Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security testing (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/162)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Vulnerability assessment of web services with model-based mutation testing
Siavashi, Faezeh
;
Truscan, Dragos
;
Vain, Jüri
2018 IEEE 18th International Conference on Software Quality, Reliability, and Security - QRS 2018 - : 16–20 July 2018, Lisbon, Portugal : proceedings
2018
/
p. 301–312 : ill
http://doi.org/10.1109/QRS.2018.00043
book article
Number of records 1, displaying
1 - 1
keyword
160
1.
security testing
2.
cybersecurity testing
3.
ad-hoc sensor networks security
4.
Automatic Security Verification
5.
Blockchain security
6.
cache security
7.
communication system security
8.
comprehensive system of economic security
9.
computer security
10.
cooperative security dilemma
11.
cyber security
12.
cyber security education
13.
cyber security exercises
14.
cyber security strategies
15.
cyber-security
16.
data security
17.
development of security cameras
18.
drinking water security
19.
economic security
20.
economic security of enterprise
21.
emotional security
22.
energy security
23.
energy security indicator
24.
graded security
25.
hardware security
26.
hardware security primitive
27.
human security
28.
information security
29.
internal security
30.
international security
31.
investment and innovation security
32.
IPv6 security
33.
IT security
34.
job security
35.
long-term security
36.
metadata model for security measures
37.
Middle Eastern security
38.
Mobile security
39.
national cyber security strategy
40.
national security
41.
NATO. Science for Peace and Security Program
42.
network security
43.
network security monitoring
44.
OSCE (Organization for Security and Co-operation in Europe)
45.
passenger’s security
46.
policy-based routing security
47.
political and security cultures
48.
post-quantum security
49.
power system security
50.
quantitative security
51.
regional security
52.
RISC-V Security Verification
53.
security
54.
security and privacy
55.
security and privacy in smart grids
56.
Security Assertion Mining
57.
security closure
58.
Security Coverage
59.
security dataset
60.
security dilemma
61.
Security evaluation
62.
security log analysis
63.
security management
64.
security model
65.
security monitoring
66.
security notion
67.
security objectives
68.
security of data
69.
security of supply
70.
security operation center
71.
security patterns
72.
security problem definition
73.
security proof
74.
security protocols
75.
security requirements
76.
security requirements engineering
77.
security risk assessment
78.
security risk management
79.
security strategies
80.
security systems for military objects
81.
security training
82.
security verification
83.
social security planning
84.
societal security
85.
system of economic security
86.
system security
87.
terrorism security
88.
transmission System Security
89.
voting privacy and security
90.
accelerated testing
91.
acoustomechanical testing
92.
anaerobic testing
93.
aspect-oriented testing
94.
at-speed testing
95.
benchmark testing
96.
Berridge testing
97.
cancer genomic testing
98.
compliance testing
99.
compositional testing
100.
computer aided testing
101.
conformance testing
102.
courses on electronic testing and design
103.
D. non-destructive testing
104.
design field testing
105.
eddy current testing
106.
erosion testing
107.
fatigue testing
108.
fire testing
109.
hierarchical testing
110.
hypotheses testing
111.
integration testing
112.
laboratory scale testing
113.
load testing
114.
macro mechanical testing and green surface tribology
115.
material testing
116.
materials testing
117.
measurement and testing
118.
mechanical testing
119.
memory testing
120.
metamorphic testing
121.
microprocessor testing
122.
model based testing
123.
model-based mutation testing
124.
model-based testing
125.
mutation testing
126.
network-testing
127.
non destructive testing
128.
nondestructive testing
129.
non-destructive testing
130.
on-site testing
131.
pin on disc wear testing
132.
PMU calibration testing
133.
PMU testing
134.
point-of-care testing
135.
processor core testing
136.
processor testing
137.
real-time HiL testing
138.
regression testing
139.
RISC processor testing
140.
robustness testing
141.
scenario testing
142.
scratch testing
143.
small-scale fire testing
144.
software testing
145.
software-in-the-loop (SIL) testing
146.
stand-alone testing
147.
stress-testing
148.
substation testing methods
149.
system testing
150.
tensile testing
151.
testing
152.
testing methods
153.
testing of digital devices
154.
testing of generator
155.
testing of phasor measurement units
156.
two-dimensional array testing
157.
wafer testing
158.
wear testing
159.
vibration testing
160.
virtual testing
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT