Josip Bozic

Orcid: 0000-0001-6086-8846

According to our database1, Josip Bozic authored at least 25 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Ontology-based metamorphic testing for chatbots.
Softw. Qual. J., 2022

Robust Financial Fraud Alerting System Based in the Cloud Environment.
Sensors, 2022

2021
Follow the Trail: Machine Learning for Fraud Detection in Fintech Applications.
Sensors, 2021

2020
Planning-based security testing of web applications with attack grammars.
Softw. Qual. J., 2020

Interrogating Virtual Agents: In Quest of Security Vulnerabilities.
Proceedings of the Testing Software and Systems, 2020

Ontology-based Testing: An Emerging Paradigm for Modeling and Testing Systems and Software.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Ontology-driven Security Testing of Web Applications.
Proceedings of the IEEE International Conference On Artificial Intelligence Testing, 2020

2019
Testing TLS using planning-based combinatorial methods and execution framework.
Softw. Qual. J., 2019

Testing Chatbots Using Metamorphic Relations.
Proceedings of the Testing Software and Systems, 2019

Weighted Combinatorial Sequence Testing for the TLS Protocol.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Software Testing: According to Plan!
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Chatbot Testing Using AI Planning.
Proceedings of the IEEE International Conference On Artificial Intelligence Testing, 2019

2018
A Formal TLS Handshake Model in LNT.
Proceedings of the Proceedings Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation, 2018

Security Testing for Chatbots.
Proceedings of the Testing Software and Systems, 2018

Planning-based security testing of web applications.
Proceedings of the 13th International Workshop on Automation of Software Test, 2018

2017
Testing TLS Using Combinatorial Methods and Execution Framework.
Proceedings of the Testing Software and Systems, 2017

Planning-Based Security Testing of the SSL/TLS Protocol.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

2015
PURITY: A Planning-based secURITY Testing Tool.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Evaluation of the IPO-Family algorithms for test case generation in web security testing.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

2014
Plan It! Automated Security Testing Based on Planning.
Proceedings of the Testing Software and Systems, 2014

Retaining Consistency for Knowledge-Based Security Testing.
Proceedings of the Modern Advances in Applied Intelligence, 2014

Security Testing Based on Attack Patterns.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Attack pattern-based combinatorial testing.
Proceedings of the 9th International Workshop on Automation of Software Test, 2014

2013
XSS pattern for attack modeling in testing.
Proceedings of the 8th International Workshop on Automation of Software Test, 2013


  Loading...