A novel way to identify effective test-case in software testing
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
Test data generation is one of the costly parts of the software testing, which is performed according to the designed test cases. The problem of designing test cases and then generating optimized test data is one of the challenges of the software testing, including the mutation testing technique. mutation testing has the ability to measure the test cases quality and determine the adequate test cases. However, to perform mutation testing, you need a test set that provides the maximize Coverage of source code and thus have the ability to identify the program errors. In this work, we use code coverage techniques to design test cases and automatically generate optimized test data using the meta-heuristic FA-MABC algorithm. The results are a test suite that cover and test the maximum number of source code lines. Such test suite is more likely to identify errors and get a higher score in the mutation testing. In the proposed method to obtain effective test cases, first generated test cases are applied to mutation testing and then effective test cases are extracted using the Extinguished mutation table. The results of the evaluation show that the FA-MABC algorithm reduces the time of the test data generation, and “modified condition / decision coverage”, increases the mutation score.
Authors and Affiliations
Sadegh Bejani, Amir Hossein keymanesh
A Malware Classification Method Using visualization and Word Embedding Features
With the explosive growth of threats to Internet security, malware visualization in malware classification has become a promising study area in security and machine learning. This paper proposes a visualization method fo...
Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning
Abstract:In recent years, Unmanned Aerial Vehicles have become significantly available to the public of people. Affordable prices, being equipped with advanced technologies, small sizes, easy portability and ⦠etc. cre...
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks
In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely dete...
Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network
Deflecting missile’s radar guidance or missile’s seeker by chaff is a common and effective defensive method which is used in military vessels. To counter this defensive measure, methods for recognition targets from chaff...
Identify malicious traffic on IoT infrastructure using neural networks and deep learning
The Internet of Things is a network of physical devices and equipment that includes sensors, software, and other technologies for exchanging data with other devices and systems over the Internet. The spread of the Intern...