{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T02:10:01Z","timestamp":1746324601720,"version":"3.40.4"},"publisher-location":"Cham","reference-count":72,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319100814"},{"type":"electronic","value":"9783319100821"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10082-1_1","type":"book-chapter","created":{"date-parts":[[2014,8,4]],"date-time":"2014-08-04T04:49:05Z","timestamp":1407127745000},"page":"1-33","source":"Crossref","is-referenced-by-count":2,"title":["Model-Based Testing for Functional and Security Test Generation"],"prefix":"10.1007","author":[{"given":"Fabrice","family":"Bouquet","sequence":"first","affiliation":[]},{"given":"Fabien","family":"Peureux","sequence":"additional","affiliation":[]},{"given":"Fabrice","family":"Ambert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"IEEE: IEEE Standard for Software and System Test Documentation. IEEE Std 829-2008 (2008)"},{"key":"1_CR2","unstructured":"Myers, G., Sandler, C., Badgett, T., Thomas, T.: The Art of Software Testing, 2nd edn. Wiley (2004) ISBN: 978-0-4714-6912-4"},{"key":"1_CR3","unstructured":"Dijkstra, E.: Notes on structured programming. Technical Report EWD249, Eindhoven University of Technology (1970)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-78917-8_1","volume-title":"Formal Methods and Testing","author":"J. Tretmans","year":"2008","unstructured":"Tretmans, J.: Model Based Testing with Labelled Transition Systems. In: Hierons, R.M., Bowen, J.P., Harman, M. (eds.) Formal Methods and Testing. LNCS, vol.\u00a04949, pp. 1\u201338. Springer, Heidelberg (2008)"},{"issue":"11","key":"1_CR5","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1109\/32.41326","volume":"15","author":"L.A. Clarke","year":"1989","unstructured":"Clarke, L.A., Podgurski, A., Richardson, D.J., Zeil, S.J.: A formal evaluation of data flow path selection criteria. IEEE Transactions on Software Engineering\u00a015(11), 1318\u20131332 (1989)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H. Zhu","year":"1997","unstructured":"Zhu, H., Hall, P., May, J.: Software Unit Test Coverage and Adequacy. ACM Computing Surveys\u00a029(4), 366\u2013427 (1997)","journal-title":"ACM Computing Surveys"},{"key":"1_CR7","unstructured":"Vilkomir, S., Bowen, J.: Formalization of software testing criteria using the Z notation. In: Proceedings of the 25th International Conference on Computer Software and Applications (COMPSAC 2001), Chicago, USA. IEEE Computer Society Press (October 2001)"},{"key":"1_CR8","first-page":"119","volume-title":"Proceedings of the 5th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 1999)","author":"A. Offutt","year":"1999","unstructured":"Offutt, A., Xiong, Y., Liu, S.: Criteria for generating specification-based tests. In: Proceedings of the 5th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 1999), pp. 119\u2013131. IEEE Computer Society Press, Las Vegas (1999)"},{"issue":"5","key":"1_CR9","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1049\/sej.1994.0025","volume":"9","author":"J. Chilenski","year":"1994","unstructured":"Chilenski, J., Miller, S.: Applicability of modified condition\/decision coverage to software testing. Software Engineering Journal\u00a09(5), 193\u2013200 (1994)","journal-title":"Software Engineering Journal"},{"key":"1_CR10","unstructured":"RTCA Committee SC-167: Software considerations in airborne systems and equipment certification, 7th draft to Do-178B\/ED-12A (July 1992)"},{"key":"1_CR11","volume-title":"Black-Box Testing: Techniques for Functional Testing of Software and Systems","author":"B. Beizer","year":"1995","unstructured":"Beizer, B.: Black-Box Testing: Techniques for Functional Testing of Software and Systems, 2nd edn. John Wiley & Sons, New York (1995)","edition":"2"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Legeard, B., Kosmatov, N., Peureux, F., Utting, M.: Boundary Coverage Criteria for Test Generation from Formal Models. In: Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), Saint-Malo, France, pp. 139\u2013150. IEEE Computer Society Press (November 2004)","DOI":"10.1109\/ISSRE.2004.12"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Prowell, S.J.: Jumbl: A tool for model-based statistical testing. In: HICSS, p. 337 (2003)","DOI":"10.1109\/HICSS.2003.1174916"},{"key":"1_CR14","first-page":"3","volume-title":"SEAS 2007: Proceedings of the 4th International Workshop on Software Engineering for Automotive Systems","author":"T. Bauer","year":"2007","unstructured":"Bauer, T., Bohr, F., Landmann, D., Beletski, T., Eschbach, R., Poore, J.: From requirements to statistical testing of embedded systems. In: SEAS 2007: Proceedings of the 4th International Workshop on Software Engineering for Automotive Systems, p. 3. IEEE Computer Society, Washington, DC (2007)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"le Guen, H., Marie, R.A., Thelin, T.: Reliability estimation for statistical usage testing using markov chains. In: ISSRE, pp. 54\u201365. Computer Society (2004)","DOI":"10.1109\/ISSRE.2004.33"},{"issue":"1","key":"1_CR16","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1002\/stvr.264","volume":"13","author":"A. Offutt","year":"2003","unstructured":"Offutt, A., Liu, S., Abdurazik, A., Ammann, P.: Generating test data from state-based specifications. The Journal of Software Testing, Verification and Reliability\u00a013(1), 25\u201353 (2003)","journal-title":"The Journal of Software Testing, Verification and Reliability"},{"issue":"10","key":"1_CR17","first-page":"915","volume":"34","author":"E. Bernard","year":"2004","unstructured":"Bernard, E., Legeard, B., Luck, X., Peureux, F.: Generation of test sequences from formal specifications: GSM 11-11 standard case study. Software: Practice and Experience\u00a034(10), 915\u2013948 (2004)","journal-title":"Software: Practice and Experience"},{"issue":"11","key":"1_CR18","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1016\/j.infsof.2009.06.012","volume":"51","author":"H. Zhu","year":"2009","unstructured":"Zhu, H., Belli, F.: Advancing test automation technology to meet the challenges of model-based software testing. Journal of Information and Software Technology\u00a051(11), 1485\u20131486 (2009)","journal-title":"Journal of Information and Software Technology"},{"key":"1_CR19","unstructured":"Utting, M., Legeard, B.: Practical Model-Based Testing - A tools approach. Elsevier Science (2006) ISBN 0 12 372501 1"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Dias-Neto, A., Travassos, G.: A Picture from the Model-Based Testing Area: Concepts, Techniques, and Challenges. Advances in Computers\u00a080, 45\u2013120 (2010) ISSN: 0065-2458","DOI":"10.1016\/S0065-2458(10)80002-6"},{"issue":"5","key":"1_CR21","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M. Utting","year":"2012","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Software Testing, Verification and Reliability\u00a022(5), 297\u2013312 (2012)","journal-title":"Software Testing, Verification and Reliability"},{"key":"1_CR22","unstructured":"OMG: Sysml documentation, http:\/\/www.omgsysml.org\/"},{"key":"1_CR23","volume-title":"The Z notation: a reference manual","author":"J.M. Spivey","year":"1992","unstructured":"Spivey, J.M.: The Z notation: a reference manual. Prentice Hall International (UK) Ltd., Hertfordshire (1992)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Abrial, J.R.: The B-Book. Cambridge University Press (1996)","DOI":"10.1017\/CBO9780511624162"},{"issue":"9","key":"1_CR25","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1109\/5.97300","volume":"79","author":"N. Halbwachs","year":"1991","unstructured":"Halbwachs, N., Caspi, P., Raymond, P., Pilaud, D.: The synchronous data flow programming language lustre. Proceedings of the IEEE\u00a079(9), 1305\u20131320 (1991)","journal-title":"Proceedings of the IEEE"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Bouquet, F., Grandpierre, C., Legeard, B., Peureux, F., Vacelet, N., Utting, M.: A subset of precise UML for model-based testing. In: A-MOST 2007, 3rd Int. Workshop on Advances in Model Based Testing, pp. 95\u2013104. ACM Press (2007)","DOI":"10.1145\/1291535.1291545"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Bouquet, F., Grandpierre, C., Legeard, B., Peureux, F.: A test generation solution to automate software testing. In: 3rd Int. Workshop on Automation of Software Test, AST 2008, Leipzig, Germany, pp. 45\u201348. ACM Press (May 2008)","DOI":"10.1145\/1370042.1370052"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Schieferdecker, I., Gro\u00dfmann, J., Schneider, M.: Model-Based Security Testing. In: Proceedings of the 7th Int. Workshop on Model-Based Testing (MBT 2012), Tallinn, Estonia. EPTCS, vol.\u00a080, pp. 1\u201312 (March 2012)","DOI":"10.4204\/EPTCS.80.1"},{"issue":"9","key":"1_CR29","first-page":"572","volume":"4","author":"G. Tian-yang","year":"2010","unstructured":"Tian-yang, G., Yin-sheng, S., You-yuan, F.: Research on Software Security Testing. World Academy of Science, Engineering and Technology\u00a04(9), 572\u2013576 (2010)","journal-title":"World Academy of Science, Engineering and Technology"},{"key":"1_CR30","unstructured":"Wichers, D.: Owasp top 10 (October 2013), https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project (last visited: May 2014)"},{"key":"1_CR31","unstructured":"MITRE: Common weakness enumeration (October 2013), http:\/\/cwe.mitre.org\/ (last visited: May 2014)"},{"key":"1_CR32","unstructured":"Whitehat: Website security statistics report (October 2013), https:\/\/www.whitehatsec.com\/assets\/WPstatsReport_052013.pdf (last visited: May 2014)"},{"key":"1_CR33","unstructured":"Felderer, M., Agreiter, B., Zech, P., Breu, R.: A classification for model-based security testing. In: The Third International Conference on Advances in System Testing and Validation Lifecycle, VALID 2011, pp. 109\u2013114 (2011)"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach, 1st edn. Springer Publishing Company, Incorporated (2010)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"1_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"issue":"1","key":"1_CR36","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.entcs.2008.11.008","volume":"220","author":"J. J\u00fcrjens","year":"2008","unstructured":"J\u00fcrjens, J.: Model-based security testing using UMLsec. Electron. Notes Theor. Comput. Sci.\u00a0220(1), 93\u2013104 (2008)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"1_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Bosik, B.S., Uyar, M.U.: Finite state machine based formal methods in protocol conformance testing: from theory to implementation. Computer Networks and ISDN Systems\u00a022(1), 7\u201333 (1991); 9th IFIP TC-6 International Symposium on Protocol Specification, Testing and Verification","DOI":"10.1016\/0169-7552(91)90079-R"},{"issue":"1","key":"1_CR39","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0167-6423(96)00032-9","volume":"29","author":"J.-C. Fernandez","year":"1997","unstructured":"Fernandez, J.-C., Jard, C., Jeron, T., Viho, C.: An experiment in automatic generation of test suites for protocols with verification technology. Science of Computer Programming\u00a029(1), 123\u2013146 (1997)","journal-title":"Science of Computer Programming"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Dadeau, F., H\u00e9am, P.C., Kheddam, R.: Mutation-based test generation from security protocols in HLPSL. In: Harman, M., Korel, B. (eds.) 4th Int. Conf. on Software Testing, Verification and Validation, ICST 2011, Berlin, Germany, pp. 240\u2013248. IEEE Computer Society Press (March 2011)","DOI":"10.1109\/ICST.2011.42"},{"key":"1_CR41","unstructured":"Sutton, M., Greene, A., Amini, P.: Fuzzing: brute force vulnerability discovery. Pearson Education (2007)"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Godefroid, P.: Random testing for security: blackbox vs. whitebox fuzzing. In: Proceedings of the 2nd International Workshop on Random Testing: Co-located with the 22nd IEEE\/ACM International Conference on Automated Software Engineering (ASE 2007), pp. 1. ACM (2007)","DOI":"10.1145\/1292414.1292416"},{"issue":"12","key":"1_CR43","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"B.P. Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An Empirical Study of the Reliability of UNIX Utilities. Commun. ACM\u00a033(12), 32\u201344 (1990)","journal-title":"Commun. ACM"},{"key":"1_CR44","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"A. Takanen","year":"2008","unstructured":"Takanen, A., DeMott, J., Miller, C.: Fuzzing for Software Security Testing and Quality Assurance. Artech House, Inc., Norwood (2008)"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Duchene, F., Groz, R., Rawat, S., Richier, J.L.: XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing. In: Proc. of the 5th Int. Conference on Software Testing, Verification and Validation (ICST 2012), Montreal, Canada, pp. 815\u2013817. IEEE CS (April 2012)","DOI":"10.1109\/ICST.2012.181"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Schieferdecker, I.: Model-Based Fuzzing for Security Testing. Keynote talk at the 3rd International Workshop on Security Testing (SECTEST 2012), Montreal, Canada (April 2012)","DOI":"10.1109\/ICST.2012.180"},{"key":"1_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-36757-1_6","volume-title":"System Analysis and Modeling: Theory and Practice","author":"M. Schneider","year":"2013","unstructured":"Schneider, M., Gro\u00dfmann, J., Tcholtchev, N., Schieferdecker, I., Pietschker, A.: Behavioral Fuzzing Operators for UML Sequence Diagrams. In: Haugen, \u00d8., Reed, R., Gotzhein, R. (eds.) SAM 2012. LNCS, vol.\u00a07744, pp. 88\u2013104. Springer, Heidelberg (2013)"},{"key":"1_CR48","unstructured":"Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., et al.: Organization based access control. In: Lutfiyya, H., Moffett, J., Garcia, F. (eds.) Policies for Distributed Systems and Networks (POLICY 2003), Como, January 01-December 31, pp. 120\u2013131. Institute of Electrical and Electronics Engineers (2003)"},{"key":"1_CR49","unstructured":"Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: Spl: An access control language for security policies and complex constraints. In: NDSS, vol.\u00a01 (2001)"},{"key":"1_CR50","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0304-3975(81)90110-9","volume":"13","author":"A. Pnueli","year":"1981","unstructured":"Pnueli, A.: The temporal semantics of concurrent programs. Theoretical Computer Science\u00a013, 45\u201360 (1981)","journal-title":"Theoretical Computer Science"},{"key":"1_CR51","unstructured":"Tan, L., Sokolsky, O., Lee, I.: Specification-based testing with linear temporal logic. In: IEEE Int. Conf. on Information Reuse and Integration, IRI 2004, pp. 413\u2013498 (November 2004)"},{"issue":"6","key":"1_CR52","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/318774.318939","volume":"24","author":"A. Gargantini","year":"1999","unstructured":"Gargantini, A., Heitmeyer, C.: Using model checking to generate tests from requirements specifications. SIGSOFT Softw. Eng. Notes\u00a024(6), 146\u2013162 (1999)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Ammann, P.E., Black, P.E., Majurski, W.: Using model checking to generate tests from specifications. In: 2nd IEEE Int. Conf. on Formal Engineering Methods, ICFEM 1998, pp. 46\u201354. IEEE Computer Society Press (December 1998)","DOI":"10.6028\/NIST.IR.6166"},{"issue":"4","key":"1_CR54","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s10009-004-0153-x","volume":"7","author":"C. Jard","year":"2005","unstructured":"Jard, C., J\u00e9ron, T.: Tgv: theory, principles and algorithms: A tool for the automatic synthesis of conformance test cases for non-deterministic reactive systems. Int. J. Softw. Tools Technol. Transf.\u00a07(4), 297\u2013315 (2005)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"1_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-31848-4_1","volume-title":"Formal Approaches to Software Testing","author":"L. Frantzen","year":"2005","unstructured":"Frantzen, L., Tretmans, J., Willemse, T.A.C.: Test generation based on symbolic specifications. In: Grabowski, J., Nielsen, B. (eds.) FATES 2004. LNCS, vol.\u00a03395, pp. 1\u201315. Springer, Heidelberg (2005)"},{"key":"1_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/3-540-46002-0_34","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"D. Clarke","year":"2002","unstructured":"Clarke, D., J\u00e9ron, T., Rusu, V., Zinovieva, E.: STG: A symbolic test generation tool. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol.\u00a02280, pp. 151\u2013173. Springer, Heidelberg (2002)"},{"key":"1_CR57","unstructured":"Tretmans, G.J., Brinksma, H.: TorX: Automated model-based testing. In: First European Conference on Model-Driven Software Engineering, Nuremberg, Germany, pp. 31\u201343 (December 2003)"},{"key":"1_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/3-540-36577-X_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"C. Bigot","year":"2003","unstructured":"Bigot, C., Faivre, A., Gallois, J.-P., Lapitre, A., Lugato, D., Pierron, J.-Y., Rapin, N.: Automatic test generation with AGATHA. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol.\u00a02619, pp. 591\u2013596. Springer, Heidelberg (2003)"},{"key":"1_CR59","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.entcs.2008.11.006","volume":"220","author":"B.K. Aichernig","year":"2008","unstructured":"Aichernig, B.K., Weiglhofer, M., Wotawa, F.: Improving fault-based conformance testing. Electron. Notes Theor. Comput. Sci.\u00a0220, 63\u201377 (2008)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"1_CR60","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.entcs.2004.02.084","volume":"116","author":"A. Bertolino","year":"2005","unstructured":"Bertolino, A., Marchetti, E., Muccini, H.: Introducing a reasonably complete and coherent approach for model-based testing. Electron. Notes Theor. Comput. Sci.\u00a0116, 85\u201397 (2005)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"1_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/3-540-45800-X_30","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"F. Basanieri","year":"2002","unstructured":"Basanieri, F., Bertolino, A., Marchetti, E.: The Cow_Suite approach to planning and deriving test suites in UML projects. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 383\u2013397. Springer, Heidelberg (2002)"},{"key":"1_CR62","unstructured":"Felderer, M., Breu, R., Chimiak-Opoka, J., Breu, M., Schupp, F.: Concepts for Model-based Requirements Testing of Service Oriented Systems. In: Proceedings of the IASTED International Conference, vol.\u00a0642, p. 018 (2009)"},{"key":"1_CR63","doi-asserted-by":"crossref","unstructured":"Fourneret, E., Ochoa, M., Bouquet, F., Botella, J., Jurjens, J., Yousefi, P.: Model-based security verification and testing for smart-cards. In: 6th International Conference on Availability, Reliability and Security, ARES 2011, pp. 272\u2013279. IEEE (2011)","DOI":"10.1109\/ARES.2011.46"},{"key":"1_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-540-24721-0_21","volume-title":"Fundamental Approaches to Software Engineering","author":"Y. Ledru","year":"2004","unstructured":"Ledru, Y., du Bousquet, L., Maury, O., Bontron, P.: Filtering TOBIAS combinatorial test suites. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol.\u00a02984, pp. 281\u2013294. Springer, Heidelberg (2004)"},{"key":"1_CR65","doi-asserted-by":"crossref","unstructured":"Ledru, Y., Dadeau, F., Du Bousquet, L., Ville, S., Rose, E.: Mastering combinatorial explosion with the TOBIAS-2 test generator. In: ASE 2007: Procs of the 22nd IEEE\/ACM Int. Conf. on Automated Software Engineering, pp. 535\u2013536 (2007)","DOI":"10.1145\/1321631.1321731"},{"key":"1_CR66","unstructured":"Maury, O., Ledru, Y., du Bousquet, L.: Int\u00e9gration de TOBIAS et UCASTING pour la g\u00e9n\u00e9ration des tests. In: 16th Int. Conf. on Software and Systems Engineering and their Applications, ICSSEA 2003, Paris, France (2003)"},{"key":"1_CR67","unstructured":"Van Aertryck, L., Jensen, T.: UML-CASTING: Test synthesis from UML models using constraint resolution. In: AFADL 2003 (2003)"},{"key":"1_CR68","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: 21st International Conference on Software Engineering, ICSE 1999, Los Angeles, California, United States, pp. 411\u2013420 (1999)","DOI":"10.1145\/302405.302672"},{"key":"1_CR69","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-38613-8_22","volume-title":"Integrated Formal Methods","author":"K.C. Castillos","year":"2013","unstructured":"Castillos, K.C., Dadeau, F., Julliand, J., Kanso, B., Taha, S.: A compositional automata-based semantics for property patterns. In: Johnsen, E.B., Petre, L. (eds.) IFM 2013. LNCS, vol.\u00a07940, pp. 316\u2013330. Springer, Heidelberg (2013)"},{"key":"1_CR70","unstructured":"Botella, J., Cao, P., Civeit, C., Gidoin, D., Peureux, F.: Model-Based Test Generation of Aircraft Traffic Attack Scenarios using ADS-B Standard Signals. In: 1-st User Conference on Advanced Automated Testing, UCAAT 2013, Paris, France (October 2013)"},{"key":"1_CR71","doi-asserted-by":"crossref","unstructured":"Botella, J., Bouquet, F., Capuron, J.F., Lebeau, F., Legeard, B., Schadle, F.: Model-Based Testing of Cryptographic Components \u2013 Lessons Learned from Experience. In: Proc. of the 6th Int. Conference on Software Testing, Verification and Validation (ICST 2013), Luxembourg, pp. 192\u2013201. IEEE CS (March 2013)","DOI":"10.1109\/ICST.2013.42"},{"key":"1_CR72","doi-asserted-by":"crossref","unstructured":"Lebeau, F., Legeard, B., Peureux, F., Vernotte, A.: Model-Based Vulnerability Testing for Web Applications. In: Proc. of the 4th Int. Workshop on Security Testing (SECTEST 2013), Luxembourg, pp. 445\u2013452. IEEE CS Press (March 2013)","DOI":"10.1109\/ICSTW.2013.58"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design VII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10082-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T01:54:28Z","timestamp":1746323668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10082-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319100814","9783319100821"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10082-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}