Högskolan i Skövde

his.sePublications
Change search
Link to record
Permanent link

Direct link
Lindström, BirgittaORCID iD iconorcid.org/0000-0002-1039-5830
Publications (10 of 34) Show all publications
Atif, Y., Al-Falahi, K., Wangchuk, T. & Lindström, B. (2020). A fuzzy logic approach to influence maximization in social networks. Journal of Ambient Intelligence and Humanized Computing, 11(6), 2435-2451
Open this publication in new window or tab >>A fuzzy logic approach to influence maximization in social networks
2020 (English)In: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145, Vol. 11, no 6, p. 2435-2451Article in journal (Refereed) Published
Abstract [en]

Within a community, social relationships are paramount to profile individuals’ conduct. For instance, an individual within a social network might be compelled to embrace a behaviour that his/her companion has recently adopted. Such social attitude is labelled social influence, which assesses the extent by which an individual’s social neighbourhood adopt that individual’s behaviour. We suggest an original approach to influence maximization using a fuzzy-logic based model, which combines influence-weights associated with historical logs of the social network users, and their favourable location in the network. Our approach uses a two-phases process to maximise influence diffusion. First, we harness the complexity of the problem by partitioning the network into significantly-enriched community-structures, which we then use as modules to locate the most influential nodes across the entire network. These key users are determined relatively to a fuzzy-logic based technique that identifies the most influential users, out of which the seed-set candidates to diffuse a behaviour or an innovation are extracted following the allocated budget for the influence campaign. This way to deal with influence propagation in social networks, is different from previous models, which do not compare structural and behavioural attributes among members of the network. The performance results show the validity of the proposed partitioning-approach of a social network into communities, and its contribution to “activate” a higher number of nodes overall. Our experimental study involves both empirical and real contemporary social-networks, whereby a smaller seed set of key users, is shown to scale influence to the high-end compared to some renowned techniques, which employ a larger seed set of key users and yet they influence less nodes in the social network.

Place, publisher, year, edition, pages
Springer, 2020
Keywords
Social networks, Community detection, Influence propagation, Fuzzy logic
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-16779 (URN)10.1007/s12652-019-01286-2 (DOI)000536462400019 ()2-s2.0-85064252809 (Scopus ID)
Available from: 2019-04-15 Created: 2019-04-15 Last updated: 2020-06-29Bibliographically approved
Lindström, B., Offutt, J., Baral, K. & Márki, A. (2020). Message from the TestEd 2020 Chairs. In: 2020 IEEE 13th International Conference on Software Testing, Verification and Validation Workshops: 23–27 March 2020 Porto, Portugal. Paper presented at 2020 IEEE 13th International Conference on Software Testing, Verification and Validation Workshops, 23–27 March 2020 Porto, Portugal. IEEE, Article ID 9155714.
Open this publication in new window or tab >>Message from the TestEd 2020 Chairs
2020 (English)In: 2020 IEEE 13th International Conference on Software Testing, Verification and Validation Workshops: 23–27 March 2020 Porto, Portugal, IEEE, 2020, article id 9155714Conference paper, Published paper (Other academic)
Place, publisher, year, edition, pages
IEEE, 2020
National Category
Software Engineering
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-19159 (URN)10.1109/ICSTW50294.2020.00016 (DOI)2-s2.0-85091756245 (Scopus ID)978-1-7281-1075-2 (ISBN)978-1-7281-1076-9 (ISBN)
Conference
2020 IEEE 13th International Conference on Software Testing, Verification and Validation Workshops, 23–27 March 2020 Porto, Portugal
Note

Editorial

Available from: 2020-12-29 Created: 2020-12-29 Last updated: 2021-03-31Bibliographically approved
Saadatmand, M., Lindström, B. & Aichernig, B. K. (2020). Special issue on testing extra-functional properties. Software testing, verification & reliability, 30(1), Article ID e1726.
Open this publication in new window or tab >>Special issue on testing extra-functional properties
2020 (English)In: Software testing, verification & reliability, ISSN 0960-0833, E-ISSN 1099-1689, Vol. 30, no 1, article id e1726Article in journal, Editorial material (Other academic) Published
Place, publisher, year, edition, pages
John Wiley & Sons, 2020
Keywords
software testing, software quality, non-functional testing, extra-functional testing
National Category
Computer Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-18043 (URN)10.1002/stvr.1726 (DOI)000500884100001 ()2-s2.0-85076416207 (Scopus ID)
Note

2 pages

Available from: 2019-12-30 Created: 2019-12-30 Last updated: 2020-01-02Bibliographically approved
Lindström, B. & Márki, A. (2019). On strong mutation and the theory of subsuming logic‐based mutants. Software testing, verification & reliability, 29(1-2 Special Issue: SI), 1-23, Article ID e1667.
Open this publication in new window or tab >>On strong mutation and the theory of subsuming logic‐based mutants
2019 (English)In: Software testing, verification & reliability, ISSN 0960-0833, E-ISSN 1099-1689, Vol. 29, no 1-2 Special Issue: SI, p. 1-23, article id e1667Article in journal (Refereed) Published
Abstract [en]

Redundant mutants might cause problems when benchmarking since testing techniques can get high scores without detecting any nonredundant mutants. However, removing nonredundant mutants might cause similar problems. Subsumed mutants are per definition also redundant since no additional tests are required to detect them once all other mutants are detected. We focus on relational operator replacement (ROR) and conditional operator replacement mutants. Subsumption relations between ROR mutants are defined by fault hierarchies. The fault hierarchies are proven for weak mutation but have since they were published been used with strong mutation. We prove that ROR fault hierarchies do not hold for strong mutation and show why. We also show that the probability for a random test to experience the problem can be more than 30% and that 50% of the mutants might be affected in a real software system. Finally, we show that there is a similar problem with the theory on sufficient conditional operator replacement.

Place, publisher, year, edition, pages
John Wiley & Sons, 2019
Keywords
error propagation, mutant subsumption, mutation testing, redundant mutants
National Category
Computer Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-15090 (URN)10.1002/stvr.1667 (DOI)000458911000003 ()2-s2.0-85045856317 (Scopus ID)
Projects
TOCSYC
Funder
Knowledge Foundation, 20130085
Available from: 2018-04-21 Created: 2018-04-21 Last updated: 2024-06-03Bibliographically approved
Offutt, J., Lindström, B. & Baral, K. (2019). Teaching an International Distributed Discussion-Based Course. In: Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti, Quoc-Nam Tran (Ed.), Proceedings of the 2019 International Conference on Frontiers in Education: Computer Science & Computer Engineering (FECS'19). Paper presented at The 15th Int'l Conf on Frontiers in Education: Computer Science & Computer Engineering (FECS'19). Las Vegas, USA, 29 July - 1 August, 2019 (pp. 149-154). CSREA, Computer Science Research, Education, and Applications Press
Open this publication in new window or tab >>Teaching an International Distributed Discussion-Based Course
2019 (English)In: Proceedings of the 2019 International Conference on Frontiers in Education: Computer Science & Computer Engineering (FECS'19) / [ed] Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti, Quoc-Nam Tran, CSREA, Computer Science Research, Education, and Applications Press , 2019, p. 149-154Conference paper, Published paper (Refereed)
Abstract [en]

Small discussion-based courses pose several challenges. Low enrollments make the course difficult to justify and can restrict active discussions. Impromptu discussions are hard to encourage. Students come to class tired, not well prepared, reluctant to speak out, or not able to verbalize abstract thoughts fast enough to fully engage. Sometimes a few students dominate the discussions while other students stay silent. This paper describes a novel teaching model that was created to allow one professor to teach the same course at multiple universities. As the course design emerged, the asynchronous online distributed nature of the course turned out to not only solve the initial problem, but also other challenges of discussion-based courses. Instructors and students found this model led to more engagement, increased learning, and higher performance.

Place, publisher, year, edition, pages
CSREA, Computer Science Research, Education, and Applications Press, 2019
Keywords
experiment, teaching methodology, teaching applied research, teaching software engineering experiment
National Category
Computer Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-18044 (URN)1-60132-498-7 (ISBN)
Conference
The 15th Int'l Conf on Frontiers in Education: Computer Science & Computer Engineering (FECS'19). Las Vegas, USA, 29 July - 1 August, 2019
Available from: 2019-12-30 Created: 2019-12-30 Last updated: 2020-01-29Bibliographically approved
Jiang, Y., Ding, J., Atif, Y., Jeusfeld, M., Andler, S., Lindström, B., . . . Haglund, D. (2018). Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project. Skövde: University of Skövde
Open this publication in new window or tab >>Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 22
Series
IIT Technical Reports ; HS-IIT-TR-18-003
Keywords
Dependencies, Interdependencies, Modelling and Simulation, Influence Factors
National Category
Computer and Information Sciences Embedded Systems
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-15114 (URN)
Projects
ELVIRA
Note

HS-IIT-TR-18-003 This is a technical report related to the ELVIRA project www.his.se/elvira

Available from: 2018-05-02 Created: 2018-05-02 Last updated: 2022-12-30Bibliographically approved
Atif, Y., Jiang, Y., Jeusfeld, M. A., Ding, J., Lindström, B., Andler, S. F., . . . Lindström, B. (2018). Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project. Skövde: University of Skövde
Open this publication in new window or tab >>Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 18
Series
IIT Technical Reports ; HS-IIT-TR-18-004
Keywords
vulnerability analysis, cyber-threats, cyberphysical systems, clustering, multiagent systems
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-16092 (URN)
Projects
This research has been supported in part by the EU ISF Project A431.678/2016 ELVIRA (Threat modeling and resilience of critical infrastructures), coordinated by Polismyndigheten/Sweden
Note

I publikationen: HS-IIT-18-004

Available from: 2018-08-29 Created: 2018-08-29 Last updated: 2023-01-02Bibliographically approved
Lindström, B., Offutt, J., González-Hernández, L. & Andler, S. F. (2018). Identifying Useful Mutants to Test Time Properties. In: 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW): . Paper presented at 2018 IEEE 11th International Conference on Software Testing, Verification and Validation Workshops, 9–13 April 2018, Västerås, Sweden (pp. 69-76). IEEE Computer Society
Open this publication in new window or tab >>Identifying Useful Mutants to Test Time Properties
2018 (English)In: 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), IEEE Computer Society, 2018, p. 69-76Conference paper, Published paper (Refereed)
Abstract [en]

Real-time systems have to be verified and tested for timely behavior as well as functional behavior. Thus, time is an extra dimension that adds to the complexity of software testing. A timed automata model with a model-checker can be used to generate timed test traces. To properly test the timely behavior, the set of test traces should challenge the different time constraints in the model. This paper describes and adapts mutation operators that target such time constraints in timed automata models. Time mutation operators apply a delta to the time constraints to help testers design tests that exceed the time constraints. We suggest that the size of this delta determines how easy the mutant is to kill and that the optimal delta varies by the program, mutation operator, and the individual mutant. To avoid trivial and equivalent time mutants, the delta should be set individually for each mutant. We discuss mutant subsumption and define the problem of finding dominator mutants in this new domain. In this position paper, we outline an iterative tuning process where a statistical model-checker, UPPAAL SMC, is used to: (i) create a tuned set of dominator time mutants, and (ii) generate test traces that kill the mutants.

Place, publisher, year, edition, pages
IEEE Computer Society, 2018
Keywords
mutation testing, model-based testing, mutant subsumption, real-time systems, embedded systems
National Category
Computer Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-16049 (URN)10.1109/ICSTW.2018.00030 (DOI)000492760300010 ()2-s2.0-85050973857 (Scopus ID)978-1-5386-6352-3 (ISBN)978-1-5386-6353-0 (ISBN)
Conference
2018 IEEE 11th International Conference on Software Testing, Verification and Validation Workshops, 9–13 April 2018, Västerås, Sweden
Projects
TOCSYC
Funder
Knowledge Foundation, 20130085
Available from: 2018-08-13 Created: 2018-08-13 Last updated: 2019-12-19Bibliographically approved
Atif, Y., Jiang, Y., Lindström, B., Ding, J., Jeusfeld, M., Andler, S., . . . Haglund, D. (2018). Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project. Skövde: University of Skövde
Open this publication in new window or tab >>Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 16
Series
IIT Technical Reports ; HS-IIT-TR-18-002
Keywords
Smart grid security, Agent model, Multi-agent system
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-15111 (URN)
Projects
Elvira project funded by EU Internal Security Fund (ISF) A431.678-2016
Note

HS-IIT-TR-18-002

Available from: 2018-05-02 Created: 2018-05-02 Last updated: 2022-12-30Bibliographically approved
González-Hernández, L., Lindström, B., Offutt, J., Andler, S. F., Potena, P. & Bohlin, M. (2018). Using Mutant Stubbornness to Create Minimal and Prioritized Test Sets. In: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS): . Paper presented at 2018 IEEE 18th International Conference on Software Quality, Reliability, and Security (QRS 2018), 16–20 July 2018, Lisbon, Portugal (pp. 446-457). IEEE Computer Society
Open this publication in new window or tab >>Using Mutant Stubbornness to Create Minimal and Prioritized Test Sets
Show others...
2018 (English)In: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), IEEE Computer Society, 2018, p. 446-457Conference paper, Published paper (Refereed)
Abstract [en]

In testing, engineers want to run the most useful tests early (prioritization). When tests are run hundreds or thousands of times, minimizing a test set can result in significant savings (minimization). This paper proposes a new analysis technique to address both the minimal test set and the test case prioritization problems. This paper precisely defines the concept of mutant stubbornness, which is the basis for our analysis technique. We empirically compare our technique with other test case minimization and prioritization techniques in terms of the size of the minimized test sets and how quickly mutants are killed. We used seven C language subjects from the Siemens Repository, specifically the test sets and the killing matrices from a previous study. We used 30 different orders for each set and ran every technique 100 times over each set. Results show that our analysis technique performed significantly better than prior techniques for creating minimal test sets and was able to establish new bounds for all cases. Also, our analysis technique killed mutants as fast or faster than prior techniques. These results indicate that our mutant stubbornness technique constructs test sets that are both minimal in size, and prioritized effectively, as well or better than other techniques.

Place, publisher, year, edition, pages
IEEE Computer Society, 2018
Keywords
Test Case Minimization, Minimal Sets, Test Case Prioritization, Mutant Stubbornness
National Category
Computer Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-16050 (URN)10.1109/QRS.2018.00058 (DOI)000587579900045 ()2-s2.0-85052313827 (Scopus ID)978-1-5386-7757-5 (ISBN)978-1-5386-7758-2 (ISBN)
Conference
2018 IEEE 18th International Conference on Software Quality, Reliability, and Security (QRS 2018), 16–20 July 2018, Lisbon, Portugal
Projects
TOCSYC
Funder
Knowledge Foundation, 20130085
Available from: 2018-08-13 Created: 2018-08-13 Last updated: 2024-05-20Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-1039-5830

Search in DiVA

Show all publications