Prof. Dr. Lionel Briand
|
|
||||||||
| Faculty or Centre | Interdisciplinary Centre for Security, Reliability and Trust | ||||||||
| Department | SVV | ||||||||
| Postal Address |
Université du Luxembourg 29, avenue JF Kennedy L-1855 Luxembourg |
||||||||
| Campus Office | JFK Building, E01-101 | ||||||||
|
|
|||||||||
| Telephone | (+352) 46 66 44 5223 | ||||||||
| Social Media & Blogs | |||||||||
| Video |
Prof. Lionel Briand and the Software Verification and Validation Lab (SnT)
|
||||||||
| Speaks | English, French | ||||||||
| Research Stays in | Germany, France, USA, Norway | ||||||||
Head of the Software Verification and Validation Department, SnT/FSTC
Vice-Director SnT
Expertise areas:
- Software verification and validation
- Software testing
- Model-driven requirements, architecture, and design
Awards:
- ERC Advanced grant (2016)
- FNR PEARL chair (2012)
- IEEE Reliability Society, Reliability engineer of the year (2013)
- IEEE Computer Society Harlan Mills Award Recipient (2012)
- IEEE Fellow (2010)
- Canada Research Chair (Tier I, 2003-2008)
Links:
Former Positions:
- Head of the Certus center for software verification and validation, Simula Research Laboratory, Norway
- Professor, University of Oslo, Norway
- Professor and Canada Research Chair, Carleton University, Ottawa, Canada
- Department head, Fraunhofer IESE, Germany
- Group leader, Computer Research Institute of Montreal (CRIM), Montreal, Canada
- Faculty Research Scientist, SEL, University of Maryland and NASA GSFC, College Park, Maryland, USA
- Software engineer, CISI Ingenierie, France
Last updated on: Thursday, 17 August 2017
In press
Supporting DNN Safety Analysis and Retraining through Heatmap-based Unsupervised Learning; ; ;
in IEEE Transactions on Reliability (in press)
Combining Genetic Programming and Model Checking to Generate Environment Assumptions; ; ; ;
in IEEE Transactions on Software Engineering (in press)
Automated Reverse Engineering of Role-based Access Control Policies of Web Applications; ; ; ;
in Journal of Systems and Software (in press)
A Theoretical Framework for Understanding the Relationship between Log Parsing and Anomaly Detection; ; ;
in Proceedings of the 21st International Conference on Runtime Verification (in press)
An Automated Framework for the Extraction of Semantic Legal Metadata from Legal Texts; ; ; ; ;
in Empirical Software Engineering (in press)
Modeling Data Protection and Privacy: Application and Experience with GDPR; ; ; ;
in Software and Systems Modeling (in press)
2021
Signal-Based Properties of Cyber-Physical Systems: Taxonomy and Logic-based Characterization; ; ; ;
in Journal of Systems and Software (2021), 174
Using Domain-specific Corpora for Improved Handling of Ambiguity in Requirements; ; ; ;
in In Proceedings of the 43rd International Conference on Software Engineering (ICSE'21), Madrid 25-28 May 2021 (2021, May)
ThEodorE: a Trace Checker for CPS Properties; ; ;
in Companion Proceedings of the 43rd International Conference on Software Engineering (2021, May)
Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap; ; ;
in Proceedings of the 43rd International Conference on Software Engineering (ICSE 2021) (2021, May)
Log-based Slicing for System-level Test Cases; ; ; ;
in Proceedings of ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (2021, July)
Uncertainty-aware Specification and Analysis for Hardware-in-the-Loop Testing of Cyber Physical Systems; ; ; ; ;
in Journal of Systems and Software (2021)
Automatic Test Suite Generation for Key-Points Detection DNNs using Many-Objective Search (Experience Paper); ; ; ;
in 2021 ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) (2021, July)
Can Offline Testing of Deep Neural Networks Replace Their Online Testing?; ; ;
in Empirical Software Engineering (2021), 26(5),
On Systematically Building a Controlled Natural Language for Functional Requirements; ; ; ;
in Empirical Software Engineering (2021), 26(4), 79
2020
Automated Demarcation of Requirements in Textual Specifications: A Machine Learning-Based Approach; ; ; ;
in Empirical Software Engineering (2020)
Automated Repair of Feature Interaction Failures in Automated Driving Systems; ; ; ;
in Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020) (2020, July)
Using Machine Learning to Assist with the Selection of Security Controls During Security Assessment; ; ; ; ;
in Empirical Software Engineering (2020), 25(4), 25502582
Trace-Checking Signal-based Temporal Properties: A Model-Driven Approach; ; ; ;
in Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE ’20) (2020, September)
Mining Assumptions for Software Components using Machine Learning; ; ; ;
in Proceedings of the The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2020)
Automating System Test Case Classification and Prioritization for Use Case-Driven Testing in Product Lines; ; ;
in Empirical Software Engineering (2020), 25(5), 37113769
SMRL: A Metamorphic Security Testing Tool for Web Systems; ; ;
in 2020 IEEE/ACM 42nd International Conference on Software Engineering (2020)
Metamorphic Security Testing for Web Systems; ; ;
in IEEE International Conference on Software Testing, Verification and Validation (ICST) 2020 (2020, March)
Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System Identification; ; ;
in Proceedings of the 42nd International Conference on Software Engineering (2020)
Dynamic Adaptation of Software-defined Networks for IoT Systems: A Search-based Approach; ; ; ; ;
in Proceedings of the 15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'20) (2020, May)
Automated Recommendation of Templates for Legal Requirements; ; ; ;
in Proceedings of the 28th IEEE International Requirements Engineering Conference (RE'20) (2020)
Practical Constraint Solving for Generating System Test Data; ;
in ACM Transactions on Software Engineering and Methodology (2020), 29(2), 111-1148
An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving; ; ;
in IEEE Transactions on Software Engineering (2020), 46(2), 163--195
An AI-assisted Approach for Checking the Completeness of Privacy Policies Against GDPR; ; ; ; ; ;
in in Proceedings of the 28th IEEE International Requirements Engineering Conference (RE’20) (2020, September)
Comparing Offline and Online Testing of Deep Neural Networks: An Autonomous Car Case Study; ; ;
in 2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST) (2020, August 05)
Leveraging Natural-language Requirements for Deriving Better Acceptance Criteria from Models; ; ; ; ;
in Proceedings of 23rd ACM / IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS) (2020, October)
Automatic Generation of Acceptance Test Cases from Use Case Specifications: an NLP-based Approach; ; ;
in IEEE Transactions on Software Engineering (2020)
2019
A Machine Learning-Based Approach for Demarcating Requirements in Textual Specifications; ; ; ;
in 27th IEEE International Requirements Engineering Conference (RE'19) (2019)
Bridging the Gap between Requirements Modeling and Behavior-driven Development; ; ; ;
in Proceedings of 22nd IEEE / ACM International Conference on Model Driven Engineering Languages and Systems (MODELS) (2019, September)
An experimental scrutiny of visual design modelling: VCL up against UML+OCL; ;
in Empirical Software Engineering (2019)
An Empirical Study on the Potential Usefulness of Domain Models for Completeness Checking of Requirements; ;
in Empirical Software Engineering (2019), 24(4), 25092539
An Active Learning Approach for Improving the Accuracy of Automated Domain Model Extraction; ; ;
in ACM Transactions on Software Engineering and Methodology (2019), 28(1),
Decision Support for Security-Control Identification Using Machine Learning; ; ; ; ;
in International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019 (2019)
A Model-driven Approach to Trace Checking of Temporal Properties with Aggregations; ;
in Journal of Object Technology (2019, July), 18(2), 151-21
Search-based Multi-Vulnerability Testing of XML Injections in Web Applications; ; ;
in Empirical Software Engineering (2019), 24(6), 36963729
Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications; ; ;
in IEEE Transactions on Software Engineering (2019), 45(4), 335-362
MCP: A Security Testing Tool Driven by Requirements; ; ;
in 2019 IEEE/ACM 41st International Conference on Software Engineering (2019, May)
Test Generation and Test Prioritization for Simulink Models with Dynamic Behavior; ; ;
in IEEE Transactions on Software Engineering (2019), 45(9), 919-944
Generating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Behaviors; ; ;
in Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE ’19), (2019, August)
Evaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models; ; ; ; ;
in Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) (2019)
A Query System for Extracting Requirements-related Information from Legal Texts; ; ; ; ;
in Proceedings of the 27th IEEE International Requirements Engineering Conference (RE'19), pp. 319-329 (2019)
Using Models to Enable Compliance Checking against the GDPR: An Experience Report; ; ; ; ;
in Proceedings of the IEEE / ACM 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS 19) (2019, September)
Oracles for Testing Software Timeliness with Uncertainty; ;
in ACM Transactions on Software Engineering and Methodology (2019), 28(1),
2018
A Machine Learning-Driven Evolutionary Approach for Testing Web Application Firewalls; ; ;
in IEEE Transactions on Reliability (2018), 67(3), 733-757
Software Engineering Research and Industry: A Symbiotic Relationship to Foster Impact; ; ; ; ;
in IEEE Software (2018), 35(5), 44-49
Testing Vision-Based Control Systems Using Learnable Evolutionary Algorithms; ; ;
in Proceedings of the 40th International Conference on Software Engineering (ICSE 2018) (2018)
Testing Autonomous Cars for Feature Interaction Failures using Many-Objective Search; ; ; ;
in Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2018) (2018)
Model-driven Run-time Enforcement of Complex Role-based Access Control Policies; ;
in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)
Model-Driven Trace Diagnostics for Pattern-based Temporal Specifications; ;
in Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (2018, October)
Enabling Model Testing of Cyber-Physical Systems; ; ; ;
in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)
Configuring use case models in product families; ; ;
in Software & Systems Modeling (2018), 17(3), 939-971
Change Impact Analysis for Evolving Configuration Decisions in Product Line Use Case Models; ; ;
in Journal of Systems and Software (2018), 139
Effective Fault Localization of Automotive Simulink Models: Achieving the Trade-Off between Test Oracle Effort and Fault Localization Accuracy; ; ;
in Empirical Software Engineering (2018), 24(1), 444-490
Modeling Security and Privacy Requirements: a Use Case-Driven Approach; ; ; ; ;
in Information and Software Technology (2018), 100
A Natural Language Programming Approach for Requirements-based Security Testing; ; ;
in 29th IEEE International Symposium on Software Reliability Engineering (ISSRE 2018) (2018)
A Search-based Approach for Accurate Identification of Log Message Formats; ; ; ;
in Proceedings of the 26th IEEE/ACM International Conference on Program Comprehension (ICPC ’18) (2018)
HITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems; ; ; ; ;
in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)
Test Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach; ; ; ;
in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18) (2018, July)
Automated Extraction of Semantic Legal Metadata Using Natural Language Processing; ; ; ;
in the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018 (2018, August)
Model-Based Simulation of Legal Policies: Framework, Tool Support, and Validation; ; ;
in Software & Systems Modeling (2018), 17(3), 851-883
Security Slicing for Auditing Common Injection Vulnerabilities; ; ;
in Journal of Systems and Software (2018), 137(March, 2018), 766-783
Automated Generation of Constraints from Use Case Specifications to Support System Testing; ;
in Proceedings of the 11th IEEE Conference on Software Testing, Validation and Verification (2018)
2017
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks; ;
in The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (2017, October 23)
Automated Extraction and Clustering of Requirements Glossary Terms; ; ;
in IEEE Transactions on Software Engineering (2017), 43(10), 918-945
The Case for Context-Driven Software Engineering Research; ; ; ;
in IEEE Software (2017), 34(5), 72-75
Augmenting Field Data for Testing Systems Subject to Incremental Requirements Changes; ;
in ACM Transactions on Software Engineering and Methodology (2017), 26(1), 1-40
TemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties; ;
in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)
A Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties; ;
in Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) (2017, September)
A Change Management Approach in Product Lines for Use Case-Driven Development and Testing; ;
in 23rd International Working Conference on Requirements Engineering: Foundation for software Quality (REFSQ 2017) (2017, March)
Incremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions; ; ;
in 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (2017, March)
A Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications; ; ;
in 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017 (2017)
Improving Fault Localization for Simulink Models using Search-Based Testing and Prediction Models; ; ;
in 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017)
Automated Testing of Hybrid Simulink/Stateflow Controllers: Industrial Case Studies; ;
in Proceedings of 11TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2017) (2017)
An Automated Framework for Detection and Resolution of Cross References in Legal Texts; ; ;
in Requirements Engineering (2017), 22(2), 215-237
Legal Markup Generation in the Large: An Experience Report; ; ; ; ; ;
in the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (2017, September)
From RELAW Research to Practice: Reflections on an Ongoing Technology Transfer Project; ;
in the IEEE 25th International Requirements Engineering Conference, Lisbon, Portugal, 4-8 September 2017 (2017, September)
Synthetic Data Generation for Statistical Testing; ;
in 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE'17) (2017)
JoanAudit: A Tool for Auditing Common Injection Vulnerabilities; ; ;
in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2017, September)
Search-driven String Constraint Solving for Vulnerability Detection; ; ;
in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)
System Testing of Timing Requirements based on Use Cases and Timed Automata; ;
in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 (2017, March 13)
2016
Extracting Domain Models from Natural-Language Requirements: Approach and Industrial Evaluation; ; ;
in 19th International Conference on Model Driven Engineering Languages and Systems, Saint-Malo 2-7 October 2016 (2016, October)
Testing Advanced Driver Assistance Systems using Multi-objective Search and Neural Networks; ; ;
in International Conference on Automated Software Engineering (ASE 2016) (2016)
GemRBAC-DSL: a High-level Specification Language for Role-based Access Control Policies; ;
in 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016) (2016, June)
A model-driven approach to representing and checking RBAC contextual policies.; ; ;
in Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016) (2016, March)
Testing the Untestable: Model Testing of Complex Software-Intensive Systems; ; ;
in Proceedings of the 38th International Conference on Software Engineering (ICSE 2016) Companion (2016, May)
SOFIA: An Automated Security Oracle for Black-Box Testing of SQL-Injection Vulnerabilities; ; ;
in Proceedings of the 31th IEEE/ACM International Conference on Automated Software Engineering (2016)
PUMConf: A Tool to Configure Product Specific Use Case and Domain Models in a Product Line; ; ;
in 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (2016, November)
Automated and Effective Testing of Web Services for XML Injection Attacks; ;
in ISSTA'16-The International Symposium on Software Testing and Analysis, Saarbrücken 18-20 July 2016 (2016, July 18)
Simulink Fault Localisation: an Iterative Statistical Debugging Approach; ; ; ;
in Software Testing, Verification & Reliability (2016), 26(6), 431-459
Localizing Multiple Faults in Simulink Models.; ; ; ;
in 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (2016)
SimCoTest: A Test Suite Generation Tool for Simulink/Stateflow Controllers; ; ;
in Proceedings of the 38th International Conference on Software Engineering (2016)
Automated Test Suite Generation for Time-Continuous Simulink Models; ; ;
in Proceedings of the 38th International Conference on Software Engineering (2016)
Automated Change Impact Analysis between SysML Models of Requirements and Design; ; ; ;
in 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Seattle 13-18 November 2016 (2016)
Clustering Deviations for Black Box Regression Testing of Database Applications;
in IEEE Transactions on Reliability (2016), 65(1), 4-18
Cost-effective Strategies for the Regression Testing of Database Applications: Case study and Lessons Learned;
in Journal of Systems and Software (2016), 113
Automated Classification of Legal Cross References Based on Semantic Intent; ; ;
in 22nd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'16) (2016, March)
Model-Based Simulation of Legal Requirements: Experience from Tax Policy Simulation; ;
in 24th IEEE International Conference on Requirements Engineering (RE'16) (2016)
2015
Behind an Application Firewall, Are We Safe from SQL Injection Attacks?; ;
in 2015 IEEE 8th International Conference on Software Testing, Verification, and Validation (ICST) (2015)
Automated Checking of Conformance to Requirements Templates using Natural Language Processing; ; ;
in IEEE Transactions on Software Engineering (2015), 41(10), 944-968
NARCIA: An Automated Tool for Change Impact Analysis in Natural Language Requirements; ; ; ;
in 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Bergamo 30 August - 4 September 2015 (2015, September)
Change Impact Analysis for Natural Language Requirements: An NLP Approach; ; ; ;
in 23rd IEEE International Requirements Engineering Conference, Ottawa 24-28 August 2015 (2015, August)
A Comprehensive Modeling Framework for Role-based Access Control Policies; ;
in Journal of Systems and Software (2015), 107(September,2015), 110-126
Combining Genetic Algorithms and Constraint Programming to Support Stress Testing of Task Deadlines; ; ;
in ACM Transactions on Software Engineering and Methodology (2015), 25(1),
Coverage-based regression test case selection, minimization and prioritization: a case study on an industrial system; ; ;
in Software Testing, Verification & Reliability (2015), 25(4), 371-396
Evolutionary Robustness Testing of Data Processing Systems using Models and Data Mutation; ; ;
in Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering (2015, November)
Generating Complex and Faulty Test Data Through Model-Based Mutation Analysis; ;
in Software Testing, Verification and Validation (ICST), 2015 IEEE Eighth International Conference on (2015, April)
Applying Product Line Use Case Modeling in an Industrial Automotive Embedded System: Lessons Learned and a Refined Approach; ; ;
in 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS), September 30 - October 2, 2015, Ottawa, ON, Canada (2015, October 03)
Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems; ;
in The 2015 IEEE International Conference on Software Quality, Reliability & Security, Vancouver 3-5 August 2015 (2015, August 03)
Automated Inference of Access Control Policies for Web Applications; ; ;
in 20th ACM Symposium on Access Control Models and Technologies (SACMAT), 1-3 June 2015 (2015, June)
Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers; ; ;
in Proceedings of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2015)
Search-Based Automated Testing of Continuous Controllers: Framework, Tool Support, and Case Studies; ; ; ;
in Information and Software Technology (2015), 57
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning; ;
in IEEE Transactions on Dependable and Secure Computing (2015), 12(6), 688-707
A Model-Based Framework for Probabilistic Simulation of Legal Policies; ; ;
in 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS'15) (2015)
Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities; ;
in 26th IEEE International Symposium on Software Reliability Engineering (2015)
UMTG: A Toolset to Automatically Generate System Test Cases from Use Case Specifications; ; ; ;
in 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Bergamo 30 August - 4 September 2015 (2015, September)
Automatic Generation of System Test Cases from Use Case Specifications; ; ; ;
in Proceedings of the International Symposium on Software Testing and Analysis (ISSTA' 15), July 2015, USA (2015, July)
aToucan: An Automated Framework to Derive UML Analysis Models from Use Case Models; ;
in ACM Transactions on Software Engineering and Methodology (2015), 24(3),
2014
Automated Detection and Resolution of Legal Cross References: Approach and a Study of Luxembourg's Legislation; ;
in 22nd IEEE International Requirements Engineering Conference (2014, August 25)
Automated Testing for SQL Injection Vulnerabilities: An Input Mutation Approach; ; ;
in Proc. of the International Symposium on Software Testing and Analysis 2014 (2014, July 21)
On the Effectiveness of Contracts as Test Oracles in the Detection and Diagnosis of Functional Faults in Concurrent Object- Oriented Software; ;
in IEEE Transactions on Software Engineering (2014), 40(10), 971-992
Improving Requirements Glossary Construction via Clustering: Approach and Industrial Case Studies; ; ;
in 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2014) (2014, September)
Requirement Boilerplates: Transition From Manually-Enforced to Automatically-Verifiable Natural Language Patterns; ; ;
in Requirements Patterns (RePa), 2014 IEEE 4th International Workshop on (2014, August)
Architecture-Level Configuration of Large-Scale Embedded Software Systems; ;
in ACM Transactions on Software Engineering and Methodology (2014), 23(3),
Traceability and SysML Design Slices to Support Safety Inspections: A Controlled Experiment; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2014), 23(1),
Worst-case Scheduling of Software Tasks: A Constraint Optimization Model to Support Performance Testing; ; ;
in International Conference on Principles and Practice of Constraint Programming (2014, September)
Revisiting Model-driven Engineering for Run-time Verification of Business Processes; ;
in Proceedings of the 8th System Analysis and Modeling Conference (SAM 2014) (2014, September)
OCLR: a More Expressive, Pattern-based Temporal Extension of OCL; ;
in Proceedings of the 2014 European Conference on Modelling Foundations and Applications (ECMFA 2014) (2014, July)
Empirical Evaluations on the Cost-Effectiveness of State-Based Testing: An Industrial Case Study; ;
in Information and Software Technology (2014), 56(8), 890910
Applying UML/MARTE on industrial projects: challenges, experiences, and guidelines; ; ;
in Software & Systems Modeling (2014)
MiL Testing of Highly Configurable Continuous Controllers: Scalable Search Using Surrogate Models; ; ;
in International Conference on Automated Software Engineering (ASE 2014) (2014, September)
CoCoTest: A Tool for Model-in-the-Loop Testing of Continuous Controller; ; ;
in International Conference on Automated Software Engineering (ASE 2014) (2014, September)
An Extended Systematic Literature Review on Provision of Evidence for Safety Certification; ; ;
in Information and Software Technology (2014), 56(7), 689717
Identifying Optimal Trade-Offs between CPU Time Usage and Temporal Constraints Using Search;
in International Symposium on Software Testing and Analysis (ISSTA 2014) (2014, July)
Model-Based Testing of Obligations; ; ;
in 14th Annual International Conference on Quality Software (QSIC) (2014)
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law; ; ; ;
in 17th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS'14) (2014)
2013
Generating Test Data from OCL Constraints with Search Techniques; ; ;
in IEEE Transactions on Software Engineering (2013), 39(10),
Assessing Quality and Effort of Applying Aspect State Machines for Robustness Testing: A Controlled Experiment; ;
in IEEE International Conference on Software Testing, Verification, and Validation, Luxembourg (2013)
Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing; ;
in Springer LNCS series (2013)
Automatic Checking of Conformance to Requirement Boilerplates via Text Chunking: An Industrial Case Study; ; ; ;
in 7th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2013) (2013, October)
RUBRIC: A Flexible Tool for Automated Checking of Conformance to Requirement Boilerplates; ; ; ;
in 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2013) (2013, August)
SimPL: A Product-Line Modeling Methodology for Families of Integrated Control Systems; ; ;
in Information and Software Technology (2013), 55(3),
A Multi-Objective Genetic Algorithm to Rank State-Based Test Cases; ;
in 5th Symposium on Search-Based Software Engineering (SSBSE 2013), Springer Lecture Notes in Computer Science (2013)
A Scalable Approach for Malware Detection through Bounded Feature Space Behavior Modeling; ; ; ;
in IEEE/ACM Automated Software Engineering (ASE) (2013)
Stress Testing of Task Deadlines: A Constraint Programming Approach; ; ;
in The 24th IEEE International Symposium on Software Reliability Engineering (ISSRE 2013), Pasadena, CA, November 2013 (2013)
Model Based Test Validation and Oracles for Data Acquisition Systems; ; ; ; ;
in IEEE/ACM International Conference on Automated Software Engineering (2013, November)
Coverage-Based Test Case Prioritisation: An Industrial Case Study; ; ;
in IEEE International Conference on Software Testing, Verification and Validation (ICST) (2013, March)
VPML: an approach to detect design patterns of MOF-based modeling languages; ;
in Software & Systems Modeling (2013)
Environment Modeling and Simulation for Automated Testing of Soft Real-Time Embedded Software; ;
in Software & Systems Modeling (2013)
Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Program Analysis; ;
in ACM/IEEE International Conference on Software Engineering, San Fransisco, USA (2013)
Automated Model-in-the-Loop Testing of Continuous Controllers using Search; ; ; ;
in 5th Symposium on Search-Based Software Engineering (SSBSE 2013), Springer Lecture Notes in Computer Science (2013, August)
Classification, structuring, and assessment of evidence for safety: A systematic literature review; ; ;
in International Conference on Software Testing, Verification, and Validation, Luxembourg 2013 (2013)
Minimizing CPU Time Shortage Risks in Integrated Embedded Software; ; ; ; ;
in 28th IEEE/ACM International Conference on Automated Software Engineering (2013)
Supporting the Verification of Compliance to Safety Standards via Model-Driven Engineering: Approach, Tool-Support and Empirical Validation; ;
in Information and Software Technology (2013), 55(1), 836-864
A Goal-Based Approach for Qualification of New Technologies: Foundations, Tool Support, and Industrial Validation; ; ;
in Reliability Engineering & System Safety (2013), 119
2012
Does aspect-oriented modeling help improve the readability of UML state machines?; ;
in Software & Systems Modeling (2012)
A Product Line Modeling and Configuration Methodology to Support Model-based Testing: An Industrial Case Study; ; ;
in ACM/IEEE 15th International Conference on Model Driven Engineering Languages & Systems (2012)
Formal Analysis of the Probability of Interaction Fault Detection Using Random Testing;
in IEEE Transactions on Software Engineering (2012), 38(5), 1088-1099
A Hitchhiker's guide to statistical tests for assessing randomized algorithms in software engineering;
in Software Testing : Verification & Reliability (2012)
Model-Based Automated and Guided Configuration of Embedded Software Systems; ; ; ;
in European Conference on Modeling Foundations and Applications (2012)
A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data; ;
in ACM/IEEE 15th International Conference on Model Driven Engineering Languages & Systems (2012)
Research-Based Innovation: A Tale of Three Projects in Model-Driven Engineering; ; ; ;
in 15th ACM/IEEE International Conference Model Driven Engineering Languages and Systems (2012)
Testing Deadline Misses for Real-Time Systems Using Constraint Optimization Techniques; ; ;
in CSTVA 2012 (2012)
Planning for Safety Standards Compliance: A Model-Based Tool-Supported Approach; ; ; ; ;
in IEEE Software (2012), 29(3), 64-70
State-Based Testing: Industrial Evaluation of the Cost-Effectiveness of Round-Trip Path and Sneak-Path Strategies; ; ;
in IEEE International Symposium on Software Reliability Engineering (2012)
Experiences of applying UML/MARTE on three industrial projects; ; ;
in ACM/IEEE 15th International Conference on Model Driven Engineering Languages & Systems (2012)
Combining Search-based and Adaptive Random Testing Strategies for Environment Model-based Testing of Real-time Embedded Systems; ;
in 4th Symposium on Search Based Software Engineering (2012)
Empirical Investigation of Search Algorithms for Environment Model-Based Testing of Real-Time Embedded Software; ;
in ACM International Symposium on Software Testing and Analysis (2012)
Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing; ; ;
in 15th ACM/IEEE International Conference on Model Driven Engineering Languages & Systems (2012)
Undated
Mutation Analysis for Cyber-Physical Systems: Scalable Solutions and Results in the Space Domain; ;
in IEEE Transactions on Software Engineering (n.d.)













