Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    REVIEW

    Fuzzing: Progress, Challenges, and Perspectives

    Zhenhua Yu1, Zhengqi Liu1, Xuya Cong1,*, Xiaobo Li2, Li Yin3

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1-29, 2024, DOI:10.32604/cmc.2023.042361

    Abstract As one of the most effective techniques for finding software vulnerabilities, fuzzing has become a hot topic in software security. It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system. In recent years, considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing, so there are more and more methods and forms, which make it difficult to have a comprehensive understanding of the technique. This paper conducts a thorough survey of fuzzing, focusing on its general process, classification, common application scenarios, and some state-of-the-art techniques that have been… More >

  • Open Access

    ARTICLE

    Measuring Reliability of A Web Portal Based on Testing Profile

    Malik Muhammad Ali Shahid1, Shahida Sulaiman2, Mohammed Al-Sarem3,4, Aqeel Ur Rahman1, Salman Iqbal1, Rab Nawaz Bashir1, Arfat Ahmad Khan5,6, Momen M. Alrawi7, Rashiq R. Marie8, Settawit Poochaya5,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6641-6663, 2023, DOI:10.32604/cmc.2023.031459

    Abstract

    Conventionally, the reliability of a web portal is validated with generalized conventional methods, but they fail to provide the desired results. Therefore, we need to include other quality factors that affect reliability such as usability for improving the reliability in addition to the conventional reliability testing. Actually, the primary objectives of web portals are to provide interactive integration of multiple functions confirming diverse requirements in an efficient way. In this paper, we employ testing profiles to measure the reliability through software operational profile, input space profile and usability profile along with qualitative measures of reliability and usability. Moreover, the case… More >

  • Open Access

    ARTICLE

    A Parallel Hybrid Testing Technique for Tri-Programming Model-Based Software Systems

    Huda Basloom1,*, Mohamed Dahab1, Abdullah Saad AL-Ghamdi2, Fathy Eassa1, Ahmed Mohammed Alghamdi3, Seif Haridi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4501-4530, 2023, DOI:10.32604/cmc.2023.033928

    Abstract Recently, researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems (HPCs) to achieve exascale by applying parallelism at multiple levels. Combining different programming paradigms, such as Message Passing Interface (MPI), Open Multiple Processing (OpenMP), and Open Accelerators (OpenACC), can increase computation speed and improve performance. During the integration of multiple models, the probability of runtime errors increases, making their detection difficult, especially in the absence of testing techniques that can detect these errors. Numerous studies have been conducted to identify these errors, but no technique exists for detecting errors… More >

  • Open Access

    ARTICLE

    Modeling Metaheuristic Optimization with Deep Learning Software Bug Prediction Model

    M. Sangeetha1,*, S. Malathi2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1587-1601, 2022, DOI:10.32604/iasc.2022.025192

    Abstract Software testing is an effective means of verifying software stability and trustworthiness. It is essential in the software development process and needs a huge quantity of resources such as labor, money, and time. Automated software testing can be used to save manual work, shorten testing times, and improve testing performance. Recently, Software Bug Prediction (SBP) models have been developed to improve the software quality assurance (SQA) process through the prediction of bug parts. Advanced deep learning (DL) models can be used to classify faults in software parts. Because hyperparameters have a significant impact on the performance of any DL model,… More >

  • Open Access

    ARTICLE

    Managing Software Testing Technical Debt Using Evolutionary Algorithms

    Muhammad Abid Jamil*, Mohamed K. Nour

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 735-747, 2022, DOI:10.32604/cmc.2022.028386

    Abstract Technical debt (TD) happens when project teams carry out technical decisions in favor of a short-term goal(s) in their projects, whether deliberately or unknowingly. TD must be properly managed to guarantee that its negative implications do not outweigh its advantages. A lot of research has been conducted to show that TD has evolved into a common problem with considerable financial burden. Test technical debt is the technical debt aspect of testing (or test debt). Test debt is a relatively new concept that has piqued the curiosity of the software industry in recent years. In this article, we assume that the… More >

  • Open Access

    ARTICLE

    Whale Optimization Algorithm Strategies for Higher Interaction Strength T-Way Testing

    Ali Abdullah Hassan1,*, Salwani Abdullah1, Kamal Z. Zamli2, Rozilawati Razali1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2057-2077, 2022, DOI:10.32604/cmc.2022.026310

    Abstract Much of our daily tasks have been computerized by machines and sensors communicating with each other in real-time. There is a reasonable risk that something could go wrong because there are a lot of sensors producing a lot of data. Combinatorial testing (CT) can be used in this case to reduce risks and ensure conformance to specifications. Numerous existing meta-heuristic-based solutions aim to assist the test suite generation for combinatorial testing, also known as t-way testing (where t indicates the interaction strength), viewed as an optimization problem. Much previous research, while helpful, only investigated a small number of interaction strengths… More >

  • Open Access

    ARTICLE

    Modified Harris Hawks Optimization Based Test Case Prioritization for Software Testing

    Manar Ahmed Hamza1,*, Abdelzahir Abdelmaboud2, Souad Larabi-Marie-Sainte3, Haya Mesfer Alshahrani4, Mesfer Al Duhayyim5, Hamza Awad Ibrahim6, Mohammed Rizwanullah1, Ishfaq Yaseen1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1951-1965, 2022, DOI:10.32604/cmc.2022.024692

    Abstract Generally, software testing is considered as a proficient technique to achieve improvement in quality and reliability of the software. But, the quality of test cases has a considerable influence on fault revealing capability of software testing activity. Test Case Prioritization (TCP) remains a challenging issue since prioritizing test cases is unsatisfactory in terms of Average Percentage of Faults Detected (APFD) and time spent upon execution results. TCP is mainly intended to design a collection of test cases that can accomplish early optimization using preferred characteristics. The studies conducted earlier focused on prioritizing the available test cases in accelerating fault detection… More >

  • Open Access

    ARTICLE

    Ontology Driven Testing Strategies for IoT Applications

    Muhammad Raza Naqvi1, Muhammad Waseem Iqbal2, Muhammad Usman Ashraf3, Shafiq Ahmad4, Ahmed T. Soliman4, Shahzada Khurram5, Muhammad Shafiq6,*, Jin-Ghoo Choi6

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5855-5869, 2022, DOI:10.32604/cmc.2022.019188

    Abstract Internet-of-Things (IoT) has attained a major share in embedded software development. The new era of specialized intelligent systems requires adaptation of customized software engineering approaches. Currently, software engineering has merged the development phases with the technologies provided by industrial automation. The improvements are still required in testing phase for the software developed to IoT solutions. This research aims to assist in developing the testing strategies for IoT applications, therein ontology has been adopted as a knowledge representation technique to different software engineering processes. The proposed ontological model renders 101 methodology by using Protégé. After completion, the ontology was evaluated in… More >

  • Open Access

    ARTICLE

    Multi-Objective Adapted Binary Bat for Test Suite Reduction

    Nagwa Reda1, Abeer Hamdy2,*, Essam A. Rashed1,3

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 781-797, 2022, DOI:10.32604/iasc.2022.019669

    Abstract Regression testing is an essential quality test technique during the maintenance phase of the software. It is executed to ensure the validity of the software after any modification. As software evolves, the test suite expands and may become too large to be executed entirely within a limited testing budget and/or time. So, to reduce the cost of regression testing, it is mandatory to reduce the size of the test suite by discarding the redundant test cases and selecting the most representative ones that do not compromise the effectiveness of the test suite in terms of some predefined criteria such as… More >

  • Open Access

    ARTICLE

    Analysis of Security Testing Techniques

    Omer Bin Tauqeer1, Sadeeq Jan1,*, Alaa Omar Khadidos2, Adil Omar Khadidos3, Fazal Qudus Khan3, Sana Khattak1

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 291-306, 2021, DOI:10.32604/iasc.2021.017260

    Abstract In the past decades, a significant increase has been observed in cyber-attacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in the field of security testing… More >

Displaying 1-10 on page 1 of 15. Per Page