|
1.Gelperin, D. and B. Hetzel, The growth of software testing. 1988, ACM Press. p. 687-695. 2.Myers, G.J., et al., The Art of Software Testing. 2004: John Wiley and Sons. 3.Hetzel, B., The complete guide to software testing. 1988: QED Information Sciences, Inc. Wellesley, MA, USA. 4.United States Department of Justice. [cited; Available from: http://www.usdoj.gov/criminal/cybercrime/index.html. 5.William R. Bush, J.D.P.D.J.S., A static analyzer for finding dynamic programming errors. 2000. p. 775-802. 6.Dawson, E., et al., Bugs as deviant behavior: a general approach to inferring errors in systems code, in Proceedings of the eighteenth ACM symposium on Operating systems principles. 2001, ACM Press: Banff, Alberta, Canada. 7.Hastings, R. and B. Joyce, Purify: Fast detection of memory leaks and access errors. 1992. p. 125-136. 8.Valgrind. [cited; Available from: http://www.valgrind.org/. 9.David, E., Static detection of dynamic memory errors. 1996, ACM Press. p. 44-53. 10.Chen, P.-K., An Automated Method for Resource Testing. 2006. 11.Beizer, B., Software testing techniques. 1990: Van Nostrand Reinhold Co. New York, NY, USA. 12.Ntafos, S.C., A comparison of some structural testing strategies. Software Engineering, IEEE Transactions on, 1988. 14(6): p. 868-874. 13.Apache foundation. [cited; Available from: http://www.apache.org/. 14.joedog.org. [cited; Available from: http://www.joedog.org/. 15.httperf home page. [cited; Available from: http://www.hpl.hp.com/research/linux/httperf/. 16.Standard Performance Evaluation Corporation. [cited; Available from: http://www.spec.org/. 17.Transaction Processing Performance Council. [cited; Available from: http://www.tpc.org/. 18.McGee, P. and C. Kaner, Experiments with High Volume Test Automation. 19.Kaner, C., W. Bond, and P. McGee, High Volume Test Automation. 2004. 20.Berndt, D.J. and A. Watkins, High Volume Software Testing using Genetic Algorithms. 2005, IEEE Computer Society Washington, DC, USA. 21.Briand, L., Y. Labiche, and M. Shousha, Using genetic algorithms for early schedulability analysis and stress testing in real-time systems. Genetic Programming and Evolvable Machines, 2006. 7(2): p. 145-170. 22.Jian Zhang, S.C.C., Automated test case generation for the stress testing of multimedia systems. 2002. p. 1411-1435. 23.Garg, S., et al. A methodology for detection and estimation of software aging. 1998. 24.Huang, Y., et al. Software Rejuvenation: Analysis, Module and Applications. 1995. 25.Vaidyanathan, K. and K.S. Trivedi. A measurement-based model for estimation of resource exhaustion in operational software systems. 1999. 26.Chillarege, R., S. Biyani, and J. Rosenthal, Measurement of Failure Rate in Widely Distributed Software. 1995. p. 424–433. 27.Iyer, R.K. and D.J. Rossetti, Effect of System Workload on Operating System Reliability: A Study on IBM 3081. Software Engineering, IEEE Transactions on, 1985. SE-11(12): p. 1438-1448. 28.Lee, I., R.K. Iyer, and A. Mehta. Identifying software problems using symptoms. 1994. 29.Iyer, R.K., L.T. Young, and P.V.K. Iyer, Automatic recognition of intermittent failures: an experimental study of field data. Computers, IEEE Transactions on, 1990. 39(4): p. 525-537. 30.Tang, D. and R.K. Iyer, Dependability measurement and modeling of a multicomputer system. Computers, IEEE Transactions on, 1993. 42(1): p. 62-75. 31.Thakur, A. and R.K. Iyer, Analyze-NOW-an environment for collection and analysis of failures in a network of workstations. Reliability, IEEE Transactions on, 1996. 45(4): p. 561-570. 32.Common Vulnerabilities and Exposures. [cited; Available from: http://cve.mitre.org/. 33.Cowan, C., et al., StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. 34.TWCERT/CC. [cited; Available from: http://www.cert.org.tw/. 35.Jones, R. and R. Lins, Garbage collection: algorithms for automatic dynamic memory management. 1996: John Wiley & Sons, Inc. New York, NY, USA. 36.Stephen, M.B. and S.M. Kathryn, Ulterior reference counting: fast garbage collection without a long wait, in Proceedings of the 18th annual ACM SIGPLAN conference on Object-oriented programing, systems, languages, and applications. 2003, ACM Press: Anaheim, California, USA. 37.Erickson, C., Memory leak detection in embedded systems. 2002, Specialized Systems Consultants, Inc. Seattle, WA, USA. 38.Evans, D., et al., LCLint: a tool for using specifications to check code. 1994, ACM Press New York, NY, USA. p. 87-96. 39.Cowan, C., et al., PointGuardTM: Protecting Pointers From Buffer Overflow Vulnerabilities.
|