共 12 条
- [2] Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 614 - 631
- [4] Empirical evaluation of mutation-based test case prioritization techniques [J]. SOFTWARE TESTING VERIFICATION & RELIABILITY, 2019, 29 (1-2):
- [6] Automated Mutation-based Test Case Evaluation for Semantic Web Services [J]. 2014 23RD AUSTRALASIAN SOFTWARE ENGINEERING CONFERENCE (ASWEC), 2013, : 210 - 219
- [7] Learning Finite-State Machines with Classical and Mutation-Based Ant Colony Optimization: Experimental Evaluation [J]. 2013 1ST BRICS COUNTRIES CONGRESS ON COMPUTATIONAL INTELLIGENCE AND 11TH BRAZILIAN CONGRESS ON COMPUTATIONAL INTELLIGENCE (BRICS-CCI & CBIC), 2013, : 528 - 533
- [8] ,uSE: Mutation -based Evaluation of Security -focused Static Analysis Tools for Android [J]. 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 53 - 56