{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:31:28Z","timestamp":1759332688960,"version":"3.37.3"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862001"],"award-info":[{"award-number":["61862001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012490","name":"High Level Talents (Top Academic Talents) of North Minzu University","doi-asserted-by":"publisher","award":["2019BGBZ07"],"award-info":[{"award-number":["2019BGBZ07"]}],"id":[{"id":"10.13039\/501100012490","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3196934","type":"journal-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T19:28:55Z","timestamp":1659727735000},"page":"82540-82559","source":"Crossref","is-referenced-by-count":4,"title":["Standardization Workflow Technology of Software Testing Processes and its Application to SRGM on RSA Timing Attack Tasks"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1804-7224","authenticated-orcid":false,"given":"Nan","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, North Minzu University, Yinchuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1436-2219","authenticated-orcid":false,"given":"Qiang","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, North Minzu University, Yinchuan, China"}]},{"given":"Yangyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Electronics Standardization Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3688-244X","authenticated-orcid":false,"given":"Cong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, North Minzu University, Yinchuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7428-307X","authenticated-orcid":false,"given":"Yu","family":"He","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, North Minzu University, Yinchuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3745-276X","authenticated-orcid":false,"given":"Haide","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, North Minzu University, Yinchuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9927-5156","authenticated-orcid":false,"given":"Zijian","family":"Mao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, North Minzu University, Yinchuan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECDS.2017.8389562"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1378\/4\/042030"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037188"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1360\/SSI-2019-0123"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2017.8286409"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00104"},{"key":"ref8","first-page":"109","article-title":"Research on software testing standardization at home and abroad","volume":"11","author":"Ding","year":"2019","journal-title":"China Standardization"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW50294.2020.00049"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2018.8441142"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00036"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IAEAC.2018.8577247"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIS49377.2020.9194795"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2768420"},{"issue":"2","key":"ref15","first-page":"426","article-title":"Quantitative analysis of information leakage through hardware RSA timing channel based on entropy theory","volume":"41","author":"Mao","year":"2018","journal-title":"Chin. J. Comput."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44499-8_8"},{"key":"ref17","first-page":"60","volume-title":"Side-Channel Analysis in Cryptography: Principles, Methodologies and Modern Applications","author":"Guo","year":"2014"},{"issue":"10","key":"ref18","first-page":"8","article-title":"Detection and quantitative analysis of timing channel in RSA cryptographic core","volume":"53","author":"Mao","year":"2017","journal-title":"Comput. Eng. Appl."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03459-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00212-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2019-0163"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSimE48426.2020.9152686"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05532-0"},{"key":"ref24","first-page":"2632","article-title":"Complex software reliability allocation based on hybrid intelligent optimization algorithm","volume":"29","author":"Xu","year":"2018","journal-title":"Ruan Jian Xue Bao\/J. Softw."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/32.21762"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/32.90450"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-266950-7.50028-1"},{"issue":"18","key":"ref28","first-page":"4791","article-title":"Novel nonlinear least square parameter estimation method for Jelinski\u2013Moranda model","volume":"20","author":"Liu","year":"2008","journal-title":"Xitong Fangzhen Xuebao\/J. Syst. Simul."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220566"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/math9090985"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S52858.2021.00022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.10058"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698909"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-015-1870-0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2019.100357"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2021.100909"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2780-7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DSA.2019.00077"},{"first-page":"1","volume-title":"Software and Systems Engineering\u2014Software Testing\u2014Part 2: Test Processes","year":"2021","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3403\/30421237"},{"first-page":"1","volume-title":"Systems and Software Engineering\u2014Life Cycle Processes\u2014Requirements Engineering","year":"2018","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2020.103297"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2998545"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947377"},{"first-page":"1","volume-title":"Software Engineering\u2014Capabilities of Software Testing Tools","year":"2016","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/e20100732"},{"first-page":"1","volume-title":"Reliability of System and Software\u2014Part 3: Testing Method","year":"2013","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2014.01.004"},{"issue":"9","key":"ref49","first-page":"2802","article-title":"Review on fault detection rate in reliability model","volume":"31","author":"Zhang","year":"2020","journal-title":"Ruan Jian Xue Bao\/J. Softw."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00040"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00010"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/math8081366"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731607"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/app7121304"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2653"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/32.624305"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2017.06.034"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81007-8_7"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09851633.pdf?arnumber=9851633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T11:45:51Z","timestamp":1706787951000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9851633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3196934","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}