{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T12:33:16Z","timestamp":1775737996243,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,8,3]],"date-time":"2014-08-03T00:00:00Z","timestamp":1407024000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Softw Tools Technol Transfer"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s10009-014-0330-5","type":"journal-article","created":{"date-parts":[[2014,8,2]],"date-time":"2014-08-02T04:34:15Z","timestamp":1406954055000},"page":"627-642","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Approaches for the combined use of risk analysis and testing: a systematic literature review"],"prefix":"10.1007","volume":"16","author":[{"given":"Gencer","family":"Erdogan","sequence":"first","affiliation":[]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ragnhild Kobro","family":"Runde","sequence":"additional","affiliation":[]},{"given":"Fredrik","family":"Seehusen","sequence":"additional","affiliation":[]},{"given":"Ketil","family":"St\u00f8len","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,3]]},"reference":[{"key":"330_CR1","first-page":"33","volume":"65","author":"M Alam","year":"2013","unstructured":"Alam, M., Khan, A.I.: Risk-based testing techniques: a perspective study. Int. J. Comput. Appl. 65, 33\u201341 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"330_CR2","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/S0164-1212(00)00019-4","volume":"53","author":"S Amland","year":"2000","unstructured":"Amland, S.: Risk-based testing: risk analysis fundamentals and metrics for software testing including a financial application case study. J. Syst. Softw. 53, 287\u2013295 (2000)","journal-title":"J. Syst. Softw."},{"key":"330_CR3","doi-asserted-by":"crossref","unstructured":"Bai, X., Kenett, R.S.: Risk-based adaptive group testing of semantic web services. In: Proceeding of the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC\u201909), vol. 2, pp. 485\u2013490. IEEE, New York (2009)","DOI":"10.1109\/COMPSAC.2009.180"},{"key":"330_CR4","doi-asserted-by":"crossref","unstructured":"Bai, X., Kennett, R.S., Yu, W.: Risk assessment and adaptive group testing of semantic web services. Int. J. Softw. Eng. Knowl. Eng. 595\u2013620 (2012)","DOI":"10.1142\/S0218194012500167"},{"key":"330_CR5","doi-asserted-by":"crossref","unstructured":"Casado, R., Tuya, J., Younas, M.: Testing long-lived web services transactions using a risk-based approach. In: Proceeding of the 10th International Conference on Quality Software (QSIC\u201910), pp. 337\u2013340. IEEE, New York (2010)","DOI":"10.1109\/QSIC.2010.46"},{"key":"330_CR6","doi-asserted-by":"crossref","unstructured":"Casado, R., Tuya, J., Younas, M.: A framework to test advanced web services transactions. In: Proceeding of the 4th International Conference on Software Testing, Verification and Validation (ICST\u201911), pp 443\u2013446. IEEE, New York (2011)","DOI":"10.1109\/ICST.2011.44"},{"key":"330_CR7","unstructured":"Chen, Y., Probert, R.L.: A risk-based regression test selection strategy. In: Proceeding of the 14th IEEE International Symposium on Software Reliability Engineering (ISSRE\u201903), Fast Abstract, pp. 305\u2013306. Chillarege Press (2003)"},{"key":"330_CR8","unstructured":"Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proceeding of the 2002 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON\u201902), pages 1\u201314. IBM Press, USA (2002)"},{"key":"330_CR9","doi-asserted-by":"crossref","unstructured":"Entin, V., Winder, M., Zhang, B., Christmann, S.: Introducing model-based testing in an industrial scrum project. In: Proceeding of the Seventh International Workshop on Automation of Software Test (AST\u201912), pp. 43\u201349. IEEE, New York (2012)","DOI":"10.1109\/IWAST.2012.6228989"},{"key":"330_CR10","doi-asserted-by":"crossref","unstructured":"Felderer, M., Haisjackl, C., Breu, R., Motz, J.: Integrating manual and automatic risk assessment for risk-based testing. In: Proceeding of the 4th International Conference on Software Quality (SWQD\u201912), vol. 94 of LNBIP, pp. 159\u2013180. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-27213-4_11"},{"key":"330_CR11","doi-asserted-by":"crossref","unstructured":"Felderer, M., Ramler, R.: Experiences and challenges of introducing risk-based testing in an industrial project. In: Proceeding of the Fifth International Conference on Software Quality (SWQD\u201913), vol. 133 of LNBIP, pp. 10\u201329. Springer, New York (2013)","DOI":"10.1007\/978-3-642-35702-2_3"},{"key":"330_CR12","doi-asserted-by":"crossref","unstructured":"Gleirscher, M.: Hazard-based selection of test cases. In: Proceeding if the Sixth International Workshop on Automation of Software Test (AST\u201911), pp. 64\u201370. ACM, New York (2011)","DOI":"10.1145\/1982595.1982609"},{"key":"330_CR13","doi-asserted-by":"crossref","unstructured":"Gleirscher, M.: Hazard analysis of technical systems. In: Proceeding of the Fifth International Conference on Software Quality (SWQD\u201913), vol. 133 of LNBIP, pp. 104\u2013124. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-35702-2_8"},{"key":"330_CR14","doi-asserted-by":"crossref","unstructured":"Hosseingholizadeh, A.: A source-based risk analysis approach for software test optimization. In: Proceeding of the Second International Conference on Computer Engineering and Technology (ICCET\u201910), vol. 2, pp. 601\u2013604. IEEE, New York (2010)","DOI":"10.1109\/ICCET.2010.5485639"},{"key":"330_CR15","unstructured":"International Standards Organization. ISO 31000:2009(E), Risk management\u2014Principles and guidelines (2009)"},{"key":"330_CR16","unstructured":"International Standards Organization. ISO 29119 Software and system engineering\u2014Software Testing-Part 2 : Test process (draft) (2012)"},{"key":"330_CR17","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE 2007\u2013001 (2007)"},{"key":"330_CR18","doi-asserted-by":"crossref","unstructured":"Kloos, J., Hussain, T., Eschbach, R.: Risk-based testing of safety-critical embedded systems driven by Fault Tree Analysis. In: Proceeding of the Fourth International Conference on Software Testing, Verification and Validation Workshops (ICSTW\u201911), pp. 26\u201333. IEEE, New York (2011)","DOI":"10.1109\/ICSTW.2011.90"},{"key":"330_CR19","doi-asserted-by":"crossref","unstructured":"Kumar, N., Sosale, D., Konuganti, S.N., Rathi, A.: Enabling the adoption of aspects-testing aspects: A risk model, fault model and patterns. In: Proceeding of the Eighth ACM International Conference on Aspect-Oriented Software Development (AOSD\u201909), pp. 197\u2013206. ACM, New York (2009)","DOI":"10.1145\/1509239.1509266"},{"key":"330_CR20","doi-asserted-by":"crossref","unstructured":"Murthy, K.K., Thakkar, K.R., Laxminarayan, S.: Leveraging risk based testing in enterprise systems security validation. In: Proceeding of the First International Conference on Emerging Network Intelligence (EMERGING\u201909), pp. 111\u2013116. IEEE, New York (2009)","DOI":"10.1109\/EMERGING.2009.28"},{"key":"330_CR21","doi-asserted-by":"crossref","unstructured":"Nazier, R., Bauer, T.: Automated risk-based testing by integrating safety analysis information into system behavior models. In: Proceeding of the 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW\u201912), pp 213\u2013218. IEEE, New York (2012)","DOI":"10.1109\/ISSREW.2012.22"},{"key":"330_CR22","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1049\/iet-sen.2011.0081","volume":"7","author":"M Ray","year":"2013","unstructured":"Ray, M., Mohapatra, D.P.: Risk analysis: a guiding force in the improvement of testing. IET Softw. 7, 29\u201346 (2013)","journal-title":"IET Softw."},{"key":"330_CR23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/stvr.288","volume":"14","author":"F Redmill","year":"2004","unstructured":"Redmill, F.: Exploring risk-based testing and its implications. Softw. Test. Verif. Reliab. 14, 3\u201315 (2004)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"330_CR24","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/stvr.310","volume":"15","author":"F Redmill","year":"2005","unstructured":"Redmill, F.: Theory and practice of risk-based testing. Softw. Test. Verif. Reliab. 15, 3\u201320 (2005)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"330_CR25","unstructured":"Rosenberg, L., Stapko, R., Gallo, A.: Risk-based object oriented testing. In: Proceeding of the 24th Annual Software Engineering Workshop, pp. 1\u20136. NASA, Software Engineering Laboratory, (1999)"},{"key":"330_CR26","unstructured":"Schneidewind, N.F.: Risk-driven software testing and reliability. Int. J. Reliab. Qual. Saf. Eng. 14, 99\u2013132 (2007)"},{"key":"330_CR27","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusm\u00e3o, C., Alves, K., Ven\u00e2ncio, J., Melo, R.: Measurement and control for risk-based test cases and activities. In: Proceeding of the 10th Latin American Test Workshop (LATW\u201909), pp 1\u20136. IEEE, New York (2009)","DOI":"10.1109\/LATW.2009.4813802"},{"key":"330_CR28","doi-asserted-by":"crossref","unstructured":"Souza, E., Gusm\u00e3o, C., Ven\u00e2ncio, J.: Risk-based testing: A case study. In: Proceeding of the Seventh International Conference on Information Technology: New Generations (ITNG\u201910), pp. 1032\u20131037. IEEE, New York (2010)","DOI":"10.1109\/ITNG.2010.203"},{"key":"330_CR29","doi-asserted-by":"crossref","unstructured":"Stallbaum, H., Metzger, A., Pohl, K.: An automated technique for risk-based test case generation and prioritization. In: Proceeding of the Third International Workshop on Automation of Software Test (AST\u201908), pp. 67\u201370. ACM, New York (2008)","DOI":"10.1145\/1370042.1370057"},{"key":"330_CR30","doi-asserted-by":"crossref","unstructured":"Sulaman, S.M., Weyns, K., H\u00f6st, M.: A review of research on risk analysis methods for it systems. In: Proceeding of the 17th International Conference on Evaluation and Assessment in Software Engineering (EASE\u201913), pp. 86\u201396 (2013)","DOI":"10.1145\/2460999.2461013"},{"key":"330_CR31","unstructured":"Wendland, M.-F., Kranz, M., Schieferdecker, I.: A systematic approach to risk-based testing using risk-annotated requirements models. In: Proceeding of the Seventh International Conference on Software Engineering Advances (ICSEA\u201912), pp. 636\u2013642. IARA (2012)"},{"key":"330_CR32","doi-asserted-by":"crossref","unstructured":"Wong, W.E., Qi, Y., Cooper, K.: Source code-based software risk assessing. In: Proceeding of the 2005 ACM Symposium on Applied Computing (SAC\u201905), pp. 1485\u20131490. ACM, New York (2005)","DOI":"10.1145\/1066677.1067014"},{"key":"330_CR33","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/TDSC.2012.24","volume":"9","author":"D Xu","year":"2012","unstructured":"Xu, D., Tu, M., Sandford, M., Thomas, L., Woodraska, D., Xu, W.: Automated security test generation with formal threat models. IEEE Trans. Dependable Secure Comput. 9, 526\u2013540 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"330_CR34","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1142\/S0218194011005220","volume":"21","author":"H Yoon","year":"2011","unstructured":"Yoon, H., Choi, B.: A test case prioritization based on degree of risk exposure and its empirical study. Int. J. Softw. Eng. Knowl. Eng. 21, 191\u2013209 (2011)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"330_CR35","doi-asserted-by":"crossref","unstructured":"Zech, P.: Risk-based security testing in cloud computing environments. In: Proceeding of the Fourth International Conference on Software Testing, Verification and Validation (ICST\u201911), pp. 411\u2013414. IEEE, New York (2011)","DOI":"10.1109\/ICST.2011.23"},{"key":"330_CR36","doi-asserted-by":"crossref","unstructured":"Zech, P., Felderer, M., Breu, R.: Towards a model based security testing approach of cloud computing environments. In: Proceeding of the Sixth International Conference on Software Security and Reliability Companion (SERE-C\u201912), pp. 47\u201356. IEEE, New York (2012)","DOI":"10.1109\/SERE-C.2012.11"},{"key":"330_CR37","unstructured":"Zimmermann, F., Eschbach, R., Kloos, J., Bauer, T.: Risk-based statistical testing: A refinement-based appraoch to the reliability analysis of safety-critical systems. In: Proceeding of the 12th European Workshop on Dependable Computing (EWDC\u201909), pp. 1\u20138 (2009)"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-014-0330-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10009-014-0330-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-014-0330-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T13:50:20Z","timestamp":1565704220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10009-014-0330-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,3]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["330"],"URL":"https:\/\/doi.org\/10.1007\/s10009-014-0330-5","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"value":"1433-2779","type":"print"},{"value":"1433-2787","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,3]]}}}