{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:17:41Z","timestamp":1725733061990},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44857-1_4","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T14:48:42Z","timestamp":1413557322000},"page":"48-62","source":"Crossref","is-referenced-by-count":4,"title":["Plan It! Automated Security Testing Based on Planning"],"prefix":"10.1007","author":[{"given":"Franz","family":"Wotawa","sequence":"first","affiliation":[]},{"given":"Josip","family":"Bozic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1007\/978-3-540-45236-2_47","volume-title":"FME 2003: Formal Methods","author":"A. Armando","year":"2003","unstructured":"Armando, A., Compagna, L., Ganty, P.: Sat-based model-checking of security protocols using planning graph analysis. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol.\u00a02805, pp. 875\u2013893. Springer, Heidelberg (2003)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Blome, A., Ochoa, M., Li, K., Peroli, M., Dashti, M.T.: Vera: A flexible model-based vulnerability testing tool. In: Proceedings of the Sixth International Conference on Software Testing, Verification and Validation, ICST 2013 (2013)","DOI":"10.1109\/ICST.2013.65"},{"key":"4_CR3","unstructured":"Bozic, J., Wotawa, F.: Model-based testing - from safety to security. In: Proceedings of the 9th Workshop on Systems Testing and Validation (STV 2012), pp. 9\u201316 (October 2012)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Bozic, J., Wotawa, F.: Xss pattern for attack modeling in testing. In: Proceedings of the 8th International Workshop on Automation of Software Test, AST (2013)","DOI":"10.1109\/IWAST.2013.6595794"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bozic, J., Wotawa, F.: Security testing based on attack patterns. In: Proceedings of the 5th International Workshop on Security Testing, SECTEST 2014 (2014)","DOI":"10.1109\/ICSTW.2014.58"},{"key":"4_CR6","volume-title":"Conquest 2006","author":"M. Busch","year":"2006","unstructured":"Busch, M., Chaparadza, R., Dai, Z.R., Hoffmann, A., Lacmene, L., Ngwangwen, T., Ndem, G., Ogawa, H., Serbanescu, D., Schieferdecker, I., Zander-Nowicka, J.: Model transformers for test generation from system models. In: Conquest 2006. Hanser Verlag, Berlin (2006)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/0004-3702(71)90010-5","volume":"2","author":"R.E. Fikes","year":"1971","unstructured":"Fikes, R.E., Nilsson, N.J.: STRIPS: A New Approach to the Application of Theorem Proving to Problem Solving. Artificial Intelligence\u00a02, 189\u2013208 (1971)","journal-title":"Artificial Intelligence"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/3-540-45102-1_23","volume-title":"ECOOP 2000 - Object-Oriented Programming","author":"P. Fr\u00f6hlich","year":"2000","unstructured":"Fr\u00f6hlich, P., Link, J.: Automated test case generation from dynamic models. In: Bertino, E. (ed.) ECOOP 2000. LNCS, vol.\u00a01850, pp. 472\u2013491. Springer, Heidelberg (2000)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Galler, S.J., Zehentner, C., Wotawa, F.: Aiana: An ai planning system for test data generation. In: 1st Workshop on Testing Object-Oriented Software Systems, pp. 30\u201337 (2010)","DOI":"10.1145\/1890692.1890697"},{"key":"4_CR10","unstructured":"Hoffmann, J.: Extending ff to numerical state variables. In: Proceedings of the 15th European Conference on Artificial Intelligence (ECAI 2002), pp. 571\u2013575 (2002)"},{"key":"4_CR11","unstructured":"Hoglund, G., McGraw, G.: Exploiting Software: How to Break Code. Addison-Wesley (2004) ISBN: 0-201-78695-8"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1023\/A:1008607721339","volume":"4","author":"A.E. Howe","year":"1997","unstructured":"Howe, A.E., von Mayrhauser, A., Mraz, R.T.: Test case generation as an ai planning problem. Automated Software Engineering\u00a04, 77\u2013106 (1997)","journal-title":"Automated Software Engineering"},{"key":"4_CR13","unstructured":"Leitner, A., Bloem, R.: Automatic testing through planning. Technical report, Technische Universit\u00e4t Graz, Austria (2005)"},{"key":"4_CR14","unstructured":"Leitner, A.: Strategies to automatically test eiffel programs. Master\u2019s thesis, Technische Universit\u00e4t Graz, Austria (2004)"},{"key":"4_CR15","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1613\/jair.30","volume":"1","author":"N.J. Nilsson","year":"1994","unstructured":"Nilsson, N.J.: Teleo-reactive programs for agent control. Journal of Artificial Intelligence Research\u00a01, 139\u2013158 (1994)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"4_CR16","first-page":"250","volume-title":"Proceedings of The 10th International Symposium on Software Reliability Engineering","author":"M. Scheetz","year":"1999","unstructured":"Scheetz, M., von Mayrhauser, A., France, R., Dahlman, E., Howe, A.E.: Generating test cases from an oo model with an ai planning system. In: Proceedings of The 10th International Symposium on Software Reliability Engineering, pp. 250\u2013259. IEEE Computer Society, Washington, DC (1999)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Schieferdecker, I., Grossmann, J., Schneider, M.: Model-based security testing. In: Proceedings of the Model-Based Testing Workshop at ETAPS 2012, EPTCS, pp. 1\u201312 (2012)","DOI":"10.4204\/EPTCS.80.1"},{"key":"4_CR18","unstructured":"Schnelte, M., G\u00fcldali, B.: Test case generation for visual contracts using ai planning. In: Informatik, Beitr.ge der 40. Jahrestagung der Gesellschaft fuer Informatik e.V (GI), pp. 369\u2013374 (2010)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/11430230_20","volume-title":"Testing of Communicating Systems","author":"J. Zander","year":"2005","unstructured":"Zander, J., Dai, Z.R., Schieferdecker, I., Din, G.: From u2tp models to executable tests with ttcn-3 - an approach to model driven testing. In: Khendek, F., Dssouli, R. (eds.) TestCom 2005. LNCS, vol.\u00a03502, pp. 289\u2013303. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44857-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T18:01:24Z","timestamp":1558980084000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44857-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44857-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}