期刊文献+
共找到684篇文章
< 1 2 35 >
每页显示 20 50 100
Model Checking-Based Testing of Web Applications 被引量:2
1
作者 ZENG Hongwei MIAO Huaikou 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期922-926,共5页
A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagra... A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria. 展开更多
关键词 web application test generation model checking consistency relation
在线阅读 下载PDF
Method for test case selection and execution of web application regression testing
2
作者 曹曦 许蕾 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期325-329,共5页
In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case select... In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case selection method for web application regression testing based on the control flow graph.This method is safe enough to the test case selection.On the base of features of request sequence in web application,the minimization technique and the priority of test cases are taken into consideration in the process of execution of test cases in regression testing for web application.The improved greedy algorithm is also raised resulting in optimization of execution of test cases.The experiments indicate that the number of test cases which need to be retested is reduced,and the efficiency of execution of test cases is also improved. 展开更多
关键词 regression testing web application test case selection control flow graph optimizing execution
在线阅读 下载PDF
Testing Forms in Web Applications Automatically 被引量:2
3
作者 XU Lei XU Baowent 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第3期561-566,共6页
Forms enhance both the dynamic and interactive abilities of Web applications and the system complexity. And it is especially important to test forms completely and thoroughly. Therefore, this paper discusses how to ca... Forms enhance both the dynamic and interactive abilities of Web applications and the system complexity. And it is especially important to test forms completely and thoroughly. Therefore, this paper discusses how to carry out the form testing by different methods in the related testing phases. Namely, at first, automatically abstracting forms in the Web pages by parsing the HTML documents; then, ohtai ning the testing data with a certain strategies, such as by requirement specifications, by mining users' hefore input informarion or by recording meehanism; and next executing the testing actions automatically due to the well formed test cases; finally, a case study is given to illustrate the convenient and effective of these methods. 展开更多
关键词 web application form testing testing process automatic testing
在线阅读 下载PDF
AWeb Application Fingerprint Recognition Method Based on Machine Learning
4
作者 Yanmei Shi Wei Yu +1 位作者 Yanxia Zhao Yungang Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期887-906,共20页
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint r... Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and attacks.Traditional fingerprint recognition methods,which rely on preannotated feature matching,face inherent limitations due to the ever-evolving nature and diverse landscape of web applications.In response to these challenges,this work proposes an innovative web application fingerprint recognition method founded on clustering techniques.The method involves extensive data collection from the Tranco List,employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction.The core of the methodology lies in the application of the unsupervised OPTICS clustering algorithm,eliminating the need for preannotated labels.By transforming web applications into feature vectors and leveraging clustering algorithms,our approach accurately categorizes diverse web applications,providing comprehensive and precise fingerprint recognition.The experimental results,which are obtained on a dataset featuring various web application types,affirm the efficacy of the method,demonstrating its ability to achieve high accuracy and broad coverage.This novel approach not only distinguishes between different web application types effectively but also demonstrates superiority in terms of classification accuracy and coverage,offering a robust solution to the challenges of web application fingerprint recognition. 展开更多
关键词 web application fingerprint recognition unsupervised learning clustering algorithm feature extraction automated testing network security
在线阅读 下载PDF
Automatic generating test cases for testing Web applications
5
作者 CHEN Sheng-bo MIAO Huai-kou QIAN Zhong-sheng 《通讯和计算机(中英文版)》 2008年第6期21-26,共6页
关键词 自动化技术 测试方法 网络技术 互联网
在线阅读 下载PDF
Support for development and test of web application:A tree-oriented model
6
作者 曹旻 曹真 李海强 《Journal of Shanghai University(English Edition)》 CAS 2011年第5期357-362,共6页
Building an abstract model of the web application is the chief task of software test based on model, which is an efficient way for testing the web application. One problem with current web application test technologie... Building an abstract model of the web application is the chief task of software test based on model, which is an efficient way for testing the web application. One problem with current web application test technologies is the lack of tools for modeling the whole web software, especially the lack of support for describing web application from the view of action and function. This paper is concerned with providing the support for development and test of the web application. The presented novel model, named component-based and tree-oriented web application development model (CBTOWADM), abstracts the web application as a tree based on its system function and business process. CBTOWADM not only simplifies the design and development of the web application, but also acts as the model middleware for software test. The basic model definition, the system framework and the application in software test of CBTOWADM is described. 展开更多
关键词 web application software architecture software test COMPONENT
在线阅读 下载PDF
Coverage criteria and test requirement reduction for component-based web application 被引量:2
7
作者 顾静娴 许蕾 徐宝文 《Journal of Southeast University(English Edition)》 EI CAS 2010年第1期36-42,共7页
In order to analyze and test the component-based web application and decide when to stop the testing process, the concept of coverage criteria and test requirement reduction approach are proposed. First, four adequacy... In order to analyze and test the component-based web application and decide when to stop the testing process, the concept of coverage criteria and test requirement reduction approach are proposed. First, four adequacy criteria are defined and subsumption relationships among them are proved. Then, a translation algorithm is presented to transfer the test model into a web application decision-to-decision graph(WADDGraph)which is used to reduce testing requirements. Finally, different sets of test requirements can be generated from WADDGraph by analyzing subsumption and equivalence relationships among edges based on different coverage criteria, and testers can select different test requirements according to different testing environments. The case study indicates that coverage criteria follow linear subsumption relationships in real web applications. Test requirements can be reduced more than 55% on average based on different coverage criteria and the size of test requirements increases with the increase in the complexity of the coverage criteria. 展开更多
关键词 web application coverage criteria test requirement reduction
在线阅读 下载PDF
构建Web Application测试模型 被引量:3
8
作者 路晓丽 葛玮 +1 位作者 陈新丽 郝克刚 《计算机应用与软件》 CSCD 北大核心 2006年第11期22-23,共2页
随着W eb应用软件的飞速发展,作为保证W eb质量和可靠性的重要手段,W eb测试受到了人们越来越多的重视。分析了一些典型的W eb测试模型,提出了一种基于Petri网的W eb链接模型。
关键词 web应用软件测试 测试模型 PETRI网
在线阅读 下载PDF
一种面向对象的Web Application测试模型 被引量:3
9
作者 路晓丽 董云卫 赵宏斌 《计算机科学》 CSCD 北大核心 2010年第7期134-136,151,共4页
为了保证Web应用的质量和可靠性,需要不断加强对Web应用软件的测试研究。Web应用软件的有效测试依赖于对其进行充分的分析和理解,提出良好的测试模型,并基于测试模型提出测试策略和测试方法。提出了一种面向对象的Web应用软件测试模型WA... 为了保证Web应用的质量和可靠性,需要不断加强对Web应用软件的测试研究。Web应用软件的有效测试依赖于对其进行充分的分析和理解,提出良好的测试模型,并基于测试模型提出测试策略和测试方法。提出了一种面向对象的Web应用软件测试模型WATM,并且基于WATM提出了测试用例的设计和选择的方法,从而更好地支持Web应用软件的导航测试和状态行为测试。 展开更多
关键词 web应用软件 测试模型 web应用软件测试
在线阅读 下载PDF
Hybrid Security Assessment Methodology for Web Applications 被引量:1
10
作者 Roddy A.Correa Juan Ramon Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio SiciliaMontalvo Manuel Sanchez Rubio A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期89-124,共36页
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment... This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks. 展开更多
关键词 web applications security vulnerability WEAKNESS security analysis white box black box interactive application security testing static application security testing dynamic application security testing
在线阅读 下载PDF
Integration of PSSE Web Application with Power System Simulation Platform 被引量:1
11
作者 YU Hao LIANG Xiaopeng +1 位作者 GAO Chong XU Liang 《Journal of Mechanics Engineering and Automation》 2017年第5期262-268,共7页
As power systems become larger and more complicated, power system simulation analysis requires more flexibility and faster performance. BPA is simulation software that is widely used in China and thus official power s... As power systems become larger and more complicated, power system simulation analysis requires more flexibility and faster performance. BPA is simulation software that is widely used in China and thus official power system data are in BPA format. However, BPA's flexibility and performance cannot meet the requirement of ultra-large-scale power system. PSSE supports user-def'med models and can handle large scale power system with up to 150,000 buses. From that perspective, PSSE is much suitable for future network analysis. To take advantages of both BPA and PSSE, it is required to build a simulation platform which is able to combine PSS^E with BPA to meet the requirements of large-scale power system simulation in the future. In this paper, PSS^E and BPA have been integrated into the power system simulation platform to perform power system study together. As data format and models are different between BPA and PSSE, the focus is developing a converter that can convert BPA data to PSSE data and creating dynamic models in PSSE based on the dynamic models in BPA. Simulation results show the accuracy of PSSE user-defined models and high availability of PSSE Web application. 展开更多
关键词 PSS^E web application BPA user-defined model.
在线阅读 下载PDF
Combinatorial Method with Static Analysis for Source Code Security in Web Applications
12
作者 Juan Ramon Bermejo Higuera Javier Bermejo Higuera +3 位作者 Juan Antonio Sicilia Montalvo Tomas Sureda Riera Christopher I.Argyros A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第11期541-565,共25页
Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity.The construction of the procedure utilized in the static analysis tools of source cod... Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity.The construction of the procedure utilized in the static analysis tools of source code security differs and therefore each tool finds a different number of each weakness type for which it is designed.To utilize the possible synergies different static analysis tools may process,this work uses a new method to combine several source codes aiming to investigate how to increase the performance of security weakness detection while reducing the number of false positives.Specifically,five static analysis tools will be combined with the designed method to study their behavior using an updated benchmark for OWASP Top Ten Security Weaknesses(OWASP TTSW).The method selects specific metrics to rank the tools for different criticality levels of web applications considering different weights in the ratios.The findings show that simply including more tools in a combination is not synonymous with better results;it depends on the specific tools included in the combination due to their different designs and techniques. 展开更多
关键词 WEAKNESS BENCHMARK security testing analysis comparative methodology tools combination web application
在线阅读 下载PDF
Zoomer: An Automated Web Application Change Localization Tool
13
作者 Wenhua Wang Yu Lei 《通讯和计算机(中英文版)》 2012年第8期913-919,共7页
关键词 web应用程序 自动化 工具 本地化 快速迭代 缩放 应用程序开发 程序测试
在线阅读 下载PDF
Model-based automated testing of JavaScript Web applications via longer test sequences 被引量:1
14
作者 Pengfei GAO Yongjie XU +1 位作者 Fu SONG Taolue CHEN 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第3期53-66,共14页
JavaScript has become one of the most widely used languages for Web development.Its dynamic and event-driven features make it challenging to ensure the correctness of Web applications written in JavaScript.A variety o... JavaScript has become one of the most widely used languages for Web development.Its dynamic and event-driven features make it challenging to ensure the correctness of Web applications written in JavaScript.A variety of dynamic analysis techniques have been proposed which are,however,limited in either coverage or scalability.In this paper,we propose a simple,yet effective,model-based automated testing approach to achieve a high code-coverage within the time budget via testing with longer event sequences.We implement our approach as an open-source tool LJS,and perform extensive experiments on 21 publicly available benchmarks.On average,LJS is able to achieve 86.5%line coverage in 10 minutes.Compared with JSDEP,a state-of-the-art breadth-first search based automated testing tool enriched with partial order reduction,the coverage of LJS is 11%-19%higher than that of JSDEP on real-world large Web applications.Our empirical findings support that proper longer test sequences can achieve a higher code coverage in JavaScript Web application testing. 展开更多
关键词 model-based testing automated testing JavaScript web applications
原文传递
Automated Testing of Web Applications Using Combinatorial Strategies 被引量:3
15
作者 Xiao-Fang Qi Zi-Yuan Wang +1 位作者 Jun-Qiang Mao Peng Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第1期199-210,共12页
Recently, testing techniques based on dynamic exploration, which try to automatically exercise every possible user interface element, have been extensively used to facilitate fully testing web applications. Most of su... Recently, testing techniques based on dynamic exploration, which try to automatically exercise every possible user interface element, have been extensively used to facilitate fully testing web applications. Most of such testing tools are however not effective in reaching dynamic pages induced by form interactions due to their emphasis on handling client-side scripting. In this paper, we present a combinatorial strategy to achieve a full form test and build an automated test model. We propose an algorithm called pairwise testing with constraints (PTC) to iraplement the strategy. Our PTC algorithm uses pairwise coverage and handles the issues of semantic constraints and illegal values. We have implemented a prototype tool ComjaxTest and conducted an empirical study on five web applications. Experimental results indicate that our PTC algorithm generates less form test cases while achieving a higher coverage of dynamic pages than the general pairwise testing algorithm. Additionally, our ComjaxTest generates a relatively complete test model and then detects more faults in a reasonable amount of time, as compared with other existing tools based on dynamic exploration. 展开更多
关键词 automated testing combinatorial testing web application
原文传递
Efficient Large Language Model Application Development: A Case Study of Knowledge Base, API, and Deep Web Search Integration
16
作者 Xiangyu Wang Yan Tan +6 位作者 Tao Yang Meng Yuan Shaohan Wang Min Chen Feiyang Ren Zijian Zhang Yuqi Shao 《Journal of Computer and Communications》 2024年第12期171-200,共30页
This paper presents a reference methodology for process orchestration that accelerates the development of Large Language Model (LLM) applications by integrating knowledge bases, API access, and deep web retrieval. By ... This paper presents a reference methodology for process orchestration that accelerates the development of Large Language Model (LLM) applications by integrating knowledge bases, API access, and deep web retrieval. By incorporating structured knowledge, the methodology enhances LLMs’ reasoning abilities, enabling more accurate and efficient handling of complex tasks. Integration with open APIs allows LLMs to access external services and real-time data, expanding their functionality and application range. Through real-world case studies, we demonstrate that this approach significantly improves the efficiency and adaptability of LLM-based applications, especially for time-sensitive tasks. Our methodology provides practical guidelines for developers to rapidly create robust and adaptable LLM applications capable of navigating dynamic information environments and performing effectively across diverse tasks. 展开更多
关键词 Large Language model Knowledge Base API Integration web Retrieval application Development
在线阅读 下载PDF
Behavior Model Construction for Client Side of Modern Web Applications 被引量:1
17
作者 Weiwei Wang Junxia Guo +1 位作者 Zheng Li Ruilian Zhao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第1期112-134,共23页
Most of the behavior models with respect to Web applications focus on sequencing of events,without regard for the changes of parameters or elements and the relationship between trigger conditions of events and Web pag... Most of the behavior models with respect to Web applications focus on sequencing of events,without regard for the changes of parameters or elements and the relationship between trigger conditions of events and Web pages.As a result,these models are not sufficient to effectively represent the dynamic behavior of the Web2.0 application.Therefore,in this paper,to appropriately describe the dynamic behavior of the client side of Web applications,we define a novel Client-side Behavior Model(CBM)for Web applications and present a user behavior trace-based modeling method to automatically generate and optimize CBMs.To verify the effectiveness of our method,we conduct a series of experiments on six Web applications according to three types of user behavior traces.The experimental results show that our modeling method can construct CBMs automatically and effectively,and the CBMs built are more precise to represent the dynamic behavior of Web applications. 展开更多
关键词 web applications client-side behavior model user behavior trace
原文传递
Testing and Evaluation for Web Usability Based on Extended Markov Chain Model 被引量:2
18
作者 MAOCheng-ying LUYan-sheng 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期687-693,共7页
As the increasing popularity and complexity of Web applications and the emergence of their new characteristics, the testing and maintenance of large, complex Web applications are becoming more complex and difficult. W... As the increasing popularity and complexity of Web applications and the emergence of their new characteristics, the testing and maintenance of large, complex Web applications are becoming more complex and difficult. Web applications generally contain lots of pages and are used by enormous users. Statistical testing is an effective way of ensuring their quality. Web usage can be accurately described by Markov chain which has been proved to be an ideal model for software statistical testing. The results of unit testing can be utilized in the latter stages, which is an important strategy for bottom-to-top integration testing, and the other improvement of extended Markov chain model (EMM) is to present the error type vector which is treated as a part of page node. this paper also proposes the algorithm for generating test cases of usage paths. Finally, optional usage reliability evaluation methods and an incremental usability regression testing model for testing and evaluation are presented. Key words statistical testing - evaluation for Web usability - extended Markov chain model (EMM) - Web log mining - reliability evaluation CLC number TP311. 5 Foundation item: Supported by the National Defence Research Project (No. 41315. 9. 2) and National Science and Technology Plan (2001BA102A04-02-03)Biography: MAO Cheng-ying (1978-), male, Ph.D. candidate, research direction: software testing. Research direction: advanced database system, software testing, component technology and data mining. 展开更多
关键词 statistical testing evaluation for web usability extended Markov chain model (EMM) web log mining reliability evaluation
在线阅读 下载PDF
A Novel Lifecycle Model for Web-based Application Development in Small and Medium Enterprises 被引量:1
19
作者 Wei Huang Ru Li +3 位作者 Carsten Maple Hong-Ji Yang David Foskett Vince Cleaver 《International Journal of Automation and computing》 EI 2010年第3期389-398,共10页
Software engineering's lifecycle models havc proven to be very important for traditional software development. However, can these models be applied to the development of Web-based applications as well? In recent yea... Software engineering's lifecycle models havc proven to be very important for traditional software development. However, can these models be applied to the development of Web-based applications as well? In recent years, Web-based applications have become more and more complicated and a lot of efforts have been placed on introducing new technologies such as J2EE, PhP, and .NET, etc., which have been universally accepted as the development technologies for Web-based applications. However, there is no universally accepted process model for the development of Web-based applications. Moreover, shaping the process model for small medium-sized enterprises (SMEs), which have limited resources, has been relatively neglected. Based on our previous work, this paper presents an expanded lifecycle process model for the development of Web-based applications in SMEs. It consists of three sets of processes, i.e., requirement processes, development processes, and evolution processes. Particularly, the post-delivery evolution processes are important to SMEs to develop and maintain quality web applications with limited resources and time. 展开更多
关键词 web development of web-based applications lifecycle models small medium-sized enterprises (SMEs).
在线阅读 下载PDF
A CONFERENCE CONTROL MODEL BETWEEN A WEB SERVER AND A TELECOM APPLICATION SERVER
20
作者 Wang Kaixi Yang Fangchun 《Journal of Electronics(China)》 2008年第2期232-238,共7页
The paper proposes a conference control model between a web server and a telecom application server,referred to as the Conference Directed Graph(CDG) ,and describes an asynchronous communication mechanism between them... The paper proposes a conference control model between a web server and a telecom application server,referred to as the Conference Directed Graph(CDG) ,and describes an asynchronous communication mechanism between them. The Corba Interface Definition Language(IDL) interfaces are defined,and a message sequence chart is illustrated. This web conference control model provides conference users with a new approach to manage and control a conference and the participants. The performance of the system prototype is analyzed and verified in the 863 project named "The Multi-media and Mobile Services Enabled Soft-switch System". 展开更多
关键词 Service creation Parlay application Programming Interface (API) web conference control model
在线阅读 下载PDF
上一页 1 2 35 下一页 到第
使用帮助 返回顶部