2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) 2020
DOI: 10.1109/icecce49384.2020.9179238
|View full text |Cite
|
Sign up to set email alerts
|

Web Application Testing With Model Based Testing Method: Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…𝐿 is the set of available actions listed in Section 2. Members of 𝑆 are also members of 𝑂 in (1). Being in the state 𝑜∈𝑆 is to be interpreted as: the agent is currently at the game object 𝑜's location.…”
Section: Hybrid Models Of Gamesmentioning
confidence: 99%
See 1 more Smart Citation
“…𝐿 is the set of available actions listed in Section 2. Members of 𝑆 are also members of 𝑂 in (1). Being in the state 𝑜∈𝑆 is to be interpreted as: the agent is currently at the game object 𝑜's location.…”
Section: Hybrid Models Of Gamesmentioning
confidence: 99%
“…However, all such types of AI also require much training, which could make them impractical to be deployed during the development time where SUT would undergo frequent changes. Model-based testing [23] is a well known automated testing approach which has been used in various studies [1,16]. However, its application in computer games has not been much studied.…”
Section: Related Workmentioning
confidence: 99%
“…The aim of a paper can be test automation, test coverage, or assessing a specific quality attribute, such as security. Kuk and Kim (2008), Marchetto et al (2008), Marchetto and Tonella (2009), Song and Miao (2009), Ran et al (2009), Andrews et al (2010), Song et al (2011), Tkachuk and Rajan (2011), Törsel (2011), Chen et al (2012), Tanida et al (2013), Bansal and Sabharwal (2013), Törsel (2013), Arora and Sinha (2013), Törsel (2013), Suhag and Bhatia (2014), Nabuco and Paiva (2014), Polpong and Kansomkeat (2015), Zhang and Tanno (2015), Dixit et al (2015), Habibi and Mirian-Hosseinabadi (2015), Sengupta and Dasgupta (2015), Qi et al (2017), Boukhris et al (2017) and Gao et al (2022) DFM or data flow graph, DDM or data dependency graph, CFM or CDM or graph Tarhini et al (2008), Ran et al (2009), Offutt and Wu (2010), Tung et al (2010), Törsel (2011, Bansal and Sabharwal (2013), Panthi and Mohapatra (2017), Akpinar et al (2020) and Elgendy et al (2020a) Security-related models: threat model, attack model, safe model, secure model, and vulnerability model Mallouli et al (2008), Xu et al (2012),…”
Section: Classifying Web Applications Model-based Testing Techniques ...mentioning
confidence: 99%
“…Similarly, the study in [ 11 ] investigated model-based software tests by using the Selenium library with the Graph Walker tool, which outperforms traditional software tests where JUnit and TestNG libraries were used. Comparisons of these two methods were performed and reported on parameters of the code line number, actual error detection rate, and test run-time parameters.…”
Section: Introductionmentioning
confidence: 99%