Essays about: "software testing techniques"
Showing result 6 - 10 of 177 essays containing the words software testing techniques.
-
6. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE
-
7. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE
-
8. Minimization of Model-based Tests in Modbat
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Model-based testing (MBT) is a promising testing method with advantages like exhaustive exploration and high maintainability. However, one notable downside is that the generated tests usually contain much unnecessary noise. READ MORE
-
9. Knowledge Graph Creation and Software Testing
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: With the burgeoning volumes of data, efficient data transformation techniques are crucial. RDF mapping language has been recognized as a conventional method, whileIKEA the Knowledge graph’s approach brings a new perspective with tailored functions and schema definitions. READ MORE
-
10. Unsupervised Anomaly Detection in Testchannels : A Comparison Between Machine Learning Techniques
University essay from Umeå universitet/Institutionen för matematik och matematisk statistikAbstract : Due to the increasing number of mobile applications and services, communication service providers strive to optimize their networks in order to maintain a competitive position. Continuous Integration, which includes improving software delivery through automation, is fundamental in the process of testing and optimizing networks. READ MORE