{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:21:16Z","timestamp":1758673276131,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,20]]},"DOI":"10.1145\/3731806.3731851","type":"proceedings-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T10:17:39Z","timestamp":1758622659000},"page":"96-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Exploration of Cybersecurity Threats and Mitigation Strategies in Software Testing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2148-8095","authenticated-orcid":false,"given":"Hussein Ali","family":"Al Hashimi","sequence":"first","affiliation":[{"name":"Department of Software Engineering, College of Computer and Information Sciences at King Saud University, Riyadh, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dim.2024.100066"},{"key":"e_1_3_3_1_2_2","volume-title":"Software Engineering: A Practitioner's Approach","author":"Maxim B.","year":"2021","unstructured":"Roger. Pressman and B. Maxim, Software Engineering: A Practitioner's Approach, 9th Edition ed., 2021.","edition":"9"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2024.100687"},{"key":"e_1_3_3_1_4_2","first-page":"590","volume-title":"Analytics and Security Trends (CAST)","author":"Arumugam C.","year":"2016","unstructured":"C. Arumugam and B. Kaliamourthy, \"Global Software Development: A design to measure risk of global practitioners,\" in 2016 International Conference on Computing, Analytics and Security Trends (CAST), 2016, pp. 590-593."},{"key":"e_1_3_3_1_5_2","first-page":"228","volume-title":"Risk and Compliance Management Framework for Outsourced Global Software Development,\" in 2010 5th IEEE International Conference on Global Software Engineering","author":"Magnusson C.","year":"2010","unstructured":"C. Magnusson and S. C. Chou, \"Risk and Compliance Management Framework for Outsourced Global Software Development,\" in 2010 5th IEEE International Conference on Global Software Engineering, 2010, pp. 228-233."},{"key":"e_1_3_3_1_6_2","first-page":"1","volume-title":"G. q. Zu, G. d. Zhen, J. c. Xiao, and Q. s. Lin, \"Two kinds of security distance for distribution network,\" in 2017 IEEE Power & Energy Society General Meeting","author":"Xiao J.","year":"2017","unstructured":"J. Xiao, B. q. Zhang, G. q. Zu, G. d. Zhen, J. c. Xiao, and Q. s. Lin, \"Two kinds of security distance for distribution network,\" in 2017 IEEE Power & Energy Society General Meeting, 2017, pp. 1-5."},{"key":"e_1_3_3_1_7_2","first-page":"1","volume-title":"Management and Security (ICCAMS)","author":"Kolikipogu R.","year":"2023","unstructured":"R. Kolikipogu, P. Rastogi, D. Victorseelan, and P. P. Singh, \"Building a Deep Learning Model to Facilitate Software Project Risk Assessment,\" in 2023 International Conference on New Frontiers in Communication, Automation, Management and Security (ICCAMS), 2023, pp. 1-5."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.10.001"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13010647"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.3390\/su15010801"},{"key":"e_1_3_3_1_11_2","first-page":"100","article-title":"Differential Testing for Software","volume":"10","author":"McKeeman W. M.","year":"1998","unstructured":"W. M. McKeeman, \"Differential Testing for Software,\" Digit. Tech. J., vol. 10, pp. 100-107, 1998.","journal-title":"Digit. Tech. J."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3361566"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"J. Guo Y. Jiang Y. Zhao Q. Chen and J. Sun \"DLFuzz: differential fuzzing testing of deep learning systems \" presented at the Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering Lake Buena Vista FL USA 2018.","DOI":"10.1145\/3236024.3264835"},{"key":"e_1_3_3_1_14_2","volume-title":"Right for the Wrong Reasons: Diagnosing Syntactic Heuristics in Natural Language Inference,\" in Annual Meeting of the Association for Computational Linguistics","author":"McCoy R. T.","year":"2019","unstructured":"R. T. McCoy, E. Pavlick, and T. Linzen, \"Right for the Wrong Reasons: Diagnosing Syntactic Heuristics in Natural Language Inference,\" in Annual Meeting of the Association for Computational Linguistics, 2019."},{"key":"e_1_3_3_1_15_2","volume-title":"USA","author":"Liu Z.","year":"2023","unstructured":"Z. Liu, Y. Feng, Y. Yin, J. Sun, Z. Chen, and B. Xu, \"QATest: A Uniform Fuzzing Framework for Question Answering Systems,\" presented at the Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, Rochester, MI, USA, 2023."},{"key":"e_1_3_3_1_16_2","first-page":"18486","article-title":"A Systematic Study and Comprehensive Evaluation of ChatGPT on Benchmark Datasets","volume":"2305","author":"Laskar M. T. R.","year":"2023","unstructured":"M. T. R. Laskar, M. S. Bari, M. Rahman, M. A. H. Bhuiyan, S. R. Joty, and J. Huang, \"A Systematic Study and Comprehensive Evaluation of ChatGPT on Benchmark Datasets,\" ArXiv, vol. abs\/2305.18486, 2023.","journal-title":"ArXiv"},{"key":"e_1_3_3_1_17_2","first-page":"12767","article-title":"Can we trust the evaluation on ChatGPT?","volume":"2303","author":"Aiyappa R.","year":"2023","unstructured":"R. Aiyappa, J. An, H. Kwak, and Y.-Y. Ahn, \"Can we trust the evaluation on ChatGPT?,\" ArXiv, vol. abs\/2303.12767, 2023.","journal-title":"ArXiv"},{"key":"e_1_3_3_1_18_2","volume-title":"Research design: qualitative, quantitative and mixed methods approaches","author":"Creswell J. W.","year":"2009","unstructured":"J. W. Creswell, Research design: qualitative, quantitative and mixed methods approaches, 3rd edition: Sage, London, 2009.","edition":"3"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3306607"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13042465"},{"key":"e_1_3_3_1_21_2","article-title":"Software integration model: An assessment tool for global software development vendors","volume":"2540","author":"Ilyas M.","unstructured":"M. Ilyas, S. U. Khan, H. U. Khan, and N. Rashid, \"Software integration model: An assessment tool for global software development vendors,\" Journal of Software: Evolution and Process, vol. n\/a, p. e2540.","journal-title":"Journal of Software: Evolution and Process"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/638750.638758"}],"event":{"name":"ICSCA 2025: 2025 14th International Conference on Software and Computer Applications","acronym":"ICSCA 2025","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 2025 14th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731806.3731851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T20:53:23Z","timestamp":1758660803000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731806.3731851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":22,"alternative-id":["10.1145\/3731806.3731851","10.1145\/3731806"],"URL":"https:\/\/doi.org\/10.1145\/3731806.3731851","relation":{},"subject":[],"published":{"date-parts":[[2025,2,20]]},"assertion":[{"value":"2025-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}