{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:28:27Z","timestamp":1725805707919},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452301"},{"type":"electronic","value":"9783662452318"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45231-8_20","type":"book-chapter","created":{"date-parts":[[2014,9,26]],"date-time":"2014-09-26T15:42:39Z","timestamp":1411746159000},"page":"277-291","source":"Crossref","is-referenced-by-count":5,"title":["A Technique for Risk-Based Test Procedure Identification, Prioritization and Selection"],"prefix":"10.1007","author":[{"given":"Fredrik","family":"Seehusen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","first-page":"9","volume":"11","author":"J. Bach","year":"1999","unstructured":"Bach, J.: Heuristic risk-based testing. Software Testing and Quality Engineering Magazine\u00a011, 9 (1999)","journal-title":"Software Testing and Quality Engineering Magazine"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Bai, X., Kenett, R.S.: Risk-based adaptive group testing of semantic web services. In: Proc. of the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC), pp. 485\u2013490. IEEE Computer Society (2009)","DOI":"10.1109\/COMPSAC.2009.180"},{"issue":"10","key":"20_CR3","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1016\/j.jss.2010.05.069","volume":"83","author":"G. Br\u00e6ndeland","year":"2010","unstructured":"Br\u00e6ndeland, G., Refsdal, A., St\u00f8len, K.: Modular analysis and modelling of risk scenarios with dependencies. Journal of Systems and Software\u00a083(10), 1995\u20132013 (2010)","journal-title":"Journal of Systems and Software"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Casado, R., Tuya, J., Younas, M.: Testing long-lived web services transactions using a risk-based approach. In: Proc. 10th International Conference on Quality Software (QSIC), pp. 337\u2013340. IEEE Computer Society (2010)","DOI":"10.1109\/QSIC.2010.46"},{"issue":"4","key":"20_CR5","first-page":"50","volume":"12","author":"E. Charniac","year":"1991","unstructured":"Charniac, E.: Bayesian networks without tears: making bayesian networks more accessible to the probabilistically unsophisticated. AI Magazine\u00a012(4), 50\u201363 (1991)","journal-title":"AI Magazine"},{"key":"20_CR6","unstructured":"Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proc. of the 2002 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 2002, p. 1. IBM Press (2002)"},{"key":"20_CR7","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-27213-4_11","volume-title":"Software Quality. Process Automation in Software Development","author":"M. Felderer","year":"2012","unstructured":"Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. In: Biffl, S., Winkler, D., Bergsmann, J. (eds.) SWQD 2012. LNBIP, vol.\u00a094, pp. 159\u2013180. Springer, Heidelberg (2012)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Gleirscher, M.: Hazard-based selection of test cases. In: Proc. of the 6th International Workshop on Automation of Software Test, pp. 64\u201370. ACM (2011)","DOI":"10.1145\/1982595.1982609"},{"key":"20_CR9","unstructured":"International Electrotechnical Commission. Event Tree Analysis in Dependability Management - Part 3: Application Guide - Section 9: Risk Analysis of Technological Systems. IEC 60300 (1990)"},{"key":"20_CR10","unstructured":"International Electrotechnical Commission. IEC 61025 Fault Tree Analysis, FTA (1990)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Kloos, J., Hussain, T., Eschbach, R.: Risk-based testing of safety-critical embedded systems driven by fault tree analysis. In: Proc. of IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 26\u201333. IEEE (2011)","DOI":"10.1109\/ICSTW.2011.90"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, N., Sosale, D., Konuganti, S.N., Rathi, A.: Enabling the adoption of aspects - testing aspects: A risk model, fault model and patterns. In: Proc. of the 8th ACM International Conference on Aspect-oriented Software Development, AOSD 2009, pp. 197\u2013206. ACM (2009)","DOI":"10.1145\/1509239.1509266"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model Driven Risk Analysis - The CORAS Approach. Springer (2011)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Murthy, K.K., Thakkar, K.R., Laxminarayan, S.: Leveraging risk based testing in enterprise systems security validation. In: Proc. of the First International Conference on Emerging Network Intelligence, pp. 111\u2013116. IEEE Computer Society (2009)","DOI":"10.1109\/EMERGING.2009.28"},{"issue":"1","key":"20_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/stvr.288","volume":"14","author":"F. Redmill","year":"2004","unstructured":"Redmill, F.: Exploring risk-based testing and its implications: Research articles. Softw. Test. Verif. Reliab.\u00a014(1), 3\u201315 (2004)","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"1","key":"20_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/stvr.310","volume":"15","author":"F. Redmill","year":"2005","unstructured":"Redmill, F.: Theory and practice of risk-based testing. Software Testing, Verification and Reliability\u00a015(1), 3\u201320 (2005)","journal-title":"Software Testing, Verification and Reliability"},{"issue":"3","key":"20_CR17","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0951-8320(96)00099-3","volume":"55","author":"F. Redmill","year":"1997","unstructured":"Redmill, F., Chudleigh, M.F., Catmur, J.R.: Principles underlying a guideline for applying HAZOP to programmable electronic systems. Reliability Engineering and System Safety\u00a055(3), 283\u2013293 (1997)","journal-title":"Reliability Engineering and System Safety"},{"key":"20_CR18","unstructured":"Rosenberg, L., Stapko, R., Gallo, A.: Risk-based object oriented testing. In: Proc. of the 24th Annual Software Engineering Workshop. NASA (1999)"},{"issue":"12","key":"20_CR19","first-page":"21","volume":"24","author":"B. Schneider","year":"1999","unstructured":"Schneider, B.: Attack trees: modeling security threats. Dr. Dobb\u2019s Journal of Software Tools\u00a024(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s Journal of Software Tools"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusm\u00e3o, C., Venancio, J.: Risk-based testing: A case study. In: Proc. of ITNG, pp. 1032\u20131037. IEEE Computer Society (2010)","DOI":"10.1109\/ITNG.2010.203"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusm\u00e3o, C., Venancio, J., Alves, K., Melo, R.: Measurement and control for risk-based test cases and activities. In: Proc. of Test Workshop (LATW 2009), pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/LATW.2009.4813802"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Stallbaum, H., Metzger, A., Pohl, K.: An automated technique for risk-based test case generation and prioritization. In: Proc. of the 3rd International Workshop on Automation of Software Test, pp. 67\u201370. ACM (2008)","DOI":"10.1145\/1370042.1370057"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Wong, W.E., Qi, Y., Cooper, K.: Source code-based software risk assessing. In: Proc. of the 2005 ACM Symposium on Applied Computing, SAC 2005, pp. 1485\u20131490. ACM (2005)","DOI":"10.1145\/1066677.1067014"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Zech, P., Felderer, M., Breu, R.: Towards a model based security testing approach of cloud computing environments. In: 2012 IEEE Sixth International Conference on Software Security and Reliability Companion (SERE-C), pp. 47\u201356. IEEE (2012)","DOI":"10.1109\/SERE-C.2012.11"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Zech, P., Felderer, M., Breu, R.: Towards risk - driven security testing of service centric systems. In: QSIC, pp. 140\u2013143. IEEE (2012)","DOI":"10.1109\/QSIC.2012.31"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45231-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T13:07:25Z","timestamp":1565874445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45231-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452301","9783662452318"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45231-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}