自动化测试英文文献精选指南

需积分: 50 4 下载量 101 浏览量 更新于2024-12-22 收藏 49KB ZIP 举报
资源摘要信息:"自动化测试英文文献" 自动化测试是指在预先编写好的脚本或程序的指导下,自动地执行软件测试的过程。它能够有效地提高测试效率,确保软件质量,缩短产品的上市时间。在软件开发和维护过程中,自动化测试扮演着越来越重要的角色。理解自动化测试的相关理论、技术和工具对于软件测试工程师来说是必不可少的技能。 以下是对自动化测试领域的几个关键知识点的介绍: 1. 自动化测试基础:自动化测试的基础包括测试用例的定义、测试脚本的编写、测试数据的管理、以及测试过程的控制。了解这些基础知识对于搭建一个稳固的自动化测试框架至关重要。 2. 自动化测试工具:市场上存在多种自动化测试工具,如Selenium、QTP(Quick Test Professional)、JMeter、SoapUI等,它们各有优劣,适用于不同的测试场景。例如,Selenium适用于Web应用程序的自动化测试,而JMeter可以用于性能测试。熟练掌握至少一种自动化测试工具是进行自动化测试实践的先决条件。 3. 持续集成与自动化测试:在敏捷开发和持续集成(Continuous Integration, CI)的背景下,自动化测试成为必不可少的一环。它能够快速地反馈测试结果,帮助开发团队及时发现并修复缺陷,提高软件开发的效率和质量。 4. 关键自动化测试策略:包括回归测试、负载测试、冒烟测试等,这些策略在自动化测试中应用广泛。回归测试确保新的代码更改没有破坏旧的功能;负载测试评估系统在高负载下的表现;冒烟测试是初步检查软件新构建是否足够稳定以进行深入测试。 5. 自动化测试的挑战:尽管自动化测试有很多优点,但它也面临一些挑战,比如测试脚本的维护成本、测试数据的不断更新、测试工具的选择和学习成本等。对这些挑战的理解和应对策略对于自动化测试的成功实施至关重要。 6. 自动化测试框架:一个有效的自动化测试框架应具备可扩展性、可维护性、可重用性和可读性。例如,BDD(行为驱动开发)框架、关键字驱动框架和数据驱动框架都是业界常用的设计模式,它们各自有不同的应用场景和优势。 7. 测试脚本的编写:编写清晰、高效的测试脚本是自动化测试中的核心技能。它要求测试人员不仅要理解业务需求,还要熟练掌握编程技术,如选择合适的编程语言(通常是Java、Python或JavaScript等)以及理解测试框架和API。 8. 自动化测试的效益和局限:自动化测试可以提高测试的覆盖率,减少重复工作,提高测试速度,但它不能完全取代手动测试,特别是在探索性测试和用户界面设计方面。 关于标题中提到的“英文文献”,它意味着提供这些信息的资源是英文的,适用于需要参考英文资料的研究者或学生,尤其是在撰写毕业论文时。由于标题中并未提供具体文献的详细信息,这里无法针对某一特定文献进行深入分析。不过,一般来说,英文文献会提供自动化测试领域最新的研究成果、案例研究、方法论介绍、以及工具和技术的比较分析等。 在上述压缩包子文件的文件名称列表中,"liuai114-4317978-自动化测试英文文献_1617843614"似乎是一个文件的命名规则。如果这是来自某个数据库或者资源网站的命名,那么它可能包含了具体的论文、研究文章或者其他类型的文献,提供了一个特定的文献标识和时间戳。要获取这个文件,需要在相应的资源库中进行搜索,或根据文件的具体获取方式去访问它。 总的来说,自动化测试是一项结合了软件工程、编程技术和测试理论的综合性工作,它的发展日新月异,相关文献和资源也不断涌现,为从事该领域的专业人士提供了丰富的学习材料。通过阅读这些英文文献,不仅可以获取最新的自动化测试知识,还可以通过案例分析来提升实践中的应用能力。
2018-03-21 上传
Alansari2017- A Distributed Access Control System for Cloud Federations .pdf Anon2017-Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.pdf Arnautov2016- SCONE Secure Linux Containers with Intel SGX.pdf Atamli-Reineh2015 - Securing Application with Software Partitioning.pdf B2017 -Securing Data Analytics on SGX With.pdf Bahmani2016 - Secure Multiparty Computation from SGX.pdf Barbosa2016- Foundations of Hardware-Based Attested Computation and Application to SGX.pdf Bauman2016-A Case for Protecting Computer Games With SGX.pdf Baumann2014- Shielding applications from an untrusted cloud with Haven-haven.pdf Beekman2016- Attestation Transparency Building secure Internet.pdf BehlJDistlerT2017-Hybrids on Steroids-SGX-Based High Performance BFT∗.pdf Bhardwaj2016-Fast, scalable and secure onloading of edge functions using AirBox.pdf Boneh2017 - Surnaming Schemes, Fast Verification, and Applications to SGX Technology.pdf Brekalo2016-Mitigating Password Database Breaches with Intel SGX.pdf Brenner2017- Secure Cloud Micro Services Using Intel SGX.pdf CacheZoom - how sgx amplifies the power of cache attacks.pdf ChakrabartiSLeslie-HurdRVijM -Architecture for Oversubscription of Secure Memory.pdf ChakrabartiSLeslie-HurdRVijM-Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment .pdf Choi2017 - S-OpenSGX A system-level platform.pdf Costan2016-Sanctum Minimal Hardware Extensions for Strong Software.pdf Coughlin2017 -Trusted Click-Overcoming Security issues of NFV in the Cloud.pdf Dang2017-Proofs of Data Residency-Checking whether Your Cloud Files Have Been Relocated .pdf Elastic and Secure Energy Forecasting in cloud environments.pdf Fetzer2016-Building Critical Applications Using Microservice.pdf Gkantsidis2017- And Then There Were More.pdf Glamdring-Automatic Application Partitioning for Intel SGX.pdf Glimmers-Resolving the Privacy-Trust Quagmire.pdf Gotzfried2017-Cache Attacks on Intel SGX.pdf Gu2017 - Secure Live Migration of SGX Enclaves on Trusted Cloud.pdf Haider2017- Leveraging hw isolation for Process L (2).pdf Han2017-SGX-Box Enabling Visibility on Encrypted Traffic.pdf Hunt2016-Ryoan- A Distributed Sandbox for Untrusted .pdf Hutchison2011-HardIDX_ Practical and Secure Index with SGX.pdf Iron - Functional Encryption using Intel SGX.pdf Jackson2017 -Trust is in the Keys of the Beholder.pdf Jacomme2017 - Symbolic Models for Isolated Execution Environments.pdf KarandeVBaumanELinZ2017-SGX-Log-Securing System Logs With SGX.pdf Kelbert2017 - SecureCloud Secure Big Data Processing in Untrusted Clouds.pdf Leaky Cauldron on the Dark Land.pdf Leslie-Hurd2015-Verifying Linearizability of IntelR Software Guard Extensions.pdf Leveraging Intel SGX to Create a Nondisclosure Cryptographic library.pdf LightBox-SGX-assisted secure network functions.pdf Lind2016 - Teechan - Payment Channels Using TEE.pdf Lind2017 - Teechain-scalable blockchain payments using TEE.pdf Link2016-Automatic Enforcement of Expressive Security Policies using Enclaves.pdf Nguyen2017- EnGarde-Mutually-Trusted Inspection of SGX Enclaves.pdf Ohrimenko2016- Oblivious Multi-Party Machine Learning on Trusted Processors.pdf On Making Emerging TEE Accessible to Developers.pdf Paladi2016-TruSDN_ Bootstrapping Trust in Cloud Network Infrastructure.pdf Pires2016 - Secure Content-Based Routing Using SGX.pdf Pires2017- A lightweight MapReduce framework for secure processing with SGX.pdf Proof of Luck- an Efficient blockchain consensus protocol.pdf rollback and forking detection for trusted execution environments using lightweight (2).pdf Rollback and Forking Detection for Trusted Execution environments using lightweight.pdf SAFETY - Secure gwAs in Federated Environment.pdf Sasy-ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf Schuster2015- VC3-Trustworthy Data Analytics in the Cloud using SGX.pdf sec17-lee-jaehyuk.pdf sec17-lee-sangho.pdf sec17-van_bulck.pdf Seitzer2015-A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory.pdf Seo2017 - SGX-Shield -Enabling Address Space Layout Randomization for SGX Programs.pdf Shepherd2017a- Secure and Trusted Execution-Past .pdf Shinde2015 - Preventing Page Faults from Telling Your Secrets.pdf Sinha2015- Moat Verifying Confidentiality of Enclave Programs.pdf Stewin2016 - Malware Guard Extension_ Using SGX to Conceal Cache Attacks.pdf Strackx2016-Developing Secure SGX Enclaves New Challenges on the Horizon.pdf Strackx2016a - Ariadne-A Minimal Approach to State Continuity.pdf Swami2017 - Intel SGX Remote Attestation is not sufficient.pdf Tamrakar2017-The Circle Game-Scalable Private Membership Test Using Trusted Hardware.pdf Tramer2016 - Sealed-Glass Proofs.pdf Tsai2017 -Graphene-SGX.pdf Tychalas2017-SGXCrypter.pdf Volp2016-Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control .pdf Weichbrodt2016-AsyncShock - Exploiting Synchronisation Bugs in Intel SGX Enclaves.pdf Weiser2017 - SGXIO- Generic Trusted IO Path for Intel SGX.pdf Weisse2017 - Regaining Lost Cycles with HotCalls.pdf XingBCShanahanM2016-Intel__ Software Guard Extensions (Intel__ SGX) Software Support for Dynamic Memory Allocation inside an Enclave.pdf Xu2015-Controlled-Channel Attacks_ Deterministic Side Channels for Untrusted Operating Systems.pdf ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf Zhang2016 - Town Crier.pdf Zhang2017-REM Resource-Efficient Mining for Blockchains.pdf