You are on page 1of 2

1 INTRODUCTION

Explain your motivation in this project.. How did you select the contract tracing applications?
Explain which contract tracing applications you selected.
Explain which tools you selected for testing.
….

2 CONTRACT TRACING APPLICATIONS


Explain how you compiled/built/run the contract tracing application…

3 APPLIED TESTING APPROACHES

3.1 UNIT TESTING


Explain how you applied junit testing

3.2 SYSTEM TESTING


Describe what you have done for this testing

3.3 SECURITY TESTING


Describe what you have done for this testing

3.4 PERFORMANCE TESTING


Describe what you have done for this testing

3.5 MUTATION TESTING


Describe what you have done for this testing

Figure 1-SLR process used in this study (sample caption for figure)

4 LESSONS LEARNED
Explain the lessons learned here…what were the challenges? How did you handle these challenges?

Table 4. Distribution of papers per journal (sample caption for table)

5 CONCLUSION
The contributions of this article are three-fold:

3
6 REFERENCES
[1] Gibert, D., Mateu, C., & Planes, J. (2020). The rise of machine learning for detection and classification of malware: Research
developments, trends and challenges. Journal of Network and Computer Applications, 153, 102526.
[2] Carlin, D., Burgess, J., O'Kane, P., & Sezer, S. (2019). You could be mine (d): the rise of cryptojacking. IEEE Security & Privacy, 18(2),
16-22.

You might also like