reply.papertrans.cn/47/4676/467517/467517_34.png

conduct 发表于 2025-3-27 17:36:36

http://reply.papertrans.cn/47/4676/467517/467517_35.png

SOBER 发表于 2025-3-27 18:45:37

Survey on Software Faults Injection in Java Applicationslt-free software, and fault injection is recognized as a technique to understand the effects of faults in a given software product. However, the injection of software faults is not trivial and is still an open research problem. This chapter provides an overview on the injection of software faults an

Rankle 发表于 2025-3-27 22:32:53

http://reply.papertrans.cn/47/4676/467517/467517_37.png

讥讽 发表于 2025-3-28 04:30:33

Leveraging Fault Injection Techniques in Critical Industrial Applicationsitigation mechanisms and assessing system safety properties under exceptional conditions. Even of more relevance, the use of fault injection is currently recommended by many international standards, such as ISO-26262 and DO-178B, to support the system validation and certification process. This chapt

MAOIS 发表于 2025-3-28 06:45:23

Using Vulnerability Injection to Improve Web Securityst common software faults are injected in the web application source code, which is then checked by the scanners. Using this procedure, we evaluated three leading commercial scanners, which are often regarded as an easy way to test the security of web applications, including critical vulnerabilities

许可 发表于 2025-3-28 11:12:02

http://reply.papertrans.cn/47/4676/467517/467517_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Innovative Technologies for Dependable OTS-Based Critical Systems; Challenges and Achie Domenico Cotroneo Book 2013 Springer-Verlag Italia