{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:04:44Z","timestamp":1740096284251,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389153"},{"type":"electronic","value":"9783642389160"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38916-0_11","type":"book-chapter","created":{"date-parts":[[2013,6,9]],"date-time":"2013-06-09T22:13:47Z","timestamp":1370816027000},"page":"178-196","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of ASLan Mutation Operators"],"prefix":"10.1007","author":[{"given":"Johan","family":"Oudinet","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Calvi","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"B\u00fcchler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Berglund, A., et al.: XML Path Language (XPath) 2.0, 2nd edn. (2007), \n                  \n                    http:\/\/www.w3.org\/TR\/xpath20\/"},{"key":"11_CR2","unstructured":"Ammann, P., Ding, W., Xu, D.: Using a model checker to test safety properties. In: ICECCS, pp. 212\u2013221 (2001)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. Journal of Applied Non-Classical Logics, Special Issue on Logic and Information Security, 403\u2013429 (2009)","DOI":"10.3166\/jancl.19.403-429"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-28756-5_19","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Armando","year":"2012","unstructured":"Armando, A., et al.: The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures. In: Flanagan, C., K\u00f6nig, B. (eds.) TACAS 2012. LNCS, vol.\u00a07214, pp. 267\u2013282. Springer, Heidelberg (2012)"},{"key":"11_CR5","unstructured":"AVANTSSAR. Deliverable 4.2: AVANTSSAR Validation Platform V.2. (2010a), \n                  \n                    www.avantssar.eu"},{"key":"11_CR6","unstructured":"AVANTSSAR. Deliverable 5.4: Assessment of the AVANTSSAR Validation Platform (2010b), \n                  \n                    www.avantssar.eu"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-21768-5_6","volume-title":"Tests and Proofs","author":"M. B\u00fcchler","year":"2011","unstructured":"B\u00fcchler, M., Oudinet, J., Pretschner, A.: Security mutants for property-based testing. In: Gogolla, M., Wolff, B. (eds.) TAP 2011. LNCS, vol.\u00a06706, pp. 69\u201377. Springer, Heidelberg (2011)"},{"key":"11_CR8","unstructured":"B\u00fcchler, M., Oudinet, J., Pretschner, A.: Semi-automatic security testing of web applications from a secure model. In: SERE, pp. 253\u2013262. IEEE (2012) ISBN 978-0-7695-4742-8"},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.scico.2011.03.011","volume":"78","author":"J.A. Clark","year":"2013","unstructured":"Clark, J.A., Dan, H., Hierons, R.M.: Semantic mutation testing. Science of Computer Programming\u00a078(4), 345\u2013363 (2013), \n                  \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167642311000992\n                  \n                  \n                , doi:10.1016\/j.scico.2011.03.011, ISSN 0167-6423","journal-title":"Science of Computer Programming"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Dadeau, F., H\u00e9am, P.-C., Kheddam, R.: Mutation-based test generation from security protocols in HLPSL. In: Software Testing, Verification and Validation (ICST), pp. 240\u2013248 (2011)","DOI":"10.1109\/ICST.2011.42"},{"key":"11_CR11","unstructured":"DeMillo, R.A., Lipton, R.J., Sayward, F.G.: Program Mutation: A New Approach to Program Testing. In: Infotech State of the Art Report, Software Testing, pp. 107\u2013126 (1979)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory\u00a02(29) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"issue":"5","key":"11_CR13","first-page":"649","volume":"37","author":"Y. Jia","year":"2011","unstructured":"Jia, Y., Harman, M.: An analysis and survey of the development of mutation testing. TSE\u00a037(5), 649\u2013678 (2011)","journal-title":"TSE"},{"key":"11_CR14","unstructured":"Kay, M.: XSL Transformations (XSLT) Version 2.0. (2007), \n                  \n                    http:\/\/www.w3.org\/TR\/xslt20\/"},{"key":"11_CR15","unstructured":"Saxonica\u00a0Limited, Kay, M.: SAXON - The XSLT and XQuery Processor (2012), \n                  \n                    http:\/\/saxon.sourceforge.net\/"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L.: The Open-source Fixed-point Model Checker for Symbolic Analysis of Security Protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007\/2008\/2009. LNCS, vol.\u00a05705, pp. 166\u2013194. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-03829-7_6"},{"key":"11_CR17","unstructured":"OWASP. OWASP WebGoat Project (2011), \n                  \n                    https:\/\/www.owasp.org\/index.php\/Category:OWASP_WebGoat_Project"},{"key":"11_CR18","unstructured":"Christey, S.: CWE\/SANS Top 25 Most Dangerous Software Errors (2011), \n                  \n                    http:\/\/cwe.mitre.org\/top25\/index.html"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1590\/S0104-65002002000100007","volume":"8","author":"A. da","year":"2002","unstructured":"da, A., Sim\u00e3o, S., Maldonado, J.C.: MuDeL: a language and a system for describing and generating mutants. Journal of the Brazilian Computer Society\u00a08, 73\u201386 (2002)","journal-title":"Journal of the Brazilian Computer Society"},{"key":"11_CR20","unstructured":"SPaCIoS. Deliverable 5.2: Proof of Concept and Tool Assessment V.2. (2012)"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/11805618_21","volume-title":"Term Rewriting and Applications","author":"M. Turuani","year":"2006","unstructured":"Turuani, M.: The cl-atse protocol analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol.\u00a04098, pp. 277\u2013286. Springer, Heidelberg (2006), \n                  \n                    http:\/\/dx.doi.org\/10.1007\/11805618_21"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-36103-0_48","volume-title":"Formal Methods and Software Engineering","author":"G. Wimmel","year":"2002","unstructured":"Wimmel, G., J\u00fcrjens, J.: Specification-based test generation for security-critical systems using mutations. In: George, C.W., Miao, H. (eds.) ICFEM 2002. LNCS, vol.\u00a02495, pp. 471\u2013482. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Tests and Proofs"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38916-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T20:19:54Z","timestamp":1557778794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38916-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389153","9783642389160"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38916-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}