[1]苏永定,刘冠军,邱静,等. 系统测试性指标确定方法[J]. 测试技术学报, 2008,22(5):401-405.
[2]刘金琨. 智能控制[M]. 北京:电子工业出版社, 2005.
[3]王宝龙,黄考利,郭瑞,等. 基于故障树分析的复杂电子装备诊断策略优化实现[J]. 弹箭与制导学报, 2006,26(2):448-451.
[4]许斌,周鸣岐. 测试点优化及故障诊断树生成技术[J]. 国外电子测量技术, 2006,25(3):15-19.
[5]张大方,江招生. 系统级故障诊断的一种优化设计方法[J]. 湖南大学学报, 1998,25(3):105-107.
[6]张大方,江招生. 基于集团的系统级故障诊断研究[J]. 计算机学报, 1998,21(4):308-314.
[7]SOSNOWSKI J, GAWKOWSKI P, ZYGULSKI P, et al. Enhancing fault injection testbench[C]// Proceedings of the 2006 International Conference on Dependability of Computer Systems. 2006:76-83.
[8]STOTT D T, FLOERING B, BURKE D, et al. NFTAPE: A framework for assessing dependability in distributed system with lightweight fault injectors[C]// Proceedings of the 4th International Computer Performance and Dependability Symposium. 2000:91-100.
[9]〖JP2〗徐珞,吴际,刘超. 一种模型驱动的协议测试故障注入引擎设计[J]. 计算机工程与应用, 2007,43(16):111-113.
[10]Microsoft Azure. Introduction to the Fault Analysis Service[EB/OL]. (2017-06-15)[2019-05-09]. https://azure.microsoft.com/en-us/documentation/articles/service-fabric-testability-overview/.
[11]SHENOY A. A Deep Dive into Simoorg: Our Open Source Failure Induction Framework[EB/OL]. (2016-03-28)[2019-05-09]. https://engineering.linkedin.com/blog/2016/03/deep-dive-Simoorg-open-source-failure-induction-framework.
[12]Open Web Application Security Project. OWASP Testing Guide Version 3.0[EB/OL]. (2008-12-20)[2019-05-09]. http://www.owasp.org.cn/owasp-project/download/OWASP_testing_guide.
[13]SOUZA E, GUSMAO C, ALVES K, et al. Measurement and control for risk-based test cases and activities[C]// Proceedings of the 10th Latin American Test Workshop. 2009. DOI: 10.1109/LATW.2009.4813802.
[14]WACK J, TRACY M, SOUPPAYA M. Guideline on Network Security Testing: Recommendations of the National Institute of Standards and Technology[R]. NIST Special Publication 800-42, 2003.
[15]ZIMMERMANN F, ESCHBACH R, KLOOS J, et al. Risk-based statistical testing: A refinement-based approach to the reliability analysis of safety-critical systems[C]// Proceedings of the 12th European Workshop on Dependable Computing. 2009.
[16]HARI S K S, ADVE S V, NAEIMI H, et al. Relyzer: Exploiting application-level fault equivalence to analyze application resiliency to transient faults[C]// Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems. 2012:123-134.
[17]ZIADE H, AYOUBI R, VELAZCO R. A survey on fault injection techniques[J]. The International Arab Journal of Information Technology, 2004,1(2):171-186.
[18]KOOLI M, DI NATALE G. A survey on simulation-based fault injection tools for complex systems[C]// Proceedings of the 9th International Conference on Design & Technology of Integrated Systems in Nanoscale Era. 2014. DOI: 10.1109/DTIS.2014.6850649.
[19]MALLOULI W, WEHBI B, CAVALLI A R, et al. Formal supervision of mobile ad hoc networks for security flaws detection[M]// Security Engineering Techniques and Solutions for Information Systems: Management and Implementation. IGI Global, 2011. DOI: 10.4018/978-1-61520-803-6.
[20]EL KALAM A A, EL BAIDA R, BALBIANI P, et al. Organization based access control[C]// Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks. 2003:120-131.
[21]BOUQUET F, GRANDPIERRE C, LEGEARD B, et al. A subset of precise UML for model-based testing[C]// Proceedings of the 3rd International Workshop on Advances in Model-based Testing. 2007:95-104.
[22]BRIDGES S M, VAUGHN R B. Fuzzy data mining and genetic algorithms applied to intrusion detection[C]// Proceedings of the 2000 National Information Systems Security Conference. 2000:13-31.
[23]CAVALLI A, LEE D, RINDERKNECHT C, et al. Hit-or-jump: An algorithm for embedded testing with application to in services[M]// Formal Methods for Protocol Engineering and Distributed Systems. Springer, 1999:41-56.
[24]HAREL D. Statecharts: A visual formalism for complex systems[J]. Science of Computer Programming, 1987,8(3):231-274. |