Abstract is missing.
- Using Model Learning for the Generation of Mock ComponentsSébastien Salva, Elliott Blot. 3-19 [doi]
- Interrogating Virtual Agents: In Quest of Security VulnerabilitiesJosip Bozic, Franz Wotawa. 20-34 [doi]
- Giving a Model-Based Testing Language a Formal Semantics via Partial MAX-SATBernhard K. Aichernig, Christian Burghard. 35-51 [doi]
- Learning Abstracted Non-deterministic Finite State MachinesAndrea Pferscher, Bernhard K. Aichernig. 52-69 [doi]
- APPregator: A Large-Scale Platform for Mobile Security AnalysisLuca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo. 73-88 [doi]
- Vulsploit: A Module for Semi-automatic Exploitation of VulnerabilitiesArcangelo Castiglione, Francesco Palmieri, Mariangela Petraglia, Raffaele Pizzolante. 89-103 [doi]
- About the Robustness and Looseness of Yara RulesGerardo Canfora, Mimmo Carapella, Andrea Del Vecchio, Laura Nardi, Antonio Pirozzi, Corrado Aaron Visaggio. 104-120 [doi]
- Measurement-Based Analysis of a DoS Defense Module for an Open Source Web ServerMarta Catillo, Antonio Pecchia, Umberto Villano. 121-134 [doi]
- Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless NetworksAlexandra-Elena Mocanu (Mihaita), Bogdan-Costel Mocanu, Christian Esposito, Florin Pop. 135-149 [doi]
- Enabling Next-Generation Cyber Ranges with Mobile Security ComponentsEnrico Russo, Luca Verderame, Alessio Merlo. 150-165 [doi]
- A Technique for Parallel GUI Testing of Android ApplicationsPorfirio Tramontana, Nicola Amatucci, Anna Rita Fasolino. 169-185 [doi]
- Trigger Alarm: A Smart NFC Sniffer for High-Precision MeasurementsMartin Erb, Christian Steger, Martin Troyer, Josef Preishuber-Pflügl. 186-200 [doi]
- Methods for Live Testing of Cloud ServicesOussama Jebbar, Ferhat Khendek, Maria Toeroe. 201-216 [doi]
- Automated Transition Coverage in Behavioural Conformance TestingLina Marsso, Radu Mateescu 0001, Wendelin Serwe. 219-235 [doi]
- An Executable Mechanised Formalisation of an Adaptive State Counting AlgorithmRobert Sachtleben. 236-254 [doi]
- Automatic Fairness Testing of Machine Learning ModelsArnab Sharma, Heike Wehrheim. 255-271 [doi]
- Inspecting Code Churns to Prioritize Test CasesFrancesco Altiero, Anna Corazza, Sergio Di Martino, Adriano Peron, Luigi Libero Lucio Starace. 272-285 [doi]
- Using an SMT Solver for Checking the Completeness of FSM-Based TestsEvgenii Vinarskii, Andrey Laputenko, Nina Yevtushenko. 289-295 [doi]
- Hacking Goals: A Goal-Centric Attack Classification FrameworkFrancesco Caturano, Gaetano Perrone, Simon Pietro Romano. 296-301 [doi]
- A Comparative Study on Combinatorial and Random Testing for Highly Configurable SystemsHao Jin, Takashi Kitamura, Eun-Hye Choi, Tatsuhiro Tsuchiya. 302-309 [doi]
- Architecture Based on Keyword Driven Testing with Domain Specific Language for a Testing SystemRicardo B. Pereira, Miguel A. Brito, Ricardo J. Machado. 310-316 [doi]