Author of the publication

Mining Executable Specifications of Web Applications from Selenium IDE Tests.

, , , and . SERE, page 263-272. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Parallel Based on Planning Graph Analysis of Predicate/Transition Nets., , and . IC-AI, page 440-446. CSREA Press, (2002)Threat-Driven Architectural Design of Secure Information Systems., and . ICEIS (3), page 136-143. (2005)Logical object as a basis of knowledge based systems., and . J. Comput. Sci. Technol., 10 (5): 425-438 (1995)Effect of NO2 on O3 Using Complex Network Topology Analysis., , , and . IEEE Trans. Comput. Social Systems, 6 (6): 1329-1342 (2019)A logic based language for networked agents.. Inf. Softw. Technol., 40 (8): 435-442 (1998)Testing aspect-oriented programs with finite state machines., , , and . Softw. Test. Verification Reliab., 22 (4): 267-293 (2012)Automated Test Code Generation from UML Protocol State Machines., , and . SEKE, page 99-104. Knowledge Systems Institute Graduate School, (2007)A threat model-based approach to security testing., , , , and . Softw. Pract. Exp., 43 (2): 241-258 (2013)Automated Security Test Generation with Formal Threat Models., , , , , and . IEEE Trans. Dependable Secur. Comput., 9 (4): 526-540 (2012)Mining Executable Specifications of Web Applications from Selenium IDE Tests., , , and . SERE, page 263-272. IEEE, (2012)