[1]Leiner B M,Ruth R J, Sastry A R, et al.Goals and challenges of the DARPA GloMo program global mobile information systems [J].IEEE Personal Communications,1996,3(2):34-43.
[2]Sidhu D P, Leung Ting-Kau. Formal methods for protocol testing:A detailed study [J].IEEE Transactions on Software Engineering,1989,15(4):413-426.
[3]Ammann P,Offutt J.Introduction to software testing [M].Cambridge,UK:Cambridge University Press,2008.
[4]Ravi S,Lakshminarayana G,Jha N K.TAO:Regular expression based high-level testability analysis and optimization[C]∥Proc of the 1998 IEEE International Test Conference,1998:331-340.
[5]Zi Xiao-chao,Yao Li-hong,Li Lan.A state-based approach to information flow analysis[J],Chinese Journal of Computers,2006,29(8):1460-1467.(in Chinese)
[6]Dalal S R,Jain A,Karunanithi N,et al.Model-based testing in practice[C]∥Proc of the 21st International Conference on Software Engineering, 1999:285-294.
[7]Broy M,Jonsson B,Katoen J-P,et al.Model-based testing of reactive systems:Advanced lectures[M]∥Lecture Notes in Computer Science, Berlin:Springer Verlag,2005:391-438.
[8]Neto A D,Subramanyan R,Vieira M,et al.Improving evidence about software technologies:A Look at model-based testing[J].IEEE Software,2008,25(3):10-13.
[9]Neto A D, Subraman yan R, Vieira M, et al.A survey on model-based testing approaches:A systematic review[C]∥ Proc of the 1st ACM International Workshop on Empirical Assessment of Software Engineering Languages and Technologies:Held in conjunction with the 22nd IEEE/ACM International Conference on Automated Software Engineering,2007:31-36.
[10]Prathapani A, Santhanam L, Agrawal D P. Detection of blackhole attack in a wireless mesh network using intelligent honeypot agents [J].The Journal of Supercomputing,2013,1(1):753-758.
[11]Kilpelinen P,Tuhkanen R.One-unambiguity of regular expressions with numberic occurrence indicators[J]. Information & Computation, 2007,205(6):890-916.
[12]Liu Pan,Miao Huai-kou.A new approach to generating high quality test cases[C]∥Proc of IEEE 19th Asian Test Symposium (ATS 2010),2010:71-76.
[13]Matsumoto M,Anada K,Ueshima D,et al.Model checking of state transition matrix[R].ITSSV 2005,AIST Technical Report,2005:2-11.
附中文参考文献:
[5]訾小超,姚立红,李斓.一种基于有限状态机的隐含信息流分析方法[J].计算机学报,2006,29(8):1460-1467. |