GUI testing wiki

      • blockchain
      • bootloader
      • browser fingerprinting
      • cache poisoning
      • CART (classification and regression test)
      • compatibility or conversion testing
      • configuration testing
      • confirmation bias
      • context isolation bypass
      • CORP (Cross-Origin Resource Policy)
      • cryptomining
      • direct manipulation (design pattern)
      • EDG (Event Dependency Graph)
      • EDoS (Economical Denial of Sustainability)
      • ELET (Embedded Language Encapsulation Type)
      • energy-based algorithm
      • ESI (Edge Side Includes)
      • Gecko engine
      • Gherkin
      • gradient boosting
      • HMM (Hidden Markov Model)
      • installation testing
      • Jenkins
      • kernel
      • LIFO (last in, first out)
      • LLM (large language model)
      • machine learning
      • man-in-the-middle attacks
      • micro-service architecture
      • Moving Target Defence
      • MTTR (Mean Time To Recover)
      • MVW (model-view-controller)
      • NCD (Normalized Compression Distance)
      • NFA (Nondeterministic Finite Automation)
      • OAuth
      • OCR (optical character recognition)
      • overfitting
      • PCA (Principal Component Analysis)
      • performance testing
      • Pitest
      • precise alias analysis
      • procedure testing
      • program slicing
      • Q-learning
      • recommendation engine
      • recovery testing
      • reflection (Java)
      • relational databases
      • reliability testing
      • RNN (recurrent neural network)
      • serviceability or maintenance testing
      • signature forgery
      • smuggling
      • social engineering
      • SSL (secure sockets layer)
      • SSRF (server-side request forgery)
      • standard graph matching
      • storage testing
      • stress testing
      • SVM (support vector machine)
      • TDD (test-driven development)
      • TLS (transport layer security)
      • tree difference algorithms
      • VM (virtual machine)
      • volume testing
      • ABAC (attribute based access control)
      • acceptance testing
      • access control
      • Acunetix
      • ad hoc widgets
      • Adobe Flash
      • agile development
      • AIF (Application Independent Functionalities)
      • Alloy modeling language
      • applet
      • AST (Abstract Syntax Tree)
      • authentication vulnerabilities
      • behavioral biometrics analysis
      • benchmark testing
      • BFT (business flow tampering)
      • black-box testing
      • boundary value analysis
      • BRF (Balance Random Forest)
      • brute forcing
      • buffer overflow
      • Burp Suite
      • C2C (client-to-client) communication
      • CA (covering array)
      • callee
      • callstack
      • canvas DOM element
      • CAPTCHA (Completely Automated Public Turing-test-to-tell Computers and Humans Apart)
      • cause-effect graphing
      • CDN (Content Delivery Network)
      • CDP (Chrome DevTools Protocol)
      • CFG (Control Flow Graph)
      • Cisco RBAC CVE
      • clickjacking
      • Co-clustering
      • co-evolving systems
      • code inspection
      • code obfuscation
      • code walkthrough
      • CodeCommons
      • COEP (Cross-Origin Embedder Policy)
      • COIL (Cross-Origin Image Leak)
      • combinatorial testing
      • compiler
      • concolic execution
      • content spoofing
      • cookie
      • COOP (Cross-Origin Opener Policy)
      • CORS (Cross-Origin Resource Sharing)
      • coverage criteria
      • cross-domain policies
      • CRUD (Create, Read, Update, Delete) operations
      • CSP (Content Security Policy)
      • CSRF (cross-site request forgery)
      • CSRF (cross-site request forgery) token
      • CSRH (Client-Side Request Hijacking)
      • CURL
      • CVE (common vulnerabilities and exposures)
      • daikon engine
      • data integrity
      • DDoS (Distributed Denial of Service)
      • DDT (dependency detection tool)
      • DEAP
      • decision table
      • design pattern
      • desk checking
      • DFS (depth-first search)
      • differential testing
      • direct graph-based logic flow analysis
      • directory traversal (path traversal)
      • Docker
      • Docker Hub
      • Docker Image
      • Dockerfile
      • dogfooding
      • DOM clobbering
      • domain
      • DOS (Denial of Service)
      • drive-by download
      • driver
      • DTA (dynamic taint analysis)
      • dual boot
      • dynamic analysis
      • dynamic invariants
      • E2E (end-to-end) testing
      • EAR (Execution After Redirect)
      • EFG (event flow graph)
      • EIG (event interaction graph)
      • ENV (environment variables)
      • EPM (Equivalence Partitioning Method)
      • error
      • error guessing
      • ESG (event sequence graph)
      • event models comparison
      • evil RegEx (Regular Expression)
      • fault model
      • Firefox extension
      • fitness function
      • flaky test
      • forced browsing
      • format string attack
      • framejacking
      • FSM (finite-state machine)
      • Function Variadicity
      • fuzzing
      • GA (genetic algorithm)
      • GEMs (GUI Element Misuse)
      • graph database
      • GUI (graphical user interface)
      • GUI ripper
      • HAR file
      • Honeypot
      • HPG (Hybrid Property Graph)
      • HSTS (HTTP Strict Transport Security)
      • HTTP eavesdropping
      • HTTP Response Splitting
      • HTTP trace collection
      • HTTPS (HyperText Transfer Protocol Secure
      • IDOR (Insecure Direct Object Reference)
      • IDS and IPS (intrusion detection, intrusion prevention system)
      • iframe injection
      • IIFE (immediately invoked function expression)
      • incremental or integration testing
      • IndexedDB
      • Instrumentation
      • integration testing
      • integration tree
      • Iroh.js
      • JEA (Just-Enough-Access) principle
      • JIT (Just-in-time) principle
      • JSON Hijacking Prevention tokens
      • JSON-LD (linked data)
      • JWT (JSON Web Token)
      • keylogging
      • KNN (K-Nearest Neighbors)
      • KS (Kolmogorov-Smirnov) test
      • Linux distribution
      • LM (word n-gram language model)
      • LoC
      • logic coverage testing
      • logic vulnerability
      • logic workflow bypass
      • LTS (Leaning Toothpick Syndrome)
      • Malai
      • Markov’s chain and clickstream analysis
      • Memento (design pattern)
      • mental model
      • MF (Micro-Frontend) architecture
      • MiTB (man-in-the-browser) attack
      • MiTM (man-in-the-middle) attack
      • Monkey patching
      • mono-event interaction
      • MT (metamorphic testing)
      • multi-event interactions
      • multi-modal fusion
      • multi-modal interactions
      • Mutation testing
      • NAS (Network Attached Storage)
      • negative testing
      • non-incremental (big-bang) unit testing
      • noVNC
      • object storage service
      • OpenID
      • OSV (open source vulnerabilities)
      • OWASP (Open Web Application Security Project)
      • OWASP Top 10 (2021)
      • Parallel programming
      • parameter tampering
      • paywalls
      • PDO
      • peer rating
      • penetration test
      • phishing
      • pixel stealing
      • POLA (Principle Of Least Astonishment)
      • PoLP (principle of least privilege)
      • port
      • positive testing
      • Post-WIMP
      • prefix tree
      • privacy
      • prolog (programming language)
      • prototype pollution
      • prototype pollution gadgets
      • proxy object
      • proxy server
      • PWA (progressive web application)
      • QR-code
      • radians
      • random forest
      • RBAC (role-based access control)
      • RCE (Remote Code Execution)
      • redirect attack
      • ReDos (Regular Expression Denial of Service)
      • RegEx (Regular Expression)
      • regression testing
      • reverse proxy
      • RL (Reinforcement Learning)
      • RSS (RDF Site Summary)
      • SameSite cookie
      • sandbox environment
      • security testing
      • SELinux (Security-Enhanced Linux)
      • session hijacking
      • session puzzling
      • sessions token
      • SH (Software Heritage)
      • sine and cosine
      • sink function
      • SLR (systematic literature review)
      • SOP (Same-Origin Policy)
      • SQL signature
      • SQLIA (SQL injection attack)
      • SSIM (Structural Similarity Index Method)
      • SSRF (Server Side Request Forgery)
      • STA (static taint analysis)
      • standard widgets
      • static analysis
      • static invariants
      • string validation
      • stub
      • subgraph isomorphism
      • supervised learning
      • SUT (system under test)
      • SW (Service Worker)
      • symbolic execution
      • systematic testing
      • tabnabbing
      • taxonomy
      • test amplification
      • test oracle
      • testbed environment
      • timing attack
      • top-level navigation
      • trojan horse
      • typosquatting
      • UIDL (User Interface Description Language)
      • UML (Unified Modeling Language)
      • unit testing
      • URL validation
      • usability testing
      • WAF (web application firewall)
      • web security
      • web server misconfiguration
      • Web Storage API (localStorage, sessionStorage)
      • white-box testing
      • WIMP (windows, icon, menu, pointers)
      • WSH (Web Socket Hijack)
      • WSL (Windows Subsystem for Linux)
      • WW (Web Worker)
      • WW (Web Worker) and SW (Service Worker) comparison
      • XCS (Cross Channel Scripting)
      • XSF (Cross-site Framing)
      • XSS (cross site scripting)
      • XSS and CSFR comparison
      • XXE (XML external entities)
      • zero-day vulnerability
            • 02 Grammar
            • 03 Objects
            • 04 Functions
            • 06 Arrays
            • 09 Style
          • JavaScript, The Good Parts
            • 01-02 Self-assessment test, psychology and economics of software testing
            • 03 Program Inspections, walkthroughs and reviews
            • 04 Test-case Design
            • 05 Module (Unit) Testing
            • 06 Higher-Order Testing
            • 07 Usability (User) Testing
            • 08 Debugging
            • 09 Testing in the Agile Environment
            • 10 Testing Internet Applications
            • 11 Mobile Application Testing
          • The art of software testing
            • 5. Web Application Exploitation with Broken Authentication and Path Traversal
          • The Basic of Web Hacking. Tools and Techniques to Attack the Web
            • 16. Client-Side Attacks
          • Web application security
          • A Supervised Learning Approach to Protect Client Authentication on the Web
          • Reliable protection against session fixation attacks
          • Systematically breaking and fixing OpenID security. Formal analysis, semi-automated empirical evaluation, and practical countermeasures
          • User Profiling Using Sequential Mining Over Web Elements
          • Experimental Security Analysis of Sensitive Data Access by Browser Extensions
          • SandFOX. secure sandboxed and isolated environment for Firefox browser
          • Sentinel. Securing legacy firefox extensions
          • An Empirical Study on Detecting and Fixing Buffer Overflow Bugs
          • A solution for the automated detection of clickjacking attacks
          • Clickjacking. Existing defenses and some novel approaches
          • Frametrapping the framebusting defence
          • ProClick. a framework for testing clickjacking attacks in web applications
          • Security assessment of clickjacking risks in web applications. metrics based approach
          • Tricking Johnny into Granting Web Permissions
          • Vulnerability Analysis of Iframe Attacks on Websites
          • An investigation into possible attacks on HTML5 indexedDB and their prevention
          • Analysis of privacy and security in HTML5 web storage
          • Decrypting IndexedDB in private mode of Gecko-based browsers
          • NoteLocker. Simple Secure Storage Service
          • Security of CORS on LocalStorage
          • The role of HTML5 IndexedDB, the past, present and future
          • How Private is Your Private Cloud. Security Analysis of Cloud Control Interfaces
          • Comparative analysis of web security in open source content management system
          • WAVES. Automatic Synthesis of Client-Side Validation Code for Web Applications
          • Accept All Exploits. Exploring the Security Impact of Cookie Banners
          • Quite a mess in my cookie jar! leveraging machine learning to protect web authentication
          • Cross-Site Framing Attacks
          • A Comparison of Online JavaScript Obfuscators
          • A server and browser transparent CSRF defense for web 2.0 applications
          • Assessment of vulnerabilities of web applications of Bangladesh. A case study of XSS and CSRF
          • Browser protection against cross-site request forgery
          • Client-Side Detection of Cross-Site Request Forgery Attacks
          • CsFire. Transparent client-side mitigation of malicious cross-domain requests
          • CSRF Detection Based on Graph Data Mining
          • Enhancing Web Security. A Comparative Analysis of Machine Learning Models for CSRF Detection
          • Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild
          • Mitch. A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
          • Scenario-Based Cross-Site Request Forgery (CSRF) Attack Simulation
          • The Great Request Robbery. An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web
          • The state of HTTP declarative security in online banking websites
          • Cross-origin pixel stealing. Timing attacks using CSS filters
          • Managing security vulnerabilities introduced by dependencies in React.js
          • It’s (DOM) Clobbering Time. Attack Techniques, Prevalence, and Defenses
          • Augur. Dynamic Taint Analysis for Asynchronous JavaScript
          • A survey. Cloud hosted website protection using soft computing techniques
          • A Traffic Monitoring and Policy Enforcement Framework for HTTP
          • Cross-domain vulnerabilities over social networks
          • Machine Learning Based Web Application Plugin for Threat Detection and IP Analysis
          • Reining in the web with content security policy
          • Bypass testing of web applications
          • Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation
          • ZigZag. Automatically hardening web applications against client-side validation vulnerabilities
          • Intrusion recovery for database-backed web applications
          • Runtime recovery of web applications under zero-days ReDoS attacks
          • VisibleV8. In-browser Monitoring of JavaScript in the Wild
          • JSON Web Token Penetration Testing on Cookie Storage with CSRF Techniques
          • BFTDETECTOR. Automatic detection of business flow tampering for digital content service
          • BLOCK. a black-box approach for detection of state violation attacks towards web applications
          • DetLogic. A black-box approach for detecting logic vulnerabilities in web applications
          • Finding client-side business flow tampering vulnerabilities
          • From Hindsight to Foresight. Enhancing Design Artifacts for Business Logic Flaw Discovery
          • Hidden GEMS. Automated discovery of Access Control Vulnerabilities in Graphical User Interfaces
          • IVD. Automatic Learning and Enforcement of Authorization Rules in Online Social Networks
          • Keeping out the masses. Understanding the popularity and implications of internet paywalls
          • LogicScope. automatic discovery of logic vulnerabilities within web applications
          • On the misuse of Graphical User Interface elements to implement security controls
          • Patching Logic Vulnerabilities for Web Applications using LogicPatcher
          • Requirements for preventing logic flaws in the authentication procedure of web applications
          • Toward black-box detection of logic flaws in web applications
          • Verification of Web Content Integrity. A new approach to protecting servers against tampering
          • A GUI-based metamorphic testing technique for detecting authentication vulnerabilities in Android mobile apps
          • Mining Android App Usages for Generating Actionable GUI-based Execution Scenarios
          • Do Not Trust the Clouds Easily. The Insecurity of Content Security Policy Based on Object Storage
          • A Novel Approach for Message Authentication to Prevent Parameter Tampering Attack in Web Applications
          • Automating the Detection of Access Control Vulnerabilities in Web Applications
          • No tamper. Automatic black-box detection of parameter tampering opportunities in Web Applications
          • TamperProof. a server-agnostic defense for parameter tampering attacks on web applications
          • WAPTEC. whitebox analysis of web applications for parameter tampering exploit construction
          • (Re)considering the Concept of Literature Review Reproducibility
          • PhishCatcher. Client-Side Defense Against Web Spoofing Attacks Using Machine Learning
          • Apathy, convenience or irrelevance. Identifying conceptual barriers to safeguarding children’s data privacy
          • Automatic program repair
          • A Multivocal Literature Review on Prototype Pollution Vulnerability
          • Detecting prototype pollution for node.js. Vulnerability review and new fuzzing inputs
          • Follow My Flow. Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites
          • On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications
          • Undefined-oriented Programming. Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences
          • Malicious QR-code threats and vulnerability of blockchain
          • EARs in the wild. large-scale analysis of execution after redirect vulnerabilities
          • Fear the EAR. discovering and mitigating execution after redirect vulnerabilities
          • Malicious hidden redirect attack web page detection based on CSS features
          • Confeagle. Automated Analysis of Configuration Vulnerabilities in Web Applications
          • A Survey on Vulnerabilities of Service Workers
          • Categorizing service worker attacks and mitigations
          • The Service Worker Hiding in Your Browser. The Next Web Attack Target.
          • Micro-frontends. Principles, implementations and pitfalls
          • Untangling Spaghetti of Evolutions in Software Histories to Identify Code and Test Co-evolutions
          • A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications
          • Automatically inferring user behavior models in large-scale web applications
          • On model-based testing advanced GUIs
          • Testing is an Event-Centric Activity
          • An effective method for preventing SQL injection attack and session hijacking
          • Minimization of SQL injection in scheduling application development
          • SENTINEL. securing database from logic flaws in web applications
          • SQLIA detection techniques
          • Detecting Tabnabbing Attacks Via An RL-Based Agent
          • NoTabNab. Protection against the “tabnabbing attack”
          • TabShots. client-side detection of tabnabbing attacks
          • A snowballing literature study on test amplification
          • An Empirical Analysis of UI-Based Flaky Tests
          • Augusto. Exploiting popular functionalities for the generation of semantic GUI tests with Oracles
          • AutoInSpec, using missing test coverage to improve specifications in GUIs
          • Coverage criteria for GUI testing
          • Lightweight Static Analysis for GUI testing
          • Mutta. A novel tool for E2E web mutation testing
          • Repairing GUI Test Suites Using a Genetic Algorithm
          • STILE, a tool for optimizing E2E web test scripts parallelization
          • What All the PHUZZ Is About. A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications
          • A taxonomy of testable HTML5 Canvas Issues
          • Classifying and qualifying GUI defects
          • Dirty clicks. A study of the Usability and Security Implications of Click-related Behaviors on the Web
          • Home and away. UI design pattern for supporting end-user security
          • JANUS. Detecting rendering bugs in Web Browsers via Visual Delta Consistency
          • Out of Sight, Out of Mind. UI Design and the Inhibition of Mental Models of Security
          • Demo. Large Scale Analysis on Vulnerability Remediation in Open-Source JavaScript projects
          • Adaptive Web Application Firewall for Multi-Threat Detection
          • A systematic review and taxonomy of web applications threats
          • A Taxonomy of Web Security Vulnerabilities
          • Common vulnerabilities in real world web applications
          • Enhancing Front-End Security. Protecting User Data and Privacy in Web Applications
          • Navigating web application security. A survey of vulnerabilities and detection solutions
          • Security of Web Application. State of the Art
          • Towards a formal foundation of web security
          • Web application attacks
          • XCS. Cross Channel Scripting and its impact on web applications
          • A survey of detection methods for XSS attacks
          • Automated removal of cross site scripting vulnerabilities in web applications
          • mXSS attacks. attacking well-secured web-applications by using innerHTML mutations
          • On Security Issues in Web Applications through Cross Site Scripting (XSS)
          • Scriptless attacks. Stealing the pie without touching the sill
          • WAVE. Black Box Detection of XSS, CSRF and Information Leakage Vulnerabilities
      • (Aditya Sood, Richard Enbody, et al., 2011)
      • (Ahmed, Altamimi, et al., 2023)
      • (Akhawe, Barth, et al., 2010)
      • (Al-Kahla, Shatnawi, Taqieddin, 2021)
      • (Aldrich, Turcotte, et al., 2023)
      • (Amalfitano, Misael, et al., 2025)
      • (Anastasia, Stamatia, 2024)
      • (Arlt, Podelski, Bertolini, et al., 2012)
      • (Asish Kumar Dalai, Saroj Kumar Panigrahy, et al., 2012)
      • (Averin, 2020)
      • (Bai, Wang, Zhu, et al., 2021)
      • (Balduzzi, Egele, et al., 2010)
      • (Bandara, Rathnayake, et al., 2021)
      • (Basu, et al., 2024)
      • (Belli, Beyazit, Memon, 2012)
      • (Ben Jaballah, Kheir, et al., 2016)
      • (Bernard, Debar, et al., 2012)
      • (Bhingarkar, Shah, et al., 2017)
      • (Bisht, Hinrichs, et al., 2011)
      • (Bisht, Hinrichs, Skrupsky, et al., 2010)
      • (Bochmann, Das, Dssouli, 1991)
      • (Bojinov, Bursztein, et al., 2009)
      • (Calzavara, Conti, et al., 2019)
      • (Calzavara, Tolomei, et al., 2014)
      • (Calzavara, Tolomei, et al., 2015)
      • (Chanakya, Spoorthi, et al., 2024)
      • (Chandra, Kim, et al., 2011)
      • (Cheh, Tay, et al., 2022)
      • (Chen, Shi, 2018)
      • (Chinprutthiwong, Vardhan, et al., 2021)
      • (Cho, Kim, et al., 2016)
      • (Cohen, Myra B., et al., 2012)
      • (Cram, 2020)
      • (Crockford, 2008)
      • (D'silva, Vanajakshi, et al., 2017)
      • (Danglot, Vera-Perez, Yu, et al., 2019)
      • (Darmawan, Karim, et al., 2021)
      • (De Ryck, Desmet, et al., 2010)
      • (De Ryck, Nikiforakis, et al., 2013)
      • (Deepa, Thilagam, et al., 2018)
      • (Dilavrec, Khelladi, Blouin, et al., 2021)
      • (Doupe, Boe, et al., 2011)
      • (Eshete, Villafiorita, et al., 2013)
      • (Farah, Shojol, et al., 2016)
      • (Felsch, Heiderich, et al., 2015)
      • (Fonseka, Pashenna, et al., 2023)
      • (Gelernter, Grinstein, et al., 2015)
      • (Goues, Claire, Pradel et al., 2021)
      • (Hakim, 2023)
      • (Hazhirpasand, 2020)
      • (Heiderich, Niemietz, et al., 2012)
      • (Heiderich, Schwenk, et al., 2013)
      • (Hoffman, 2024)
      • (Huang, Cohen, Memon, 2010)
      • (Isatou, Abu Bakar, et al., 2015)
      • (Jeong, Hur, 2022)
      • (Johns, Braun, et al., 2011)
      • (Jueckstock, Kapravelos, et al., 2019)
      • (Kang, Lyu, et al., 2024)
      • (Katulanda, Henaka Arachchi, et al., 2023)
      • (Kaur, Tiwari, 2023)
      • (Keen, 2022)
      • (Khodayari, Barber, et al., 2024)
      • (Khodayari, Pellegrino, 2023)
      • (Kim, Lee, et al., 2024)
      • (Kim, Wang, Kwon, et al., 2023)
      • (Kim, Zheng, Park, et al., 2020)
      • (Kimak, Ellman, et al., 2012)
      • (Kimak, Ellman, et al., 2015)
      • (Klein, Musch, et al., 2022)
      • (Kluban, Mannan, et al., 2024)
      • (Kotcher, Pei, Jumde, et al., 2013)
      • (Kratky, Chuda, 2018)
      • (Krishnaraj, Madaan, et al., 2023)
      • (Le, Huu-Tung, Pham, et al., 2019)
      • (Lelli, Blouin, Baudry, 2015a)
      • (Lelli, Blouin, Baudry, 2015b)
      • (Leotta, Paparella, Ricca, 2024)
      • (Levi, Hazan, et al., 2019)
      • (Li, Xie, 2023)
      • (Li, Xue, et al., 2011)
      • (Li, Xue, et al., 2013)
      • (Li, Yan, et al., 2012)
      • (Linares-Vasquez, White, et al., 2018)
      • (Liu, An, et al., 2024)
      • (Liu, Shen, et al., 2020)
      • (Lv, Shi, et al., 2023)
      • (Macklon, Viggiato, Markos, et al., 2023)
      • (Maes, Heyman, et al., 2009)
      • (Maheshwari, Nayak, et al., 2024)
      • (Malviya, Saurav, et al., 2013)
      • (Mariani, Leonardo, et al., 2018)
      • (Marinescu, Parry, et al., 2017)
      • (Memon, Banerjee, Ishan, et al., 2003)
      • (Memon, Soffa, Mary, Pollack, 2001)
      • (Mohammed, Alkhathami, et al., 2021)
      • (Monshizadeh, Naldurg, et al., 2016)
      • (Mulliner, Robertson, Kirda, 2014)
      • (Mulliner, Robertson, Kirda, 2017)
      • (Muraleedharan, Thomas, et al., 2020)
      • (Myers et al., 2011)
      • (Nayak, Khandelwal, et al., 2024)
      • (Ndiaye, Barais, et al., 2019)
      • (Neef, Kleissner, et al., 2024)
      • (Nidhra, Dondeti, 2012)
      • (Offutt, Wu, Du, 2004)
      • (Olianas, Leotta, Ricca, et al., 2024)
      • (Onarlioglu, Buyukkayhan, et al., 2015)
      • (Onukrane, Skrodelis, et al., 2023)
      • (Papadopoulos, Snyder, et al., 2020)
      • (Patel, Rathod, et al., 2013)
      • (Pauli, 2013)
      • (Payet, Doupe, et al., 2013)
      • (Pelizzi, Sekar, et al., 2011)
      • (Pellegrino, Balzarotti, 2014)
      • (Peng Zhou, Yuhan Gao, et al., 2024)
      • (Ramadan, Osama, et al., 2024)
      • (Rauti, Leppänen, 2018)
      • (Rennhard, Kushnir, et al., 2022)
      • (Romano, Song, et al., 2021)
      • (Sadqi, Maleh, 2022)
      • (Saeedeh Sadat et al., 2022)
      • (Saini, Gaur, et al., 2015)
      • (Saleh, Malkawi, et al., 2024)
      • (Samudio, LaToza, 2022)
      • (Sanchez, 2020)
      • (Selim, Tayeb, et al., 2016)
      • (Sendiang, Polii, et al., 2016)
      • (Shahriar, Devendran, et al., 2013)
      • (Shahriar, Haddad, et al., 2015)
      • (Shahriar, Zulkernine, et al., 2010)
      • (Shar, Tan, et al., 2012)
      • (Sinha, Uppal, et al., 2014)
      • (Skrupsky, Bisht, et al., 2013)
      • (Skrupsky, Monshizadeh, et al., 2012)
      • (Solano, Camacho, et al., 2021)
      • (Soleimani, Hadavi, et al., 2017)
      • (Sood, Enbody, et al., 2011)
      • (Spero, Biddle, 2020)
      • (Spero, Biddle, 2021)
      • (Stamm, Sterne, et al., 2010)
      • (Subramani, Jueckstock, et al., 2021)
      • (Sun, Hawkey, et al., 2012)
      • (Sushma, Jayalakshmi, et al., 2022)
      • (Taibi, Mezzalira, 2022)
      • (Tkachenko et al., 2024)
      • (Trampert, Stock, et al., 2023)
      • (Unlu, Bicakci, et al., 2010)
      • (Upasana Sarmah, D.K. Bhattacharyya, et al., 2018)
      • (Ur Rehman, Nazir, Mustafa, 2017)
      • (Viticchie, Basile, Avancini, et al., 2016)
      • (Watson, 2007)
      • (Wei, Ryder, 2013)
      • (Weissbacher, Robertson, et al., 2015)
      • (West, Pulimood, et al., 2012)
      • (Williams, Vo, et al., 2019)
      • (Xu, Ni, Ming, et al., 2024)
      • (Ye, Zhang, Wang et al., 2016)
      • (Zaris, Gjermundrød, et al., 2014)
      • (Zhou, Zhang, Qian, et al., 2024)
      • (Zhu, 2021)
        • French Course 03-11-2025
        • French Course 03-18-2025
        • French Course 04-01-2025
        • French Course 04-08-2025
        • French Course 04-15-2025
        • French Course 05-13-2025
      • Code Generation
      • DevOps in declarative reconfigurations
      • Ethics in research. How to make your research more visible
      • Exploring the Intersections Between Law, Design and Computer Science in Privacy and Data Protection
      • First steps with Zotero
      • Introduction to Abaca (Inria compute cluster)
      • Supporting Metamodel and code co-evolution
      • Taming Large Language Models
      • The publishing trap
      • Towards Autonomous Test Agent
      • Visual Software QA (Quality Assurance) using VLM (Vision Language Models)
        • Paper list
        • Tags analysis
      • PhD status
      • References analysis
      • Temp_Definition
      • Temp_Literature
      • Temp_Reference
      • Temp_Webinars
    Home

    ❯

    01 Notes

    ❯

    Post-WIMP

    Post-WIMP

    Jun 27, 20251 min read

    • definition
    • GUI

    Definition

    A post-WIMP interface is one containing at least one interaction technique not dependent on classical 2D widgets such as menus and icons. Ultimately, it will involve all senses in parallel, natural language communication and multiple users.

    Post-WIMP: GUI that includes multi-event interactions, or multi-modal interactions or ad hoc widgets

    References

    (Lelli, Blouin, Baudry, 2015a) https://dl.acm.org/doi/pdf/10.1145/253671.253708


    Graph View

    • Definition
    • References

    Backlinks

    • ad hoc widgets

    Created with Quartz v4.4.0 © 2025

    • GitHub
    • Discord Community