|
1.Hetzel, B., The Complete Guide to Software Testing, QED Information Sciences, Wellesley, Mass. 1988. 2.Beizer, B. 1990 Software Testing Techniques. John Wiley & Sons, Inc. 3.Hetzel, B., "Software Testing: Some Troubling Issues and Opportunities", BCS Special Interest Group in Software Testing, Dec 6, 1991.ression clustering to Reverse Engineering. Bioinformatics, 2000. 16(8): p. 707-726. 4.D. Alberts, “The economics of software quality assurance,” in AFIPS Conf. Proc. 1976 Nar. Computer Conf., vol. 45. Montvale, NJ: AFIPS Press, pp. 433-442. 5.G. Myers, The Art of Sofrware Testing. New York: Wiley, 1979. 6.Hoglund, G. and McGraw, G. 2004 Exploiting Software: How to Break Code. Pearson Higher Education. 7.McGraw, G. and Potter, B. 2004. Software Security Testing. IEEE Security and Privacy 2, 5 (Sep. 2004), 81-85. 8.Huang, Y., Yu, F., Hang, C., Tsai, C., Lee, D., and Kuo, S. 2004. Securing web application code by static analysis and runtime protection. In Proceedings of the 13th international Conference on World Wide Web (New York, NY, USA, May 17 - 20, 2004). WWW ''04. ACM Press, New York, NY, 40-52. 9.Berndt, D. J. and Watkins, A. 2005. High Volume Software Testing using Genetic Algorithms. In Proceedings of the Proceedings of the 38th Annual Hawaii international Conference on System Sciences (Hicss''05) - Track 9 - Volume 09 (January 03 - 06, 2005). HICSS. IEEE Computer Society, Washington, DC, 318.2. 10.McGee, P. and Kaner, C. 2004. Experiments with high volume test automation. SIGSOFT Softw. Eng. Notes 29, 5 (Sep. 2004), 1-3. 11.Beizer, B. 1990 Software Testing Techniques. John Wiley & Sons, Inc. 12.Ntafos, S. C. 1988. A Comparison of Some Structural Testing Strategies. IEEE Trans. Softw. Eng. 14, 6 (Jun. 1988), 868-874. 13.M. Roper, Software Testing. London: McGraw-Hill Book Company, 1994. 14.A. H.Watson, “Structured testing: Analysis and extensions,” Tech. Rep. TR-528-96, Princeton University, 1996. 15.Tikir, M. M. and Hollingsworth, J. K. 2002. Efficient instrumentation for code coverage testing. In Proceedings of the 2002 ACM SIGSOFT international Symposium on Software Testing and Analysis (Roma, Italy, July 22 - 24, 2002). ISSTA ''02. ACM Press, New York, NY, 86-96. 16.Gallagher, M. J. and Narasimhan, V. L. 1997. ADTEST: A Test Data Generation Suite for Ada Software Systems. IEEE Trans. Softw. Eng. 23, 8 (Aug. 1997), 473-484. 17.Holland, J. H. 1992 Adaptation in natural and artificial systems. MIT Press. 18.Michalewicz Z. (1992). Genetic Algorithms + Data Structures = Evolution Programs. Springer-Verlag, New York. 19.Haupt R. L. and Haupt S. E., Practical Genetic Algorithms 2nd Edition, John Wiley & Sons, Inc., 2004. 20.Lozano M., Herrera F., Krasnogor N., and Molina D. Real-coded memetic algorithms with crossover hill-climbing. Evolutionary Computation 12 (3):273-302, 2004. 21.Herrera F., Lozano M., and Verdegay J. L., Tackling real-coded genetic algorithms: operators and tools for the behavioral analysis. Artificial Intelligence Reviews 12 (4):265-319, 1998. 22.Puchkov, F. M. and Shapchenko, K. A. 2005. Static Analysis Method for Detecting Buffer Overflow Vulnerabilities. Program. Comput. Softw. 31, 4 (Jul. 2005), 179-189. 23.Lammermann, F. and Wappler, S. 2005. Benefits of software measures for evolutionary white-box testing. In Proceedings of the 2005 Conference on Genetic and Evolutionary Computation (Washington DC, USA, June 25 - 29, 2005). H. Beyer, Ed. GECCO ''05. ACM Press, New York, NY, 1083-1084. 24.N. Tracey. A search-based automated test-data generation framework for safety critical software. PhD thesis, University of York, 2000. 25.P. McMinn. Search-based software test data generation: a survey. Software Testing, Verification and Reliability, 14:105--156, June 2004. 26.Amit Kulkarni, Stephen Bush, Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, Journal of Network and Systems Management, Volume 14, Issue 1, Mar 2006, Pages 69 - 80 27.David Larson, Keith Miller, "Silver Bullets for Little Monsters: Making Software More Trustworthy," IT Professional, vol. 07, no. 2, pp. 9-13, Mar/Apr, 2005. 28.Scholz, B., Blieberger, J., and Fahringer, T. 1999. Symbolic pointer analysis for detecting memory leaks. SIGPLAN Not. 34, 11 (Nov. 1999), 104-113. 29.Heine, D. L. and Lam, M. S. 2003. A practical flow-sensitive and context-sensitive C and C++ memory leak detector. In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (San Diego, California, USA, June 09 - 11, 2003). PLDI ''03. ACM Press, New York, NY, 168-181. 30.R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proceedings of the Winter USENIX Conference, pages 125–136, December 1992. 31.W. R. Bush, J. D. Pincus, and D. J. Sielaff. A static analyzer for finding dynamic programming errors. Software–Practice and Experience, 30(7):775–802, June 2000. 32.S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for building system-specific, static analyses. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, pages 69–82, June 2002. 33.Chris Wilkinson, "對 Web 服務進行壓力測試", http://www-128.ibm.com/developerworks/tw/library/ws-tip-strstest/ 34.Xie, Y. and Aiken, A. 2005. Context- and path-sensitive memory leak detection. SIGSOFT Softw. Eng. Notes 30, 5 (Sep. 2005), 115-125.
|