{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:33:32Z","timestamp":1772519612426,"version":"3.50.1"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319596464","type":"print"},{"value":"9783319596471","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59647-1_27","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T02:53:30Z","timestamp":1494644010000},"page":"373-390","source":"Crossref","is-referenced-by-count":5,"title":["A Comparative Study of Software Testing Techniques"],"prefix":"10.1007","author":[{"given":"Meriem","family":"Atifi","sequence":"first","affiliation":[]},{"given":"Abdelaziz","family":"Mamouni","sequence":"additional","affiliation":[]},{"given":"Abdelaziz","family":"Marzak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Pretschner, A.: Model-based-testing. In: ICSE, pp. 722\u2013732 (2005)","DOI":"10.1145\/1062455.1062636"},{"key":"27_CR2","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A Taxonomy of Model-Based Testing, a School of Computing and Mathematical Sciences (2006)"},{"key":"27_CR3","first-page":"33","volume":"65","author":"MM Alam","year":"2013","unstructured":"Alam, M.M.: Risk-based testing techniques: a perspective study. Int. J. Comput. Appl. 65, 33\u201341 (2013). (0975\u20138887)","journal-title":"Int. J. Comput. Appl."},{"key":"27_CR4","unstructured":"Utting, M., Legeard, B.: Practical Model-Based Testing: A Tools Approach. ACM, Inc. (2017)"},{"key":"27_CR5","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1007\/s10009-014-0330-5","volume":"16","author":"G Erdogan","year":"2014","unstructured":"Erdogan, G.: Approaches for the combined use of risk analysis and testing: a systematic literature review. Int. J. Softw. Tools Technol. Transfer 16, 627\u2013642 (2014). Springer-Verlag Berlin Heidelberg","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"27_CR6","unstructured":"Felderer, M.: A classification for model-based security testing. In: The Third International Conference on Advances in System Testing and Validation Lifecycle (2011)"},{"key":"27_CR7","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s10009-014-0332-3","volume":"16","author":"M Felderer","year":"2014","unstructured":"Felderer, M.: A taxonomy of risk-based testing. Int. J. Softw. Tools Technol. Transfer 16, 559\u2013568 (2014)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"27_CR8","unstructured":"Micskei, Z.: Model-Based Testing (MBT), Online Dictionary. http:\/\/mit.bme.hu\/~micskeiz\/pages\/modelbased_testing.html"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Palanivel, M., Selvadurai, K.: Risk-driven security testing using risk analysis with threat modeling approach, Palanivel and Selvadurai SpringerPlus (2014)","DOI":"10.1186\/2193-1801-3-754"},{"key":"27_CR10","unstructured":"Hartman, A.: AGEDIS: Model-Based Test Generation Tools, January 2009. http:\/\/www.agedis.de"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Dranidis, D.: JSXM: a tool for automated test generation. In: Proceeding SEFM 2012 Proceedings of the 10th International Conference on Software Engineering and Formal Methods (2012)","DOI":"10.1007\/978-3-642-33826-7_25"},{"key":"27_CR12","unstructured":"Aichernig, B.: MoMuT: UML model-based mutation testing for UML. In: 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST) (2015)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Pretschner, A.: One evaluation of model-based testing and its automation. In: ICSE 2005, 15\u201321 May 2005","DOI":"10.1145\/1062455.1062529"},{"key":"27_CR14","unstructured":"Kristoffer, L.: A Software Tool for Risk-based Testing. http:\/\/www.idi.ntnu.no\/grupper\/su\/fordypningsprosjekt2004\/Jorgensen2004.pdf"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Dalal, S.R., Jain, A., Karunanithi, N.: Model-based testing in practice. In: ICSE 1999, May 1999","DOI":"10.1145\/302405.302640"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Dias Neto, A.C., Travassos, G.H.: A survey on model-based testing approaches: a systematic review. In: WEASEL Tech 2007, November 2007","DOI":"10.1145\/1353673.1353681"},{"key":"27_CR17","unstructured":"Cristi, M.: Using {log} as a Test Case Generator for Z Specifications. GNCS project PICT 2011-1002"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Sarma, M., Murthy, P.V.R.: Model-based testing in industry \u2013 a case study with two MBT tools. ACM, 2\u20138 May 2010","DOI":"10.1145\/1808266.1808279"},{"key":"27_CR19","unstructured":"Dias Neto, A.C., Travassos, G.H.: Characterization of model-based software testing approaches, Technical report at PESC\/COPPE\/UFRJ, Brazil, Published August 2007"},{"key":"27_CR20","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/S0164-1212(00)00019-4","volume":"53","author":"S Amland","year":"2000","unstructured":"Amland, S.: Risk-based testing: risk analysis fundamentals and metrics for software testing including a financial application case study. J. Syst. Softw. 53, 287\u2013295 (2000)","journal-title":"J. Syst. Softw."},{"key":"27_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-27213-4_11","volume-title":"Software Quality. Process Automation in Software Development","author":"M Felderer","year":"2012","unstructured":"Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. In: Biffl, S., Winkler, D., Bergsmann, J. (eds.) SWQD 2012. LNBIP, vol. 94, pp. 159\u2013180. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-27213-4_11"},{"key":"27_CR22","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-35702-2_3","volume-title":"Software Quality. Increasing Value in Software and Systems Development","author":"M Felderer","year":"2013","unstructured":"Felderer, M., Ramler, R.: Experiences and challenges of introducing risk-based testing in an industrial project. In: Winkler, D., Biffl, S., Bergsmann, J. (eds.) SWQD 2013. LNBIP, vol. 133, pp. 10\u201329. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-35702-2_3"},{"key":"27_CR23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/stvr.288","volume":"14","author":"F Redmill","year":"2004","unstructured":"Redmill, F.: Exploring risk-based testing and its implications. Softw. Test. Verif. Reliab. 14, 3\u201315 (2004)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"27_CR24","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/stvr.310","volume":"15","author":"F Redmill","year":"2005","unstructured":"Redmill, F.: Theory and practice of risk-based testing. Softw. Test. Verif. Reliab. 15, 3\u201320 (2005)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"27_CR25","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1142\/S0218194011005220","volume":"21","author":"H Yoon","year":"2011","unstructured":"Yoon, H., Choi, B.: A test case prioritization based on degree of risk exposure and its empirical study. Int. J. Softw. Eng. Knowl. Eng. 21, 191\u2013209 (2011)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Gleirscher, M.: Hazard-based selection of test cases. In: Proceeding if the Sixth International Workshop on Automation of Software Test (AST 2011), pp. 64\u201370. ACM, New York (2011)","DOI":"10.1145\/1982595.1982609"},{"key":"27_CR27","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-35702-2_8","volume-title":"Software Quality. Increasing Value in Software and Systems Development","author":"M Gleirscher","year":"2013","unstructured":"Gleirscher, M.: Hazard analysis for technical systems. In: Winkler, D., Biffl, S., Bergsmann, J. (eds.) SWQD 2013. LNBIP, vol. 133, pp. 104\u2013124. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-35702-2_8"},{"key":"27_CR28","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1049\/iet-sen.2011.0081","volume":"7","author":"M Ray","year":"2013","unstructured":"Ray, M., Mohapatra, D.P.: Risk analysis: a guiding force in the improvement of testing. IET Softw. 7, 29\u201346 (2013)","journal-title":"IET Softw."},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Kloos, J., Hussain, T., Eschbach, R.: Risk-based testing of safetycritical embedded systems driven by fault tree analysis. In: Proceeding of the Fourth International Conference on Software Testing, Verification and Validation Workshops (ICSTW 2011), pp. 26\u201333. IEEE, New York (2011)","DOI":"10.1109\/ICSTW.2011.90"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Nazier, R., Bauer, T.: Automated risk-based testing by integrating safety analysis information into system behavior models. In: Proceeding of the 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW 2012), pp. 213\u2013218. IEEE, New York (2012)","DOI":"10.1109\/ISSREW.2012.22"},{"key":"27_CR31","unstructured":"Wendland, M.-F., Kranz, M., Schieferdecker, I.: A systematic approach to risk-based testing using risk-annotated requirements models. In: Proceeding of the Seventh International Conference on Software Engineering Advances (ICSEA 2012), pp. 636\u2013642. IARA (2012)"},{"key":"27_CR32","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/TDSC.2012.24","volume":"9","author":"D Xu","year":"2012","unstructured":"Xu, D., Tu, M., Sandford, M., Thomas, L., Woodraska, D., Xu, W.: Automated security test generation with formal threat models. IEEE Trans. Dependable Secure Comput. 9, 526\u2013540 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"27_CR33","unstructured":"Zimmermann, F., Eschbach, R., Kloos, J., Bauer, T.: Risk-based statistical testing: a refinement-based approach to the reliability analysis of safety-critical systems. In: Proceeding of the 12th European Workshop on Dependable Computing (EWDC 2009), pp. 1\u20138 (2009)"},{"key":"27_CR34","unstructured":"Chen, Y., Probert, R.L.: A risk-based regression test selection strategy. In: Proceeding of the 14th IEEE International Symposium on Software Reliability Engineering (ISSRE 2003), Fast Abstract, pp. 305\u2013306. Chillarege Press (2003)"},{"key":"27_CR35","unstructured":"Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proceeding of the 2002 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON 2002), pp. 1\u201314. IBM Press, New York (2002)"},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Entin, V., Winder, M., Zhang, B., Christmann, S.: Introducing model-based testing in an industrial scrum project. In: Proceeding of the Seventh International Workshop on Automation of Software Test (AST 2012), pp. 43\u201349. IEEE, New York (2012)","DOI":"10.1109\/IWAST.2012.6228989"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Stallbaum, H., Metzger, A., Pohl, K.: An automated technique for risk-based test case generation and prioritization. In: Proceeding of the Third International Workshop on Automation of Software Test (AST 2008), pp. 67\u201370. ACM, New York (2008)","DOI":"10.1145\/1370042.1370057"},{"key":"27_CR38","doi-asserted-by":"crossref","unstructured":"Hosseingholizadeh, A.: A source-based risk analysis approach for software test optimization. In: Proceeding of the Second International Conference on Computer Engineering and Technology (ICCET 2010), vol. 2, pp. 601\u2013604. IEEE, New York (2010)","DOI":"10.1109\/ICCET.2010.5485639"},{"key":"27_CR39","doi-asserted-by":"crossref","unstructured":"Wong, W.E., Qi, Y., Cooper, K.: Source code-based software risk assessing. In: Proceeding of the 2005 ACM Symposium on Applied Computing (SAC 2005), pp. 1485\u20131490. ACM, New York (2005)","DOI":"10.1145\/1066677.1067014"},{"key":"27_CR40","doi-asserted-by":"crossref","unstructured":"Kumar, N., Sosale, D., Konuganti, S.N., Rathi, A.: Enabling the adoption of aspects-testing aspects: A risk model, fault model and patterns. In: Proceeding of the Eighth ACM International Conference on Aspect-Oriented Software Development (AOSD 2009), pp. 197\u2013206. ACM, New York (2009)","DOI":"10.1145\/1509239.1509266"},{"key":"27_CR41","unstructured":"Rosenberg, L., Stapko, R., Gallo, A.: Risk-based object oriented testing. In: Proceeding of the 24th Annual Software EngineeringWorkshop, pp. 1\u20136. NASA, Software Engineering Laboratory (1999)"},{"key":"27_CR42","doi-asserted-by":"crossref","unstructured":"Bai, X., Kenett, R.S.: Risk-based adaptive group testing of semantic web services. In: Proceeding of the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 2009), vol. 2, pp. 485\u2013490. IEEE, New York (2009)","DOI":"10.1109\/COMPSAC.2009.180"},{"key":"27_CR43","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1142\/S0218194012500167","volume":"22","author":"X Bai","year":"2012","unstructured":"Bai, X., Kennett, R.S., Yu, W.: Risk assessment and adaptive group testing of semantic web services. Int. J. Softw. Eng. Knowl. Eng. 22, 595\u2013620 (2012)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"27_CR44","doi-asserted-by":"crossref","unstructured":"Casado, R., Tuya, J., Younas, M.: Testing long-lived web services transactions using a risk-based approach. In: Proceeding of the 10th International Conference on Quality Software (QSIC 2010), pp. 337\u2013340. IEEE, New York (2010)","DOI":"10.1109\/QSIC.2010.46"},{"key":"27_CR45","doi-asserted-by":"crossref","unstructured":"Casado, R., Tuya, J., Younas, M.: A framework to test advanced web services transactions. In: Proceeding of the 4th International Conference on Software Testing, Verification and Validation (ICST 2011), pp. 443\u2013446. IEEE, New York (2011)","DOI":"10.1109\/ICST.2011.44"},{"key":"27_CR46","doi-asserted-by":"crossref","unstructured":"Murthy, K.K., Thakkar, K.R., Laxminarayan, S.: Leveraging risk based testing in enterprise systems security validation. In: Proceeding of the First International Conference on Emerging Network Intelligence (EMERGING 2009), pp. 111\u2013116. IEEE, New York (2009)","DOI":"10.1109\/EMERGING.2009.28"},{"key":"27_CR47","doi-asserted-by":"crossref","unstructured":"Zech, P.: Risk-based security testing in cloud computing environments. In: Proceeding of the Fourth International Conference on Software Testing, Verification and Validation (ICST 2011), pp. 411\u2013 414. IEEE, New York (2011)","DOI":"10.1109\/ICST.2011.23"},{"key":"27_CR48","doi-asserted-by":"crossref","unstructured":"Zech, P., Felderer, M., Breu, R.: Towards risk-driven security testing of service centric systems. In: 2012 12th International Conference on Quality Software (QSIC). IEEE (2012)","DOI":"10.1109\/QSIC.2012.31"},{"key":"27_CR49","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1142\/S0218539307002532","volume":"14","author":"NF Schneidewind","year":"2007","unstructured":"Schneidewind, N.F.: Risk-driven software testing and reliability. Int. J. Reliab. Qual. Saf. Eng. 14, 99\u2013132 (2007)","journal-title":"Int. J. Reliab. Qual. Saf. Eng."},{"key":"27_CR50","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusm\u00e3o, C., Ven\u00e2ncio, J.: Risk-based testing: a case study. In: Proceeding of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), pp. 1032\u20131037. IEEE, New York (2010)","DOI":"10.1109\/ITNG.2010.203"},{"key":"27_CR51","unstructured":"Bach, J.: Heuristic Risk-Based Testing. Software Testing and Quality Engineering Magazine, November 1999"},{"key":"27_CR52","unstructured":"Paul, G.: Risk-Based E-Business Testing, pp. 3\u201329, 51\u201380 (2002). ISBN: 1580533140"},{"key":"27_CR53","doi-asserted-by":"crossref","unstructured":"Hartman, A.: The AGEDIS tools for model based testing. In: ISSTA 2004 Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis (2004)","DOI":"10.1145\/1007512.1007529"},{"key":"27_CR54","unstructured":"St\u00e5lhane, T.: Risk Analysis as a Prioritizing Mechanism in EuroSPI (2003)"},{"key":"27_CR55","unstructured":"http:\/\/promise.cin.ufpe.br\/rbttool\/"},{"key":"27_CR56","unstructured":"Tretmans, J., Brinksma, E.: C\u00f4te de Resyste \u2013 automated model based testing. In: Progress 2002 \u2013 3rd Workshop on Embedded Systems (2002)"},{"key":"27_CR57","doi-asserted-by":"crossref","unstructured":"Bouquet, F., Legeard, B., Peureux, F., Torreborre, E.: Mastering test generation from smart card software formal models. In: Proceedings of International Workshop on Construction and Analysis of Safe, Secure and Interoperable Smart devices (2004)","DOI":"10.1007\/978-3-540-30569-9_4"},{"key":"27_CR58","doi-asserted-by":"crossref","first-page":"1978","DOI":"10.1016\/j.jss.2013.02.061","volume":"86","author":"S Anand","year":"2013","unstructured":"Anand, S., Burke, E.K., Chen, T.Y., Clark, J., Cohen, M.B., Grieskamp, W., Harman, M., Harrold, M.J., McMinn, P.: An orchestrated survey of methodologies for automated software test case generation. J. Syst. Softw. 86, 1978\u20132001 (2013)","journal-title":"J. Syst. Softw."},{"key":"27_CR59","unstructured":"http:\/\/unina.stidue.net\/Ingegneria%20del%20Software%202\/Materiale\/Sommerville%20-%20Software%20Engineering%208e.pdf"},{"key":"27_CR60","unstructured":"https:\/\/msdn.microsoft.com\/en-us\/library\/jj159342.aspx"},{"key":"27_CR61","unstructured":"https:\/\/www.dice.com\/skills\/Risk-based+testing.html"},{"key":"27_CR62","unstructured":"Legeard, B., et al.: Model-based-Testing User Survey: Results (2014). http:\/\/model-based-testing.info\/wordpress\/wp-content\/uploads\/2014_MBT_User_Survey_Results.pdf"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59647-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T15:58:53Z","timestamp":1569340733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59647-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596464","9783319596471"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59647-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}