{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:19:42Z","timestamp":1751602782042},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319578576"},{"type":"electronic","value":"9783319578583"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57858-3_9","type":"book-chapter","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T06:59:24Z","timestamp":1493017164000},"page":"115-128","source":"Crossref","is-referenced-by-count":2,"title":["A Lightweight Approach for Estimating Probability in Risk-Based Software Testing"],"prefix":"10.1007","author":[{"given":"Rudolf","family":"Ramler","sequence":"first","affiliation":[]},{"given":"Michael","family":"Felderer","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Leitner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,25]]},"reference":[{"issue":"5","key":"9_CR1","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s10009-014-0332-3","volume":"16","author":"M Felderer","year":"2014","unstructured":"Felderer, M., Schieferdecker, I.: A taxonomy of risk-based testing. Int. J. Softw. Tools Technol. Transf. 16(5), 559\u2013568 (2014)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"9_CR2","unstructured":"ISO\/IEC\/IEEE 29119-2:2013 Software and systems engineering \u2013 Software testing \u2013 Part 2: Test processes. International Organization for Standardization, Geneva (2013)"},{"issue":"5","key":"9_CR3","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/s10009-014-0328-z","volume":"16","author":"M Felderer","year":"2014","unstructured":"Felderer, M., Ramler, R.: A multiple case study on risk-based testing in industry. Int. J. Softw. Tools Technol. Transf. 16(5), 609\u2013625 (2014)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"3","key":"9_CR4","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s11219-015-9289-z","volume":"24","author":"M Felderer","year":"2016","unstructured":"Felderer, M., Ramler, R.: Risk orientation in software testing processes of small and medium enterprises: an exploratory and comparative study. Software Qual. J. 24(3), 519\u2013548 (2016)","journal-title":"Software Qual. J."},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Ramler, R., Felderer, M.: Experiences from an initial study on risk probability estimation based on expert opinion. In: Joint Conference of the 23rd International Workshop on Software Measurement and the Eighth International Conference on Software Process and Product Measurement (IWSM-MENSURA), pp. 93\u201397. IEEE (2013)","DOI":"10.1109\/IWSM-Mensura.2013.23"},{"key":"9_CR6","volume-title":"Extreme Programming Explained: Embrace Change","author":"K Beck","year":"2000","unstructured":"Beck, K.: Extreme Programming Explained: Embrace Change. Addison-Wesley, Boston (2000)"},{"key":"9_CR7","volume-title":"Software Testing Practice: Test Management: A Study Guide for the Certified Tester Exam ISTQB Advanced Level","author":"A Spillner","year":"2007","unstructured":"Spillner, A., Rossner, T., Winter, M., Linz, T.: Software Testing Practice: Test Management: A Study Guide for the Certified Tester Exam ISTQB Advanced Level. Rocky Nook, Santa Barbara (2007)"},{"key":"9_CR8","series-title":"Guide to the ISTQB Advanced Certification as an Advanced Test Manager","volume-title":"Advanced Software Testing","author":"R Black","year":"2009","unstructured":"Black, R.: Advanced Software Testing. Guide to the ISTQB Advanced Certification as an Advanced Test Manager, vol. 2. Rocky Nook, Santa Barbara (2009)"},{"key":"9_CR9","unstructured":"Bach, J.: James Bach on risk-based testing: how to conduct heuristic risk analysis. Softw. Test. Qual. Eng. (STQE) Mag., 23\u201328, November\/December 1999"},{"issue":"3","key":"9_CR10","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/S0164-1212(00)00019-4","volume":"53","author":"S Amland","year":"2000","unstructured":"Amland, S.: Risk-based testing: risk analysis fundamentals and metrics for software testing including a financial application case study. J. Syst. Softw. 53(3), 287\u2013295 (2000). Elsevier","journal-title":"J. Syst. Softw."},{"key":"9_CR11","volume-title":"The PRISMA Approach","author":"E Veenendaal van","year":"2012","unstructured":"van Veenendaal, E.: The PRISMA Approach. Uitgeverij Tutein Nolthenius, The Netherlands (2012)"},{"key":"9_CR12","unstructured":"CERT: Risk Management Framework (RMF). United States Computer Emergency Readiness Team, US-CERT, July 2013"},{"key":"9_CR13","unstructured":"OWASP: Testing Guide Ver. 4, Open Web Application Security Project, September 2014"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Kontio, J.: Risk management in software development: a technology overview and the Riskit method. In: 21st International Conference on Software Engineering. ACM (1999)","DOI":"10.1145\/302405.302954"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-662-45231-8_21","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications","author":"M Felderer","year":"2014","unstructured":"Felderer, M., Haisjackl, C., Pekar, V., Breu, R.: A risk assessment framework for software testing. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014. LNCS, vol. 8803, pp. 292\u2013308. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-45231-8_21"},{"issue":"8","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1111\/risa.12001","volume":"33","author":"A Herrmann","year":"2013","unstructured":"Herrmann, A.: The quantitative estimation of IT-related risk probabilities. Risk Anal. 33(8), 1510\u20131531 (2013)","journal-title":"Risk Anal."},{"key":"9_CR17","volume-title":"Risk Analysis: A Quantitative Guide","author":"D Vose","year":"2008","unstructured":"Vose, D.: Risk Analysis: A Quantitative Guide. Wiley, Hoboken (2008)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-319-26844-6_26","volume-title":"Product-Focused Software Process Improvement","author":"R Ramler","year":"2015","unstructured":"Ramler, R., Felderer, M.: A process for risk-based test strategy development and its industrial evaluation. In: Abrahamsson, P., Corral, L., Oivo, M., Russo, B. (eds.) PROFES 2015. LNCS, vol. 9459, pp. 355\u2013371. Springer, Cham (2015). doi:\n10.1007\/978-3-319-26844-6_26"},{"issue":"3","key":"9_CR19","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s11219-013-9226-y","volume":"22","author":"M Felderer","year":"2014","unstructured":"Felderer, M., Ramler, R.: Integrating risk-based testing in industrial test processes. Software Qual. J. 22(3), 543\u2013575 (2014)","journal-title":"Software Qual. J."},{"key":"9_CR20","unstructured":"ISTQB: Standard glossary of terms used in software testing. Version 2.1 (2010)"},{"issue":"3","key":"9_CR21","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MS.2014.56","volume":"32","author":"M Felderer","year":"2015","unstructured":"Felderer, M., Beer, A.: Using defect taxonomies for testing requirements. IEEE Softw. 32(3), 94\u2013101 (2015)","journal-title":"IEEE Softw."},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Gitzel, R., Krug, S., Brhel, M.: Towards a software failure cost impact model for the customer: an analysis of an open source product. In: 6th International Conference on Predictive Models in Software Engineering (PROMISE). ACM (2010)","DOI":"10.1145\/1868328.1868354"},{"key":"9_CR23","volume-title":"Planning Extreme Programming","author":"K Beck","year":"2001","unstructured":"Beck, K., Fowler, M.: Planning Extreme Programming. Addison-Wesley Professional, Boston (2001)"},{"key":"9_CR24","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-27213-4_11","volume-title":"Software Quality. Process Automation in Software Development","author":"M Felderer","year":"2012","unstructured":"Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. In: Biffl, S., Winkler, D., Bergsmann, J. (eds.) SWQD 2012. LNBIP, vol. 94, pp. 159\u2013180. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-27213-4_11"},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Jureczko, M., Madeyski, L.: Towards identifying software project clusters with regard to defect prediction. In: 6th International Conference on Predictive Models in Software Engineering (PROMISE). ACM (2010)","DOI":"10.1145\/1868328.1868342"},{"key":"9_CR26","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"IH Witten","year":"2005","unstructured":"Witten, I.H., Eibe, F.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, San Francisco (2005)"},{"key":"9_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034","volume-title":"Case Study Research in Software Engineering: Guidelines and Examples","author":"P Runeson","year":"2012","unstructured":"Runeson, P., H\u00f6st, M., Rainer, A., Regnell, B.: Case Study Research in Software Engineering: Guidelines and Examples. Wiley, Hoboken (2012)"},{"key":"9_CR28","doi-asserted-by":"publisher","unstructured":"Ramler, R., Felderer, M.: Requirements for integrating defect prediction and risk-based testing. In: 42nd Euromicro Conference on Software Engineering and Advanced Applications. IEEE (2016)","DOI":"10.1109\/SEAA.2016.62"}],"container-title":["Lecture Notes in Computer Science","Risk Assessment and Risk-Driven Quality Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57858-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T07:03:12Z","timestamp":1493017392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57858-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319578576","9783319578583"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57858-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}