国内外软件测试大会汇总

参加业界的技术会议可以开阔视野,了解业界的技术新趋势,结识新的朋友。本文将列举国内外有影响力的软件测试会议供大家参考。

国内软件测试会议

中国软件测试大会

是国内软件测试行业规模最大、技术水平最高、最具影响力的会议,有主题演讲、分会场演讲和大时段并行课程。内容涵盖测试新技术、测试最佳实践、自动化与Devops、性能测试、可靠性测试、测试管理等内容。该会议已经和 AgileChina和SPIChina合并为tid大会。
参会费用:收费,全票6600元。
主办单位:智联联盟
网站:http://www.tid.org.cn/
业界影响:
技术水平:
推荐指数:

CSTQB中国软件测试高峰论坛

每年举办一届,在测试行业有一定影响力,但议题内容和移动互联网有一定差距。2017年的会议BAT和华为全部缺席。
参会费用:会议免费,会前培训收费。
主办单位:中国软件测试认证委员会(CSTQB)
网站:http://www.cstqbforum.com/
业界影响:
技术水平:
推荐指数:

中国移动互联网测试开发大会

是由国内最大的移动测试社区 TesterHome 发起,围绕软件应用质量,以交流质量标准,保障体系和测试研发技术为目的技术大会。
参会费用:收费,全票1900元。
主办方:移动测试社区 TesterHome
网站:http://www.test-china.org/
业界影响:
技术水平:
推荐指数:

中国质量大会(BQConf)

由思特沃克主办的软件测试会议,每年在不同城市举办多次。
参会费用:免费
主办方:思特沃克
网站:http://www.bqconf.com/
业界影响:
技术水平:
推荐指数:

国外软件测试会议

Star会议

分为Stareast、Starwest、StarCanada、EuroStar、UKStar,每年在美国东西海岸、加拿大、欧洲、英国各举办一次。Star会议是国际上最受认可的软件测试技术大会,其中EuroStar技术水平最高。Starwest和Stareast会选择部分议题进行在线直播,收看直播还可以参与互动,不过因为时差的原因需要熬夜。
参会费用:会场参会收费,其中stareast全票4195美元;在线直播免费。
网站:
https://stareast.techwell.com/
https://starwest.techwell.com/
https://starcanada.techwell.com/
https://conference.eurostarsoftwaretesting.com/
https://ukstar.eurostarsoftwaretesting.com/
业界影响:
技术水平:
推荐指数:

STPCon

每年春秋两季各举办一次。
参会费用:收费
网站:http://www.stpcon.com/
业界影响:
技术水平:
推荐指数:

Google Test Automation Conference

里面有很多测试的干货,会议结束后主办方会将会议演讲视频在youtube上公开。
网站:https://developers.google.com/google-test-automation-conference/
youtube链接: https://www.youtube.com/watch?v=Ip7zakWF0CM&list=PLSIUOFhnxEiAeGHYoBZCvEMY5wCOIpyOM
业界影响:
技术水平:
推荐指数:

OnLineTestConf

在线的网络会议,完全免费,里面有一些有价值的议题。
网站:http://www.onlinetestconf.com/
业界影响:
技术水平:
推荐指数:

国外的软件测试会议很多,在此就不一一列举了。感兴趣的同学可以参阅http://testingconferences.org/ ,如果大家有新的信息可以直接更新到Github链接中:
https://github.com/TestingConferences/testingconferences.github.io/blob/master/_data/current.yml

目前业界的会议很多,虽然不是每个人都有参会的机会,但不妨碍我们了解这些会议。我们可以通过会议中公开的视频资料了解到业界最新的软件测试技术,并将技术应用到公司的业务中。

  • 0
    点赞
  • 13
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Alansari2017- A Distributed Access Control System for Cloud Federations .pdf Anon2017-Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.pdf Arnautov2016- SCONE Secure Linux Containers with Intel SGX.pdf Atamli-Reineh2015 - Securing Application with Software Partitioning.pdf B2017 -Securing Data Analytics on SGX With.pdf Bahmani2016 - Secure Multiparty Computation from SGX.pdf Barbosa2016- Foundations of Hardware-Based Attested Computation and Application to SGX.pdf Bauman2016-A Case for Protecting Computer Games With SGX.pdf Baumann2014- Shielding applications from an untrusted cloud with Haven-haven.pdf Beekman2016- Attestation Transparency Building secure Internet.pdf BehlJDistlerT2017-Hybrids on Steroids-SGX-Based High Performance BFT∗.pdf Bhardwaj2016-Fast, scalable and secure onloading of edge functions using AirBox.pdf Boneh2017 - Surnaming Schemes, Fast Verification, and Applications to SGX Technology.pdf Brekalo2016-Mitigating Password Database Breaches with Intel SGX.pdf Brenner2017- Secure Cloud Micro Services Using Intel SGX.pdf CacheZoom - how sgx amplifies the power of cache attacks.pdf ChakrabartiSLeslie-HurdRVijM -Architecture for Oversubscription of Secure Memory.pdf ChakrabartiSLeslie-HurdRVijM-Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment .pdf Choi2017 - S-OpenSGX A system-level platform.pdf Costan2016-Sanctum Minimal Hardware Extensions for Strong Software.pdf Coughlin2017 -Trusted Click-Overcoming Security issues of NFV in the Cloud.pdf Dang2017-Proofs of Data Residency-Checking whether Your Cloud Files Have Been Relocated .pdf Elastic and Secure Energy Forecasting in cloud environments.pdf Fetzer2016-Building Critical Applications Using Microservice.pdf Gkantsidis2017- And Then There Were More.pdf Glamdring-Automatic Application Partitioning for Intel SGX.pdf Glimmers-Resolving the Privacy-Trust Quagmire.pdf Gotzfried2017-Cache Attacks on Intel SGX.pdf Gu2017 - Secure Live Migration of SGX Enclaves on Trusted Cloud.pdf Haider2017- Leveraging hw isolation for Process L (2).pdf Han2017-SGX-Box Enabling Visibility on Encrypted Traffic.pdf Hunt2016-Ryoan- A Distributed Sandbox for Untrusted .pdf Hutchison2011-HardIDX_ Practical and Secure Index with SGX.pdf Iron - Functional Encryption using Intel SGX.pdf Jackson2017 -Trust is in the Keys of the Beholder.pdf Jacomme2017 - Symbolic Models for Isolated Execution Environments.pdf KarandeVBaumanELinZ2017-SGX-Log-Securing System Logs With SGX.pdf Kelbert2017 - SecureCloud Secure Big Data Processing in Untrusted Clouds.pdf Leaky Cauldron on the Dark Land.pdf Leslie-Hurd2015-Verifying Linearizability of IntelR Software Guard Extensions.pdf Leveraging Intel SGX to Create a Nondisclosure Cryptographic library.pdf LightBox-SGX-assisted secure network functions.pdf Lind2016 - Teechan - Payment Channels Using TEE.pdf Lind2017 - Teechain-scalable blockchain payments using TEE.pdf Link2016-Automatic Enforcement of Expressive Security Policies using Enclaves.pdf Nguyen2017- EnGarde-Mutually-Trusted Inspection of SGX Enclaves.pdf Ohrimenko2016- Oblivious Multi-Party Machine Learning on Trusted Processors.pdf On Making Emerging TEE Accessible to Developers.pdf Paladi2016-TruSDN_ Bootstrapping Trust in Cloud Network Infrastructure.pdf Pires2016 - Secure Content-Based Routing Using SGX.pdf Pires2017- A lightweight MapReduce framework for secure processing with SGX.pdf Proof of Luck- an Efficient blockchain consensus protocol.pdf rollback and forking detection for trusted execution environments using lightweight (2).pdf Rollback and Forking Detection for Trusted Execution environments using lightweight.pdf SAFETY - Secure gwAs in Federated Environment.pdf Sasy-ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf Schuster2015- VC3-Trustworthy Data Analytics in the Cloud using SGX.pdf sec17-lee-jaehyuk.pdf sec17-lee-sangho.pdf sec17-van_bulck.pdf Seitzer2015-A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory.pdf Seo2017 - SGX-Shield -Enabling Address Space Layout Randomization for SGX Programs.pdf Shepherd2017a- Secure and Trusted Execution-Past .pdf Shinde2015 - Preventing Page Faults from Telling Your Secrets.pdf Sinha2015- Moat Verifying Confidentiality of Enclave Programs.pdf Stewin2016 - Malware Guard Extension_ Using SGX to Conceal Cache Attacks.pdf Strackx2016-Developing Secure SGX Enclaves New Challenges on the Horizon.pdf Strackx2016a - Ariadne-A Minimal Approach to State Continuity.pdf Swami2017 - Intel SGX Remote Attestation is not sufficient.pdf Tamrakar2017-The Circle Game-Scalable Private Membership Test Using Trusted Hardware.pdf Tramer2016 - Sealed-Glass Proofs.pdf Tsai2017 -Graphene-SGX.pdf Tychalas2017-SGXCrypter.pdf Volp2016-Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control .pdf Weichbrodt2016-AsyncShock - Exploiting Synchronisation Bugs in Intel SGX Enclaves.pdf Weiser2017 - SGXIO- Generic Trusted IO Path for Intel SGX.pdf Weisse2017 - Regaining Lost Cycles with HotCalls.pdf XingBCShanahanM2016-Intel__ Software Guard Extensions (Intel__ SGX) Software Support for Dynamic Memory Allocation inside an Enclave.pdf Xu2015-Controlled-Channel Attacks_ Deterministic Side Channels for Untrusted Operating Systems.pdf ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf Zhang2016 - Town Crier.pdf Zhang2017-REM Resource-Efficient Mining for Blockchains.pdf

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值