Advances In Combinatorial Testing
The evaluated outcomes point out that both strategies succeed in detecting security leaks in net applications with completely different results, relying on the background logic of the testing strategy. Last however not least, we claim that assault pattern-based combinatorial testing with constraints could be an alternative combinatorial testing technique for web software safety testing, particularly after we compare our methodology to other […]
Comentários