The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we developed an application that can be used to monitor network packets, bandwidth, Protocol Packets from the network and easily can monitor the system networking performance. The system uses automated software engineering approach, especially unit test in Java. The system can be used for monitoring the TCP, UDP, ARP, packets, when the system is connected with the internet. Domain IP...
The increasing demand for multi-agent systems (MAS) in the software industry has led to development of several agent oriented software engineering (AOSE) methodologies. The autonomous agents' interaction in a dynamic software environment can potentially lead to runtime behavioral failures such as deadlock. Therefore, the MAS environment should be tested and monitored against the unwanted emergent...
Distributed software systems are characterized by increasing autonomy. They often have the capability to sense the environment and react to it, discover the presence of other systems and take advantage of their services, adapt and re-configure themselves in accordance with the internal as well as the global state. Testing this kind of systems is challenging, and systematic and automated approaches...
A generic test process should support all approaches "formal to informal" and mixed approaches within, and across, all test levels. But widely-accepted formal approaches, from current standards, certification syllabi and tools, have explicitly-defined test cases as the key underlying entity: not all real-life approaches use explicit test cases. Also, testing is maturing beyond merely "finding...
Due to the continuously growing possibilities provided by technology and its wider application, today's IT products are becoming more and more complex both from technical and managerial standpoints. Very often, multiple parties are involved in their development. Consequently, the organization of the integration and testing of these products gets increasingly complex. Organisations already encounter...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.