{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:10:44Z","timestamp":1767183044359,"version":"3.40.4"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T00:00:00Z","timestamp":1401408000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Softw Tools Technol Transfer"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s10009-014-0321-6","type":"journal-article","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T20:53:44Z","timestamp":1401396824000},"page":"569-591","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Risk-based testing via active continuous quality control"],"prefix":"10.1007","volume":"16","author":[{"given":"Johannes","family":"Neubauer","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Windm\u00fcller","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Steffen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,30]]},"reference":[{"key":"321_CR1","doi-asserted-by":"crossref","unstructured":"Aarts, F., Jonsson, F., Uijen, J.: Generating models of infinite-state communication protocols using regular inference with abstraction. In: ICTSS \u201910, Volume 6435 of LNCS, pp. 188\u2013204. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-16573-3_14"},{"key":"321_CR2","doi-asserted-by":"crossref","unstructured":"Aarts, F., Schmaltz, J., Vaandrager, F.: Inference and abstraction of the biometric passport. In: ISoLA 2010, Volume 6415 of LNCS, pp. 673\u2013686. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-16558-0_54"},{"issue":"2","key":"321_CR3","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75(2), 87\u2013106 (1987)","journal-title":"Inf. Comput."},{"key":"321_CR4","first-page":"99","volume":"11","author":"J Bach","year":"1999","unstructured":"Bach, J.: Heuristic risk-based testing. Softw. Test. Quality Eng. Mag. 11, 99 (1999)","journal-title":"Softw. Test. Quality Eng. Mag."},{"key":"321_CR5","volume-title":"Eternal Systems, Volume 255 of CCSE","author":"O Bauer","year":"2012","unstructured":"Bauer, O., Neubauer, J., Steffen, B., Howar, F.: Reusing system states by active learning algorithms. In: Moschitti, A., Scandariato, R. (eds.) Eternal Systems, Volume 255 of CCSE. Springer, Berlin (2012)"},{"key":"321_CR6","doi-asserted-by":"crossref","unstructured":"Berg, T., Grinchtein, O., Jonsson, B., Leucker, M., Raffelt, H., Steffen, B.: On the correspondence between conformance testing and regular inference. In: FASE \u201905, Volume 3442 of LNCS, pp. 175\u2013189. Springer, Berlin (2005)","DOI":"10.1007\/978-3-540-31984-9_14"},{"key":"321_CR7","doi-asserted-by":"crossref","unstructured":"Beydeda, S., Gruhn, V.: Integrating white- and black-box techniques for class-level regression testing. In: COMPSAC \u201901, Washington, DC, USA, pp. 357\u2013362. IEEE Computer Society (2001)","DOI":"10.1109\/CMPSAC.2001.960639"},{"key":"321_CR8","doi-asserted-by":"crossref","unstructured":"Bossert, V., Hiet, G., Henin, G.: Modelling to simulate botnet command and control protocols for the evaluation of network intrusion detection systems. In: SAR-SSI \u201911, pp. 1\u20138. IEEE Computer Society (2011)","DOI":"10.1109\/SAR-SSI.2011.5931397"},{"key":"321_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Y., Probert, R.L., Ural, H.: Model-based regression test suite generation using dependence analysis. In: A-MOST \u201907, New York, NY, USA, pp. 54\u201362. ACM (2007)","DOI":"10.1145\/1291535.1291541"},{"issue":"3","key":"321_CR10","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/TSE.1978.231496","volume":"4","author":"TS Chow","year":"1978","unstructured":"Chow, T.S.: Testing software design modeled by finite-state machines. IEEE Trans. Softw. Eng. 4(3), 178\u2013187 (1978)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"321_CR11","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-3-642-27213-4_11","volume-title":"Software Quality, Process Automation in Software Development, Volume 94 of Lecture Notes in Business Information Processing","author":"M Felderer","year":"2012","unstructured":"Felderer, M., Haisjackl, M., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. In: Biffl, S., Winkler, D., Bergsmann, J. (eds.) Software Quality, Process Automation in Software Development, Volume 94 of Lecture Notes in Business Information Processing, pp. 159\u2013180. Springer, Berlin (2012)"},{"key":"321_CR12","doi-asserted-by":"crossref","unstructured":"Felderer, M., Ramler, R.: A multiple case study on risk-based testing in industry. sttt-RBT, Under, Review (2014)","DOI":"10.1007\/s10009-014-0328-z"},{"key":"321_CR13","unstructured":"Fowler, M.: Inversion of control containers and the dependency injection pattern (2004) . http:\/\/www.martinfowler.com\/articles\/injection.html"},{"key":"321_CR14","unstructured":"Gerrard, P., Thompson, N.: Risk based e-business resting. Artech House (2002)"},{"key":"321_CR15","doi-asserted-by":"crossref","DOI":"10.1002\/9781118459898","volume-title":"Formal Methods for Industrial Critical Systems: A Survey of Applications","author":"S Gnesi","year":"2012","unstructured":"Gnesi, S., Margaria, T.: Formal Methods for Industrial Critical Systems: A Survey of Applications. Wiley, :London (2012)"},{"issue":"3","key":"321_CR16","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/S1389-1286(03)00249-4","volume":"42","author":"J Grabowski","year":"2003","unstructured":"Grabowski, J., Hogrefe, D., R\u00e9thy, G., Schieferdecker, I., Wiles, A., Willcock, C.: An introduction to the testing and test control notation (ttcn-3). Comput. Netw. 42(3), 375\u2013403 (2003)","journal-title":"Comput. Netw."},{"key":"321_CR17","first-page":"161","volume-title":"Testing of Communicating Systems, Volume 48 of IFIP Advances in Information and Communication Technology","author":"J Grabowski","year":"2000","unstructured":"Grabowski, J., Wiles, A., Willcock, C., Hogrefe, D.: On the design of the new testing language ttcn-3. In: Ural, H., Probert, R., Bochmann, G. (eds.) Testing of Communicating Systems, Volume 48 of IFIP Advances in Information and Communication Technology, pp. 161\u2013176. Springer, New York (2000)"},{"key":"321_CR18","doi-asserted-by":"crossref","unstructured":"Grossmann, J.: Testing hybrid systems with ttcn-3 embedded. sttt-RBT. Under Review (2014)","DOI":"10.1007\/s10009-013-0283-0"},{"key":"321_CR19","doi-asserted-by":"crossref","unstructured":"Hagerer, A. Hungar, H., Niese, O., Steffen, B.: Model generation by moderated regular extrapolation. In FASE \u201902, pp. 80\u201395, London, UK. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45923-5_6"},{"key":"321_CR20","first-page":"251","volume-title":"Verification, Model Checking, and Abstract Interpretation, Volume 7148 of Lecture Notes in Computer Science","author":"F Howar","year":"2012","unstructured":"Howar, F., Steffen, B., Jonsson, B., Cassel, S.: Inferring canonical register automata. In: Kuncak, V., Rybalchenko, A. (eds.) Verification, Model Checking, and Abstract Interpretation, Volume 7148 of Lecture Notes in Computer Science, pp. 251\u2013266. Springer, Berlin (2012)"},{"key":"321_CR21","doi-asserted-by":"crossref","unstructured":"Howar, F., Steffen, B., Merten, M.: Automata learning with automated alphabet abstraction refinement. In: Verification, Model Checking, and Abstract Interpretation, Volume 6538 of LNCS, pp. 263\u2013277. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-18275-4_19"},{"key":"321_CR22","doi-asserted-by":"crossref","unstructured":"Hungar, H., Niese, O., Steffen, B.: Domain-specific optimization in automata learning. In: Computer Aided Verification, Volume 2725 of LNCS, pp. 315\u2013327. Springer, Berlin (2003)","DOI":"10.1007\/978-3-540-45069-6_31"},{"issue":"4","key":"321_CR23","first-page":"361","volume":"4","author":"S J\u00f6rges","year":"2008","unstructured":"J\u00f6rges, S., Margaria, T., Steffen, B.: Genesys: service-oriented construction of property conform code generators. ISSE 4(4), 361\u2013384 (2008)","journal-title":"ISSE"},{"key":"321_CR24","doi-asserted-by":"crossref","unstructured":"J\u00e9ron, T.: Symbolic model-based test selection. Electron. Notes Theor. Comput. Sci. 240(0):167\u2013184 (2009). Proceedings of the Eleventh Brazilian Symposium on Formal Methods (SBMF 2008)","DOI":"10.1016\/j.entcs.2009.05.051"},{"key":"321_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-36127-2","volume-title":"Construction and Evolution of Code Generators: A Model-Driven and Service-Oriented Approach","author":"S J\u00f6rges","year":"2013","unstructured":"J\u00f6rges, S.: Construction and Evolution of Code Generators: A Model-Driven and Service-Oriented Approach. Springer, Berlin (2013)"},{"key":"321_CR26","unstructured":"Karusseit, M., Margaria, T.: Feature-based modelling of a complex, online-reconfigurable decision support service. In WWV \u201905, March 2005. ENTCS 1132"},{"issue":"2","key":"321_CR27","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/271775.271803","volume":"23","author":"B Korel","year":"1998","unstructured":"Korel, B., Al-Yami, A.M.: Automated regression test generation. SIGSOFT Softw. Eng. Notes 23(2), 143\u2013152 (1998)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"321_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis","author":"MS Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B.: Model-Driven Risk Analysis. Springer, Berlin (2011)"},{"key":"321_CR29","first-page":"113","volume-title":"Testing of Software and Communication Systems, Volume 5826 of Lecture Notes in Computer Science","author":"H Marchand","year":"2009","unstructured":"Marchand, H., Dubreil, J., J\u00e9ron, T.: Automatic testing of access control for security properties. In: N\u00fa\u00f1ez, M., Baker, P., Merayo, M. (eds.) Testing of Software and Communication Systems, Volume 5826 of Lecture Notes in Computer Science, pp. 113\u2013128. Springer, Berlin (2009)"},{"key":"321_CR30","doi-asserted-by":"crossref","unstructured":"Margaria, T., Niese, O., Raffelt, H., Steffen. B.: Efficient test-based model generation for legacy reactive systems. In: HLDVT \u201904, Washington, DC, USA, pp. 95\u2013100. IEEE Computer Society (2004)","DOI":"10.1109\/HLDVT.2004.1431246"},{"key":"321_CR31","doi-asserted-by":"crossref","unstructured":"Margaria, T., Steffen, B.: Lightweight coarse-grained coordination: a scalable system-level approach. STTT 5(2\u20133), 107\u2013123 (2004)","DOI":"10.1007\/s10009-003-0119-4"},{"key":"321_CR32","doi-asserted-by":"crossref","unstructured":"Margaria, T., Steffen, B.: Agile IT: thinking in user-centric models. In: ISoLA 2009, Volume 17 of Communications in Computer and Information Science, pp. 490\u2013502. Springer, Berlin (2009)","DOI":"10.1007\/978-3-540-88479-8_35"},{"key":"321_CR33","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-1-4471-2297-5_10","volume-title":"Conquering Complexity","author":"T Margaria","year":"2012","unstructured":"Margaria, T., Steffen, B.: Service-orientation: conquering complexity with XMDD. In: Hinchey, M., Coyle, L. (eds.) Conquering Complexity, pp. 217\u2013236. Springer, London (2012)"},{"key":"321_CR34","doi-asserted-by":"crossref","unstructured":"Merten, M., Steffen, B., Howar, F., Margaria T.: Next generation learnlib. In: TACAS 2011, Volume 6605 of LNCS, pp. 220\u2013223. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-19835-9_18"},{"key":"321_CR35","doi-asserted-by":"crossref","unstructured":"M\u00fcller-Olm, M., Schmidt, D., Steffen, B.: Model-checking: a tutorial introduction. In: Cortesi, A., Fil\u00e9, G. (eds.) Static Analysis, Volume 1694 of LNCS, pp. 330\u2013354. Springer, Berlin (1999)","DOI":"10.1007\/3-540-48294-6_22"},{"issue":"11","key":"321_CR36","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2013.296","volume":"46","author":"J Neubauer","year":"2013","unstructured":"Neubauer, J., Steffen, B.: Plug-and-play higher-order process integration. Computer 46(11), 56\u201362 (2013)","journal-title":"Computer"},{"key":"321_CR37","unstructured":"Neubauer, J., Steffen, B.: Learning-based cross-platform conformance testing . STVR. Wiley (2014)"},{"key":"321_CR38","doi-asserted-by":"crossref","unstructured":"Neubauer, J. Steffen, B., Margaria, T.: Higher-order process modeling: product-lining, variability modeling and beyond. arXiv, preprint arXiv:1309.5143 (2013)","DOI":"10.4204\/EPTCS.129.16"},{"issue":"4","key":"321_CR39","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/TSE.2007.39","volume":"33","author":"S Pickin","year":"2007","unstructured":"Pickin, S., Jard, C., J\u00e9ron, T., J\u00e9z\u00e9quel, J.-M., Traon, Y.L.: Test synthesis from uml models of distributed software. IEEE Trans. Softw. Eng. 33(4), 252\u2013269 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"321_CR40","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s10009-009-0120-7","volume":"11","author":"H Raffelt","year":"2009","unstructured":"Raffelt, H., Merten, M., Steffen, B., Margaria, T.: Dynamic testing via automata learning. STTT 11(4), 307\u2013324 (2009)","journal-title":"STTT"},{"issue":"5","key":"321_CR41","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s10009-009-0111-8","volume":"11","author":"H Raffelt","year":"2009","unstructured":"Raffelt, H., Steffen, B., Berg, T., Margaria, T.: LearnLib: a framework for extrapolating behavioral models. Int. J. Softw. Tools Technol. Transf. 11(5), 393\u2013407 (2009)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"2","key":"321_CR42","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1006\/inco.1993.1021","volume":"103","author":"RL Rivest","year":"1993","unstructured":"Rivest, R.L., Schapire, R.E.: Inference of finite automata using homing sequences. Inf. Comput. 103(2), 299\u2013347 (1993)","journal-title":"Inf. Comput."},{"key":"321_CR43","unstructured":"Rosenberg, L., Stapko, R., Gallo. A.: Risk-based object oriented testing. In: Proceedings of 13th International Software\/Internet Quality Week-QW, San Francisco, California, USA, Vol. 2 (2000)"},{"key":"321_CR44","first-page":"2000","volume":"10","author":"G Rothermel","year":"1999","unstructured":"Rothermel, G., Harrold, M.J., Dedhia, J.: Regression test selection for C++ software. Softw. Test. Verif. Reliab. 10, 2000 (1999)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"321_CR45","doi-asserted-by":"crossref","unstructured":"Shahbaz, M., Shashidhar, K.C., Eschbach. R.: Iterative refinement of specification for component based embedded systems. In: ISSTA \u201911, pp. 276\u2013286. ACM (2011)","DOI":"10.1145\/2001420.2001454"},{"key":"321_CR46","unstructured":"Smolka, S., Steffen, B.: Priority as extremal probability. Formal Asp. Comput. 8(5), 585\u2013606 (1996)"},{"key":"321_CR47","doi-asserted-by":"crossref","unstructured":"Steffen, B.: Characteristic formulae. In: ICALP, Volume 372 of LNCS, pp. 723\u2013732 (1989)","DOI":"10.1007\/BFb0035794"},{"key":"321_CR48","doi-asserted-by":"crossref","unstructured":"Steffen, B., Howar, F., Merten. M.: Introduction to active automata learning from a practical perspective. In: Bernardo, M., Issarny, V. (eds.) Formal Methods for Eternal Networked Software Systems, Volume 6659 of LNCS, pp. 256\u2013296. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-21455-4_8"},{"key":"321_CR49","first-page":"92","volume-title":"Hardware and Software. Verification and Testing, Volume 4383 of Lecture Notes in Computer Science","author":"B Steffen","year":"2007","unstructured":"Steffen, B., Margaria, T., Nagel, R., J\u00f6rges, S., Kubczak, C.: Model-driven development with the jABC. In: Bin, E., Ziv, A., Ur, S. (eds.) Hardware and Software. Verification and Testing, Volume 4383 of Lecture Notes in Computer Science, pp. 92\u2013108. Springer, Berlin (2007)"},{"key":"321_CR50","doi-asserted-by":"crossref","unstructured":"Stepien, B., Peyton, L.: Innovation and evolution in integrated web application testing with ttcn-3. sttt-RBT. Under Review (2014)","DOI":"10.1007\/s10009-013-0278-x"},{"key":"321_CR51","doi-asserted-by":"crossref","unstructured":"Tretmans, J.: Model based testing with labelled transition systems. In: Hierons, R.M., Bowen, J.P., Harman, M. (eds.) Formal Methods and Testing, Volume 4949 of LNCS, pp. 1\u201338. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-78917-8_1"},{"key":"321_CR52","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-642-21455-4_9","volume-title":"Formal Methods for Eternal Networked Software Systems, Volume 6659 of LNCS","author":"J Tretmans","year":"2011","unstructured":"Tretmans, J.: Model-based testing and some steps towards test-based modelling. In: Bernardo, M., Issarny, V. (eds.) Formal Methods for Eternal Networked Software Systems, Volume 6659 of LNCS, pp. 297\u2013326. Springer, Berlin (2011)"},{"issue":"5","key":"321_CR53","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M Utting","year":"2012","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Softw. Test. Verif. Reliab. 22(5), 297\u2013312 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"321_CR54","doi-asserted-by":"crossref","unstructured":"Windm\u00fcller, S., Neubauer, J., Steffen, B., Howar, F., Bauer, O.: Active continuous quality control. In: Proceedings of the 16th International ACM Sigsoft symposium on Component-Based Software Engineering, CBSE \u201913, New York, NY, USA, pp. 111\u2013120. ACM (2013)","DOI":"10.1145\/2465449.2465469"},{"key":"321_CR55","unstructured":"Xu, L., Dias, M., Richardson, D.: Generating regression tests via model checking. In: COMPSAC \u201904, Washington, DC, USA, pp. 336\u2013341. IEEE Computer Society (2004)"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-014-0321-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10009-014-0321-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-014-0321-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:59:52Z","timestamp":1746248392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10009-014-0321-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,30]]},"references-count":55,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["321"],"URL":"https:\/\/doi.org\/10.1007\/s10009-014-0321-6","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"type":"print","value":"1433-2779"},{"type":"electronic","value":"1433-2787"}],"subject":[],"published":{"date-parts":[[2014,5,30]]}}}