Högskolan i Skövde

his.sePublications
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 62) Show all publications
Ferrari, F. C., Durelli, V. H. S., Andler, S. F., Offutt, J., Saadatmand, M. & Müllner, N. (2023). On transforming model-based tests into code: A systematic literature review. Software testing, verification & reliability, 33(8), Article ID e1860.
Open this publication in new window or tab >>On transforming model-based tests into code: A systematic literature review
Show others...
2023 (English)In: Software testing, verification & reliability, ISSN 0960-0833, E-ISSN 1099-1689, Vol. 33, no 8, article id e1860Article, review/survey (Refereed) Published
Abstract [en]

Model-based test design is increasingly being applied in practice and studied in research. Model-based testing (MBT) exploits abstract models of the software behaviour to generate abstract tests, which are then transformed into concrete tests ready to run on the code. Given that abstract tests are designed to cover models but are run on code (after transformation), the effectiveness of MBT is dependent on whether model coverage also ensures coverage of key functional code. In this article, we investigate how MBT approaches generate tests from model specifications and how the coverage of tests designed strictly based on the model translates to code coverage. We used snowballing to conduct a systematic literature review. We started with three primary studies, which we refer to as the initial seeds. At the end of our search iterations, we analysed 30 studies that helped answer our research questions. More specifically, this article characterizes how test sets generated at the model level are mapped and applied to the source code level, discusses how tests are generated from the model specifications, analyses how the test coverage of models relates to the test coverage of the code when the same test set is executed and identifies the technologies and software development tasks that are on focus in the selected studies. Finally, we identify common characteristics and limitations that impact the research and practice of MBT: (i) some studies did not fully describe how tools transform abstract tests into concrete tests, (ii) some studies overlooked the computational cost of model-based approaches and (iii) some studies found evidence that bears out a robust correlation between decision coverage at the model level and branch coverage at the code level. We also noted that most primary studies omitted essential details about the experiments. 

Place, publisher, year, edition, pages
John Wiley & Sons, 2023
Keywords
model-based testing, systematic literature review, test case generation, test case transformation, test coverage criteria, Abstracting, Codes (symbols), Concretes, Model checking, Software design, Specifications, Model based testing, Model specifications, Model-based test, Test case, Test sets, Test-coverage, Software testing
National Category
Software Engineering
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-23214 (URN)10.1002/stvr.1860 (DOI)001059676500001 ()2-s2.0-85169886627 (Scopus ID)
Funder
Knowledge Foundation, 20130085
Note

© 2023 John Wiley & Sons Ltd.

Correspondence: Fabiano C. Ferrari, Rodovia Washington Luis, Km 235, São Carlos, São Paulo - Brazil.Email: fcferrari@ufscar.br

Fabiano Ferrari was partly supported by the Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP) - Brasil, grant #2016/21251-0 and CNPq - Brasil, grants #306310/2016-3 and #312086/2021-0. Sten Andler was partly supported by KKS (The Knowledge Foundation), by project 20130085, Testing of Critical System Characteristics (TOCSYC). Mehrdad Saadatmand was partly funded by the SmartDelta Project (more information available at https://smartdelta.org/).

Available from: 2023-09-14 Created: 2023-09-14 Last updated: 2023-12-14Bibliographically approved
Johansson, R., Karlsson, A., Andler, S. F., Brohede, M., van Laere, J., Klingegård (Nilsson), M. & Ziemke, T. (2022). On the Definition and Scope of Information Fusion as a Field of Research. ISIF Perspectives on Information Fusion, 5(1), 3-12
Open this publication in new window or tab >>On the Definition and Scope of Information Fusion as a Field of Research
Show others...
2022 (English)In: ISIF Perspectives on Information Fusion, ISSN 2831-4824, Vol. 5, no 1, p. 3-12Article in journal (Refereed) Published
Abstract [en]

A definition of information fusion (IF) as a field of research can benefit researchers within the field, who may use such a definition when motivating their own work and evaluating the contributions of others. Moreover, it can enable researchers and practitioners outside the field to more easily relate their own work to the field and more easily understand the scope of IF techniques and methods. Based on strengths and weaknesses of existing definitions, a definition is proposed that is argued to effectively fulfill the requirements that can be put on a definition of IF as a field of research. Although the proposed definition aims to be precise, it does not fully capture the richness and versatility of the IF field. To address that limitation, we highlight some topics to explore the scope of IF, covering the systems perspective of IF and its relation to ma-chine learning, optimization, robot behavior, opinion aggregation, and databases.

Place, publisher, year, edition, pages
International Society of Information Fusion (ISIF), 2022
National Category
Computer Sciences Robotics Information Systems
Research subject
Skövde Artificial Intelligence Lab (SAIL); Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-21740 (URN)
Note

Abstracting is permitted with credit to the source. For all other copying, reprint, or republication permissions, contact the Administrative Editor. Copyright© 2022 ISIF, Inc.

Available from: 2022-08-30 Created: 2022-08-30 Last updated: 2023-09-25Bibliographically approved
Atif, Y., Kharrazi, S., Ding, J. & Andler, S. F. (2020). Internet of Things data analytics for parking availability prediction and guidance. European transactions on telecommunications, 31, Article ID e3862.
Open this publication in new window or tab >>Internet of Things data analytics for parking availability prediction and guidance
2020 (English)In: European transactions on telecommunications, ISSN 1124-318X, E-ISSN 2161-3915, Vol. 31, article id e3862Article in journal (Refereed) Published
Abstract [en]

Cutting-edge sensors and devices are increasingly deployed within urban areas to make-up the fabric of transmission control protocol/internet protocol con- nectivity driven by Internet of Things (IoT). This immersion into physical urban environments creates new data streams, which could be exploited to deliver novel cloud-based services. Connected vehicles and road-infrastructure data are leveraged in this article to build applications that alleviate notorious parking and induced traffic-congestion issues. To optimize the utility of parking lots, our proposed SmartPark algorithm employs a discrete Markov-chain model to demystify the future state of a parking lot, by the time a vehicle is expected to reach it. The algorithm features three modular sections. First, a search pro- cess is triggered to identify the expected arrival-time periods to all parking lots in the targeted central business district (CBD) area. This process utilizes smart-pole data streams reporting congestion rates across parking area junc- tions. Then, a predictive analytics phase uses consolidated historical data about past parking dynamics to infer a state-transition matrix, showing the transfor- mation of available spots in a parking lot over short periods of time. Finally, this matrix is projected against similar future seasonal periods to figure out the actual vacancy-expectation of a lot. The performance evaluation over an actual busy CBD area in Stockholm (Sweden) shows increased scalability capa- bilities, when further parking resources are made available, compared to a baseline case algorithm. Using standard urban-mobility simulation packages, the traffic-congestion-aware SmartPark is also shown to minimize the journey duration to the selected parking lot while maximizing the chances to find an available spot at the selected lot.

Place, publisher, year, edition, pages
Wiley-Blackwell Publishing Inc., 2020
Keywords
smart parking, stochastic model, markov chain, internet of things, sumo, data analytics, autonomous cars
National Category
Transport Systems and Logistics Computer and Information Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-18081 (URN)10.1002/ett.3862 (DOI)000506093200001 ()2-s2.0-85078033422 (Scopus ID)
Projects
SmartPark
Funder
Vinnova, 2017-03028
Available from: 2020-01-10 Created: 2020-01-10 Last updated: 2020-05-20Bibliographically approved
Jiang, Y., Ding, J., Atif, Y., Jeusfeld, M., Andler, S., Lindström, B., . . . Haglund, D. (2018). Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project. Skövde: University of Skövde
Open this publication in new window or tab >>Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 22
Series
IIT Technical Reports ; HS-IIT-TR-18-003
Keywords
Dependencies, Interdependencies, Modelling and Simulation, Influence Factors
National Category
Computer and Information Sciences Embedded Systems
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-15114 (URN)
Projects
ELVIRA
Note

HS-IIT-TR-18-003 This is a technical report related to the ELVIRA project www.his.se/elvira

Available from: 2018-05-02 Created: 2018-05-02 Last updated: 2022-12-30Bibliographically approved
Atif, Y., Jiang, Y., Jeusfeld, M. A., Ding, J., Lindström, B., Andler, S. F., . . . Lindström, B. (2018). Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project. Skövde: University of Skövde
Open this publication in new window or tab >>Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 18
Series
IIT Technical Reports ; HS-IIT-TR-18-004
Keywords
vulnerability analysis, cyber-threats, cyberphysical systems, clustering, multiagent systems
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-16092 (URN)
Projects
This research has been supported in part by the EU ISF Project A431.678/2016 ELVIRA (Threat modeling and resilience of critical infrastructures), coordinated by Polismyndigheten/Sweden
Note

I publikationen: HS-IIT-18-004

Available from: 2018-08-29 Created: 2018-08-29 Last updated: 2023-01-02Bibliographically approved
Lindström, B., Offutt, J., González-Hernández, L. & Andler, S. F. (2018). Identifying Useful Mutants to Test Time Properties. In: 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW): . Paper presented at 2018 IEEE 11th International Conference on Software Testing, Verification and Validation Workshops, 9–13 April 2018, Västerås, Sweden (pp. 69-76). IEEE Computer Society
Open this publication in new window or tab >>Identifying Useful Mutants to Test Time Properties
2018 (English)In: 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), IEEE Computer Society, 2018, p. 69-76Conference paper, Published paper (Refereed)
Abstract [en]

Real-time systems have to be verified and tested for timely behavior as well as functional behavior. Thus, time is an extra dimension that adds to the complexity of software testing. A timed automata model with a model-checker can be used to generate timed test traces. To properly test the timely behavior, the set of test traces should challenge the different time constraints in the model. This paper describes and adapts mutation operators that target such time constraints in timed automata models. Time mutation operators apply a delta to the time constraints to help testers design tests that exceed the time constraints. We suggest that the size of this delta determines how easy the mutant is to kill and that the optimal delta varies by the program, mutation operator, and the individual mutant. To avoid trivial and equivalent time mutants, the delta should be set individually for each mutant. We discuss mutant subsumption and define the problem of finding dominator mutants in this new domain. In this position paper, we outline an iterative tuning process where a statistical model-checker, UPPAAL SMC, is used to: (i) create a tuned set of dominator time mutants, and (ii) generate test traces that kill the mutants.

Place, publisher, year, edition, pages
IEEE Computer Society, 2018
Keywords
mutation testing, model-based testing, mutant subsumption, real-time systems, embedded systems
National Category
Computer Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-16049 (URN)10.1109/ICSTW.2018.00030 (DOI)000492760300010 ()2-s2.0-85050973857 (Scopus ID)978-1-5386-6352-3 (ISBN)978-1-5386-6353-0 (ISBN)
Conference
2018 IEEE 11th International Conference on Software Testing, Verification and Validation Workshops, 9–13 April 2018, Västerås, Sweden
Projects
TOCSYC
Funder
Knowledge Foundation, 20130085
Available from: 2018-08-13 Created: 2018-08-13 Last updated: 2019-12-19Bibliographically approved
Atif, Y., Jiang, Y., Lindström, B., Ding, J., Jeusfeld, M., Andler, S., . . . Haglund, D. (2018). Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project. Skövde: University of Skövde
Open this publication in new window or tab >>Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 16
Series
IIT Technical Reports ; HS-IIT-TR-18-002
Keywords
Smart grid security, Agent model, Multi-agent system
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-15111 (URN)
Projects
Elvira project funded by EU Internal Security Fund (ISF) A431.678-2016
Note

HS-IIT-TR-18-002

Available from: 2018-05-02 Created: 2018-05-02 Last updated: 2022-12-30Bibliographically approved
González-Hernández, L., Lindström, B., Offutt, J., Andler, S. F., Potena, P. & Bohlin, M. (2018). Using Mutant Stubbornness to Create Minimal and Prioritized Test Sets. In: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS): . Paper presented at 2018 IEEE 18th International Conference on Software Quality, Reliability, and Security (QRS 2018), 16–20 July 2018, Lisbon, Portugal (pp. 446-457). IEEE Computer Society
Open this publication in new window or tab >>Using Mutant Stubbornness to Create Minimal and Prioritized Test Sets
Show others...
2018 (English)In: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), IEEE Computer Society, 2018, p. 446-457Conference paper, Published paper (Refereed)
Abstract [en]

In testing, engineers want to run the most useful tests early (prioritization). When tests are run hundreds or thousands of times, minimizing a test set can result in significant savings (minimization). This paper proposes a new analysis technique to address both the minimal test set and the test case prioritization problems. This paper precisely defines the concept of mutant stubbornness, which is the basis for our analysis technique. We empirically compare our technique with other test case minimization and prioritization techniques in terms of the size of the minimized test sets and how quickly mutants are killed. We used seven C language subjects from the Siemens Repository, specifically the test sets and the killing matrices from a previous study. We used 30 different orders for each set and ran every technique 100 times over each set. Results show that our analysis technique performed significantly better than prior techniques for creating minimal test sets and was able to establish new bounds for all cases. Also, our analysis technique killed mutants as fast or faster than prior techniques. These results indicate that our mutant stubbornness technique constructs test sets that are both minimal in size, and prioritized effectively, as well or better than other techniques.

Place, publisher, year, edition, pages
IEEE Computer Society, 2018
Keywords
Test Case Minimization, Minimal Sets, Test Case Prioritization, Mutant Stubbornness
National Category
Computer Sciences
Research subject
Distributed Real-Time Systems
Identifiers
urn:nbn:se:his:diva-16050 (URN)10.1109/QRS.2018.00058 (DOI)2-s2.0-85052313827 (Scopus ID)978-1-5386-7757-5 (ISBN)978-1-5386-7758-2 (ISBN)
Conference
2018 IEEE 18th International Conference on Software Quality, Reliability, and Security (QRS 2018), 16–20 July 2018, Lisbon, Portugal
Projects
TOCSYC
Funder
Knowledge Foundation, 20130085
Available from: 2018-08-13 Created: 2018-08-13 Last updated: 2018-11-26Bibliographically approved
Ding, J., Atif, Y., Andler, S. F., Lindström, B. & Jeusfeld, M. (2017). CPS-based Threat Modeling for Critical Infrastructure Protection. Performance Evaluation Review, 45(2), 129-132
Open this publication in new window or tab >>CPS-based Threat Modeling for Critical Infrastructure Protection
Show others...
2017 (English)In: Performance Evaluation Review, ISSN 0163-5999, E-ISSN 1557-9484, Vol. 45, no 2, p. 129-132Article in journal (Refereed) Published
Abstract [en]

Cyber-Physical Systems (CPSs) are augmenting traditionalCritical Infrastructures (CIs) with data-rich operations. Thisintegration creates complex interdependencies that exposeCIs and their components to new threats. A systematicapproach to threat modeling is necessary to assess CIs’ vulnerabilityto cyber, physical, or social attacks. We suggest anew threat modeling approach to systematically synthesizeknowledge about the safety management of complex CIs andsituational awareness that helps understanding the nature ofa threat and its potential cascading-effects implications.

Place, publisher, year, edition, pages
ACM Publications, 2017
Keywords
CPS, threat modeling, Critical Infrastructure Protection
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems; INF303 Information Security
Identifiers
urn:nbn:se:his:diva-14245 (URN)10.1145/3152042.3152080 (DOI)2-s2.0-85041405430 (Scopus ID)
Projects
EU ISF project: Elvira
Funder
EU, European Research Council
Available from: 2017-10-23 Created: 2017-10-23 Last updated: 2018-06-01Bibliographically approved
Atif, Y., Ding, J., Lindström, B., Jeusfeld, M., Andler, S. F., Yuning, J., . . . Gustavsson, P. M. (2017). Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection. In: : . Paper presented at The International Conference on Critical Information Infrastructures Security, CRITIS 2017, Lucca, Italy, October 8-13, 2017.
Open this publication in new window or tab >>Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection
Show others...
2017 (English)Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the development of incident management tools that provide situation-awareness and cyber-threats intelligence for CI protection, with a special focus on smart-grid CI. The goal is to unleash forensic data from CPS-based CIs to perform some predictive analytics. In doing so, we use some AI (Artificial Intelligence) paradigms for both data collection, threat detection, and cascade-effects prediction. 

Keywords
critical infrastructures, cyber-threat, situation awareness, smart-grid, machine-learning, artificial intelligence, multi-agent systems
National Category
Computer Sciences Embedded Systems Energy Systems Remote Sensing Infrastructure Engineering
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-14516 (URN)
Conference
The International Conference on Critical Information Infrastructures Security, CRITIS 2017, Lucca, Italy, October 8-13, 2017
Projects
ELVIRA
Available from: 2017-11-28 Created: 2017-11-28 Last updated: 2023-01-02Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-6662-9034

Search in DiVA

Show all publications