default search action
Josip Bozic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Branka Stojanovic, Josip Bozic:
Robust Financial Fraud Alerting System Based in the Cloud Environment. Sensors 22(23): 9461 (2022) - [j4]Josip Bozic:
Ontology-based metamorphic testing for chatbots. Softw. Qual. J. 30(1): 227-251 (2022) - 2021
- [j3]Branka Stojanovic, Josip Bozic, Katharina Hofer-Schmitz, Kai Nahrgang, Andreas Weber, Atta Badii, Maheshkumar Sundaram, Elliot Jordan, Joel Runevic:
Follow the Trail: Machine Learning for Fraud Detection in Fintech Applications. Sensors 21(5): 1594 (2021) - 2020
- [j2]Josip Bozic, Franz Wotawa:
Planning-based security testing of web applications with attack grammars. Softw. Qual. J. 28(1): 307-334 (2020) - [c20]Josip Bozic, Yihao Li, Franz Wotawa:
Ontology-driven Security Testing of Web Applications. AITest 2020: 115-122 - [c19]Franz Wotawa, Josip Bozic, Yihao Li:
Ontology-based Testing: An Emerging Paradigm for Modeling and Testing Systems and Software. ICST Workshops 2020: 14-17 - [c18]Josip Bozic, Franz Wotawa:
Interrogating Virtual Agents: In Quest of Security Vulnerabilities. ICTSS 2020: 20-34
2010 – 2019
- 2019
- [j1]Dimitris E. Simos, Josip Bozic, Bernhard Garn, Manuel Leithner, Feng Duan, Kristoffer Kleine, Yu Lei, Franz Wotawa:
Testing TLS using planning-based combinatorial methods and execution framework. Softw. Qual. J. 27(2): 703-729 (2019) - [c17]Josip Bozic, Oliver A. Tazl, Franz Wotawa:
Chatbot Testing Using AI Planning. AITest 2019: 37-44 - [c16]Josip Bozic, Franz Wotawa:
Software Testing: According to Plan! ICST Workshops 2019: 23-31 - [c15]Bernhard Garn, Dimitris E. Simos, Feng Duan, Yu Lei, Josip Bozic, Franz Wotawa:
Weighted Combinatorial Sequence Testing for the TLS Protocol. ICST Workshops 2019: 46-51 - [c14]Josip Bozic, Franz Wotawa:
Testing Chatbots Using Metamorphic Relations. ICTSS 2019: 41-55 - 2018
- [c13]Josip Bozic, Franz Wotawa:
Planning-based security testing of web applications. AST@ICSE 2018: 20-26 - [c12]Josip Bozic, Franz Wotawa:
Security Testing for Chatbots. ICTSS 2018: 33-38 - [c11]Josip Bozic, Lina Marsso, Radu Mateescu, Franz Wotawa:
A Formal TLS Handshake Model in LNT. MARS/VPT@ETAPS 2018: 1-40 - 2017
- [c10]Josip Bozic, Kristoffer Kleine, Dimitris E. Simos, Franz Wotawa:
Planning-Based Security Testing of the SSL/TLS Protocol. ICST Workshops 2017: 347-355 - [c9]Dimitris E. Simos, Josip Bozic, Feng Duan, Bernhard Garn, Kristoffer Kleine, Yu Lei, Franz Wotawa:
Testing TLS Using Combinatorial Methods and Execution Framework. ICTSS 2017: 162-177 - 2015
- [c8]Josip Bozic, Bernhard Garn, Dimitris E. Simos, Franz Wotawa:
Evaluation of the IPO-Family algorithms for test case generation in web security testing. ICST Workshops 2015: 1-10 - [c7]Josip Bozic, Franz Wotawa:
PURITY: A Planning-based secURITY Testing Tool. QRS Companion 2015: 46-55 - [c6]Josip Bozic, Bernhard Garn, Ioannis Kapsalis, Dimitris E. Simos, Severin Winkler, Franz Wotawa:
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing. QRS 2015: 207-212 - 2014
- [c5]Josip Bozic, Dimitris E. Simos, Franz Wotawa:
Attack pattern-based combinatorial testing. AST 2014: 1-7 - [c4]Josip Bozic, Franz Wotawa:
Security Testing Based on Attack Patterns. ICST Workshops 2014: 4-11 - [c3]Andreas Bernauer, Josip Bozic, Dimitris E. Simos, Severin Winkler, Franz Wotawa:
Retaining Consistency for Knowledge-Based Security Testing. IEA/AIE (2) 2014: 88-97 - [c2]Franz Wotawa, Josip Bozic:
Plan It! Automated Security Testing Based on Planning. ICTSS 2014: 48-62 - 2013
- [c1]Josip Bozic, Franz Wotawa:
XSS pattern for attack modeling in testing. AST 2013: 71-74
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint