{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:28:10Z","timestamp":1725805690539},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452301"},{"type":"electronic","value":"9783662452318"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45231-8_19","type":"book-chapter","created":{"date-parts":[[2014,9,26]],"date-time":"2014-09-26T15:42:39Z","timestamp":1411746159000},"page":"274-276","source":"Crossref","is-referenced-by-count":9,"title":["Risk-Based Testing"],"prefix":"10.1007","author":[{"given":"Michael","family":"Felderer","sequence":"first","affiliation":[]},{"given":"Marc-Florian","family":"Wendland","sequence":"additional","affiliation":[]},{"given":"Ina","family":"Schieferdecker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-27213-4_11","volume-title":"Software Quality. Process Automation in Software Development","author":"M. Felderer","year":"2012","unstructured":"Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. In: Biffl, S., Winkler, D., Bergsmann, J. (eds.) SWQD 2012. LNBIP, vol.\u00a094, pp. 159\u2013180. Springer, Heidelberg (2012)"},{"key":"19_CR2","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-35702-2_3","volume-title":"Software Quality. Increasing Value in Software and Systems Development","author":"M. Felderer","year":"2013","unstructured":"Felderer, M., Ramler, R.: Experiences and challenges of introducing risk-based testing in an industrial project. In: Winkler, D., Biffl, S., Bergsmann, J. (eds.) SWQD 2013. LNBIP, vol.\u00a0133, pp. 10\u201329. Springer, Heidelberg (2013)"},{"key":"19_CR3","unstructured":"Gerrard, P., Thompson, N.: Risk-based e-business testing. Artech House Publishers (2002)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Schieferdecker, I., Grossmann, J., Schneider, M.: Model-based security testing. In: Proceedings 7th Workshop on Model-Based Testing (2012)","DOI":"10.4204\/EPTCS.80.1"},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/s11219-013-9226-y","volume":"22","author":"M. Felderer","year":"2014","unstructured":"Felderer, M., Ramler, R.: Integrating risk-based testing in industrial test processes. Software Quality Journal\u00a022(3), 543\u2013575 (2014)","journal-title":"Software Quality Journal"},{"key":"19_CR6","unstructured":"Wendland, M.F., Kranz, M., Schieferdecker, I.: A systematic approach to risk-based testing using risk-annotated requirements models. In: ICSEA 2012, The Seventh International Conference on Software Engineering Advances, pp. 636\u2013642 (2012)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Felderer, M., Schieferdecker, I.: A taxonomy of risk-based testing. STTT (2014), doi:10.1007\/s10009-014-0332-3","DOI":"10.1007\/s10009-014-0332-3"},{"key":"19_CR8","unstructured":"ISO: ISO\/IEC\/IEEE 29119 Software Testing (2013), \n                    \n                      http:\/\/softwaretestingstandard.org\/\n                    \n                    \n                   (accessed: August 12, 2014)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Neubauer, J., Windm\u00fcller, S., Steffen, B.: Risk-based testing via active continuous quality control. STTT (2014), doi:10.1007\/s10009-014-0321-6","DOI":"10.1007\/s10009-014-0321-6"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Carrozza, G., Pietrantuono, R., Russo, S.: Dynamic test planning: a study into an industrial context. STTT (2014), doi:10.1007\/s10009-014-0319-0","DOI":"10.1007\/s10009-014-0319-0"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Felderer, M., Ramler, R.: A multiple case study on risk-based testing in industry. STTT (2014), doi:10.1007\/s10009-014-0328-z","DOI":"10.1007\/s10009-014-0328-z"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Erdogan, G., Li, Y., Runde, R.K., Seehusen, F., St\u00f8len, K.: Approaches for the combined use of risk analysis and testing: A systematic literature review. STTT (2014), doi:10.1007\/s10009-014-0330-5","DOI":"10.1007\/s10009-014-0330-5"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-662-45231-8_20","volume-title":"ISoLA 2014, Part II","author":"F. Seehusen","year":"2014","unstructured":"Seehusen, F.: A technique for risk-based test procedure identification, prioritization and selection. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014, Part II. LNCS, vol.\u00a08803, pp. 277\u2013291. Springer, Heidelberg (2014)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., Stolen, K.: Model-driven Risk Analysis. Springer (2011)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/978-3-662-45231-8_21","volume-title":"ISoLA 2014, Part II","author":"M. Felderer","year":"2014","unstructured":"Felderer, M., Haisjackl, C., Pekar, V., Breu, R.: A risk assessment framework for software testing. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014, Part II. LNCS, vol.\u00a08803, pp. 292\u2013308. Springer, Heidelberg (2014)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/978-3-662-45231-8_22","volume-title":"ISoLA 2014, Part II","author":"I. Yahav","year":"2014","unstructured":"Yahav, I., Kenett, R.S., Bai, X.: Data driven testing of open source software. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014, Part II. LNCS, vol.\u00a08803, pp. 309\u2013321. Springer, Heidelberg (2014)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/978-3-662-45231-8_23","volume-title":"ISoLA 2014, Part II","author":"J. Gro\u00dfmann","year":"2014","unstructured":"Gro\u00dfmann, J., Schneider, M., Viehmann, J., Wendland, M.-F.: Combining risk analysis and security testing. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014, Part II. LNCS, vol.\u00a08803, pp. 322\u2013336. Springer, Heidelberg (2014)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/978-3-662-45231-8_24","volume-title":"ISoLA 2014, Part II","author":"J. Botella","year":"2014","unstructured":"Botella, J., Legeard, B., Peureux, F., Vernotte, A.: Risk-based vulnerability testing using security test patterns. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014, Part II. LNCS, vol.\u00a08803, pp. 337\u2013352. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45231-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T06:56:49Z","timestamp":1548917809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45231-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452301","9783662452318"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45231-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}