{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T10:41:20Z","timestamp":1774435280905,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T00:00:00Z","timestamp":1519776000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Swedish Knowledge Foundation","award":["20130085"],"award-info":[{"award-number":["20130085"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s10270-018-0655-8","type":"journal-article","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T04:26:05Z","timestamp":1519791965000},"page":"913-936","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Testing concurrent user behavior of synchronous web applications with Petri nets"],"prefix":"10.1007","volume":"18","author":[{"given":"Jeff","family":"Offutt","sequence":"first","affiliation":[]},{"given":"Sunitha","family":"Thummala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,28]]},"reference":[{"key":"655_CR1","unstructured":"comScore.: Cyber Monday jumps 18 percent to $1.735 billion in desktop sales to rank as heaviest U.S. online spending day in history, Online, December 3rd 2013. http:\/\/www.comscore.com\/Insights\/Press-Releases\/2013\/12\/Cyber-Monday-Jumps-18-Percent-to-1735-Billion-in-Desktop-Sales-to-Rank-as-Heaviest-US-Online-Spending-Day-in-History (2013). Accessed Jan 2015"},{"key":"655_CR2","unstructured":"Pollock, R.: Troubled Obamacare website wasn\u2019t tested until a week before launch, Online, October 17th 2013. http:\/\/www.washingtonexaminer.com\/troubled-obamacare-website-wasnt-tested-until-a-week-before-launch\/article\/2537381 (2013). Accessed Jan 2015"},{"key":"655_CR3","unstructured":"Epstein, Z.: Pokemon Go fans, we have some bad news about all those annoying bugs, August 2016. http:\/\/bgr.com\/2016\/08\/04\/pokemon-go-news-update-2016-bugs-glitches\/ (2016). Accessed July 2017"},{"key":"655_CR4","unstructured":"Humphery-Jenner, M.: What went wrong with Pokemon Go? Three lessons from its plummeting player numbers, October 2016, https:\/\/phys.org\/news\/2016-10-wrong-pokmon-lessons-plummeting-player.html (2016). Accessed July 2017"},{"key":"655_CR5","unstructured":"Hamill, J., Moorhead, A.: Gamers furious as Pokemon Go RESETS their progress through the game, August 2016. https:\/\/www.thesun.co.uk\/news\/1533456\/gamers-furious-as-pokemon-go-resets-their-progress-through-the-game\/ (2016). Accessed July 2017"},{"key":"655_CR6","unstructured":"Bugs, glitches, freezes, and fixes, May 2017. http:\/\/www.ign.com\/wikis\/pokemon-go\/Bugs,_Glitches,_Freezes,_and_Fixes (2017). Accessed July 2017"},{"key":"655_CR7","unstructured":"Roy, P.V., Haridi, S.: Concepts, Techniques, and Models of Computer Programming. The MIT Press, Cambridge (2004), ISBN: 0262220695"},{"key":"655_CR8","unstructured":"Gupt, S.: Target black Friday cancellation fiasco, Online, December 7th 2010. http:\/\/ireport.cnn.com\/docs\/DOC-526674 (2010). Accessed Jan 2015"},{"key":"655_CR9","unstructured":"Hall, M.: Core Servlets and JavaServer Pages. Prentice Hall, Upper Saddle River (2001), ISBN: 0076092036876"},{"key":"655_CR10","unstructured":"BlaineDonley, Offutt, J.: Web Application Testing Challenges, (2009), Unpublished research. http:\/\/www.quaso.com\/knowledge-base\/Web-Application-Testing-Complexities-v1.1.pdf (2009). Accessed Aug 2015"},{"key":"655_CR11","doi-asserted-by":"crossref","unstructured":"Thummala, S., Offutt, J.: Using Petri nets to test concurrent behavior of web applications. In: 12th Advances in Model Based Testing (A-MOST) Workshop of the International Conference on Software Testing, Verification and Validation, IEEE, April (2016), pp. 189\u2013198","DOI":"10.1109\/ICSTW.2016.15"},{"key":"655_CR12","unstructured":"Garrett, J.J.: Ajax: a new approach to web applications, Online, 2006. http:\/\/adaptivepath.org\/ideas\/ajax-new-approach-web-applications\/ (2006). Accessed May 2015"},{"issue":"2","key":"655_CR13","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10270-009-0125-4","volume":"9","author":"J Offutt","year":"2010","unstructured":"Offutt, J., Wu, Y.: Modeling presentation layers of web applications for testing. Softw. Syst. Modeling 9(2), 257\u2013280 (2010)","journal-title":"Softw. Syst. Modeling"},{"key":"655_CR14","unstructured":"Wikipedia.: World wide web. https:\/\/en.wikipedia.org\/wiki\/World_Wide_Web (2004). Accessed 20 Jan 2015"},{"key":"655_CR15","unstructured":"Wikipedia.: Web application. http:\/\/en.wikipedia.org\/wiki\/Web_application (2004). Accessed 20 Jan 2015"},{"key":"655_CR16","unstructured":"Mordani, R.: Java servlet specification 3.0, online, December 2009. http:\/\/download.oracle.com\/otn-pub\/jcp\/servlet-3.0-fr-eval-oth-JSpec\/servlet-3_0-final-spec.pdf (2009). Accessed June 2015"},{"key":"655_CR17","unstructured":"Aggarwal, G., Bursztein, E., Jackson, C., Boneh, D.: An analysis of private browsing modes in modern browsers. In: Proceedings of the 19th USENIX Conference on Security. USENIX Association, pp. 6\u20136. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=1929820.1929828 (2010)"},{"key":"655_CR18","unstructured":"Wikipedia.: Privacy mode. https:\/\/en.wikipedia.org\/wiki\/Privacy_mode (2016). Accessed Feb 2016"},{"key":"655_CR19","doi-asserted-by":"crossref","unstructured":"Zhao, B., Liu, P.: \u201cPrivate browsing mode not really that private: Dealing with privacy breach caused by browser extensions,\u201d In 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN).IEEE, (2015), pp. 184\u2013195","DOI":"10.1109\/DSN.2015.18"},{"key":"655_CR20","unstructured":"Ian Hickson, I.: Google, Web storage W3C recommendation, Online. http:\/\/www.w3.org\/TR\/webstorage\/ (2012). Accessed Jan 2015"},{"key":"655_CR21","unstructured":"Zakas, N.C.: Introduction to session storage, Online. http:\/\/www.nczonline.net\/blog\/2009\/07\/21\/introduction-to-sessionstorage\/ (2009). Accessed Jan 2015"},{"key":"655_CR22","volume-title":"Java Concurrency in Practice","author":"B G\u00f6etz","year":"2006","unstructured":"G\u00f6etz, B., Peierls, T., Bloch, J., Bowbeer, J., Holmes, D., Lea, D.: Java Concurrency in Practice. Addison-Wesley, Boston (2006)"},{"key":"655_CR23","unstructured":"Petri, C.A.: Communication with automata, New York: Griffiss Air Force Base. Technical Report RADCTR-65-377, vol. 1, (1966)"},{"issue":"4","key":"655_CR24","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata, T.: Petri nets: properties, analysis and applications. Proc IEEE 77(4), 541\u2013580 (1989)","journal-title":"Proc IEEE"},{"key":"655_CR25","doi-asserted-by":"crossref","unstructured":"Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Springer, Berlin, (1997), ISBN: 3642082009","DOI":"10.1007\/978-3-642-60794-3"},{"key":"655_CR26","doi-asserted-by":"crossref","unstructured":"Bernardinello, L., De Cindio, F.: A survey of basic net models and modular net classes. In: Rozenberg G (ed.) Advances in Petri Nets, pp. 304\u2013351. Springer, Berlin (1992)","DOI":"10.1007\/3-540-55610-9_177"},{"key":"655_CR27","doi-asserted-by":"crossref","unstructured":"Genrich, H.J., Lautenbach, K., Thiagarajan, P.: Elements of general net theory. Net Theory and Applications, pp. 21\u2013163. Springer, Berlin (1980)","DOI":"10.1007\/3-540-10001-6_22"},{"key":"655_CR28","doi-asserted-by":"crossref","unstructured":"Reisig, W.: Place\/Transition Systems. Petri Nets: Central Models and Their Properties, pp. 117\u2013141. Springer, Berlin (1987)","DOI":"10.1007\/978-3-540-47919-2_6"},{"key":"655_CR29","unstructured":"RTCA-DO-178B, Software considerations in airborne systems and equipment certification, (1992)"},{"key":"655_CR30","doi-asserted-by":"crossref","unstructured":"Ammann, P., Offutt, J., Huang, H.: Coverage criteria for logical expressions. In: IEEE 14th International Symposium on Software Reliability Engineering, pp. 99\u2013107 (2003)","DOI":"10.1109\/ISSRE.2003.1251034"},{"key":"655_CR31","doi-asserted-by":"crossref","unstructured":"Ammann, P., Offutt, J.: Introduction to Software Testing, 2nd ed. Cambridge University Press, Cambridge (2017), ISBN 978-1107172012","DOI":"10.1017\/9781316771273"},{"key":"655_CR32","doi-asserted-by":"crossref","unstructured":"Veanes, M., Campbell, C., Grieskamp, W., Schulte, W., Tillmann, N., Nachmanson, L.: Model-based testing of object-oriented reactive systems with Spec Explorer. In: Formal Methods and Testing, LNCS 4949, pp. 39\u201376. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-78917-8_2"},{"key":"655_CR33","doi-asserted-by":"crossref","unstructured":"Offutt, J., Abdurazik, A.: Generating tests from UML specifications. In: Proceedings of the Second IEEE International Conference on the Unified Modeling Language (UML99). Springer, Fort Collins. Lecture Notes in Computer Science vol 1723, pp. 416\u2013429 (1999)","DOI":"10.1007\/3-540-46852-8_30"},{"issue":"2","key":"655_CR34","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1459352.1459354","volume":"41","author":"RM Hierons","year":"2009","unstructured":"Hierons, R.M., Bogdanov, K., Bowen, J., Cleaveland, R., Derrick, J., Dick, J., Gheorghe, M., Harman, M., Kapoor, K., Krause, P., Luettgen, G., Simons, A., Vilkomir, S., Woodward, M., Zedan, H.: Using formal specifications to support testing. ACM Comput Surv 41(2), 9 (2009)","journal-title":"ACM Comput Surv"},{"issue":"5","key":"655_CR35","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M Utting","year":"2012","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Softw Test Verif Reliab 22(5), 297\u2013312 (2012)","journal-title":"Softw Test Verif Reliab"},{"issue":"4","key":"655_CR36","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TSE.2016.2597136","volume":"43","author":"N Li","year":"2017","unstructured":"Li, N., Offutt, J.: Test oracle strategies for model-based testing. IEEE Trans Softw Eng 43(4), 372\u2013395 (2017)","journal-title":"IEEE Trans Softw Eng"},{"key":"655_CR37","doi-asserted-by":"crossref","unstructured":"Fehling, R.: A concept of Hierarchical Petri Nets with Building Blocks. In: Rozenberg G (ed.) Advances in Petri nets, pp. 148\u2013168. Springer, Berlin (1993)","DOI":"10.1007\/3-540-56689-9_43"},{"issue":"3","key":"655_CR38","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s10270-004-0077-7","volume":"4","author":"AA Andrews","year":"2005","unstructured":"Andrews, A.A., Offutt, J., Alexander, R.T.: Testing web applications by modeling with FSMs. Softw Syst Model 4(3), 326\u2013345 (2005)","journal-title":"Softw Syst Model"},{"issue":"4","key":"655_CR39","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1016\/0026-2714(91)90007-T","volume":"31","author":"W Zuberek","year":"1991","unstructured":"Zuberek, W.: Timed Petri nets definitions, properties, and applications. Microelectron Reliab 31(4), 627\u2013644 (1991)","journal-title":"Microelectron Reliab"},{"issue":"1","key":"655_CR40","first-page":"134","volume":"1","author":"GK Larsen","year":"1997","unstructured":"Larsen, G.K., Pettersson, P., Yi, W.: Uppaal in a nutshell. Int J Softw ToolsTechnolTrans 1(1), 134\u2013152 (1997)","journal-title":"Int J Softw ToolsTechnolTrans"},{"key":"655_CR41","unstructured":"Platform independent Petri net Editor 2 (PIPE2): Open source software. http:\/\/pipe2.sourceforge.net\/index.html 2002. Accessed 20 June 2016"},{"key":"655_CR42","unstructured":"ArgoUML: open source software. http:\/\/argouml.tigris.org\/ (2002). Accessed 20 June 2016"},{"key":"655_CR43","doi-asserted-by":"crossref","unstructured":"Larsen, K.G., Pettersson, P., Yi, W.: Model-checking for real-time systems. In: Proceedings of Fundamentals of Computation Theory, ser. Lecture Notes in Computer Science, no. 965, pp. 62\u201388 (1995)","DOI":"10.1007\/3-540-60249-6_41"},{"key":"655_CR44","unstructured":"Wikipedia.: Petri nets. https:\/\/en.wikipedia.org\/wiki\/Petri_net#Restrictions (2003). Accessed 20 June 2016"},{"issue":"3","key":"655_CR45","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1002\/stvr.402","volume":"19","author":"G Fraser","year":"2009","unstructured":"Fraser, G., Wotawa, F., Ammann, P.E.: Testing with model checkers: a survey. Softw Test Verif Reliab 19(3), 215\u2013261 (2009). https:\/\/doi.org\/10.1002\/stvr.402","journal-title":"Softw Test Verif Reliab"},{"key":"655_CR46","unstructured":"Salgado, M.R.M.: Towards verifying petri nets: a model checking approach, Unpublished Master\u2019s research project. http:\/\/eprints.sim.ucm.es\/11488\/1\/M._Rosa_Martos-Master_2010.pdf (2009). Accessed June 2016"},{"key":"655_CR47","doi-asserted-by":"crossref","unstructured":"Cheng, A., Christensen, S., Mortensen, K.H.: Model checking coloured Petri nets-exploiting strongly connected components. In: Proceedings of International Workshop on Discrete Event Systems, pp. 169\u2013177 (1997)","DOI":"10.7146\/dpb.v26i519.7048"},{"key":"655_CR48","doi-asserted-by":"publisher","unstructured":"Gardey, G., Lime, D., Magnin, M., Roux, O.H.: Romeo: a tool for analyzing time petri nets. In: 17th International Conference on Computer Aided Verification. Edinburgh, Scotland, UK: Springer, July 2005, pp. 418\u2013423. [Online]. Available: https:\/\/doi.org\/10.1007\/11513988_41","DOI":"10.1007\/11513988_41"},{"issue":"1","key":"655_CR49","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"W Aalst Van Der","year":"1998","unstructured":"Van Der Aalst, W.: The application of Petri nets to workflow management. J Circuits Syst Comput 8(1), 21\u201366 (1998)","journal-title":"J Circuits Syst Comput"},{"key":"655_CR50","doi-asserted-by":"crossref","unstructured":"Bernardi, S., Donatelli, S., Merseguer, J.: From UML sequence diagrams and statecharts to analysable Petri net models. In: Proceedings of the Third International Workshop on Software and Performance. New York, USA: ACM, (2002), pp. 35\u201345","DOI":"10.1145\/584369.584376"},{"key":"655_CR51","unstructured":"Group, O.M.: Documents associated with object constraint language, version 2.0. online, May 2006. http:\/\/www.omg.org\/spec\/OCL\/2.0\/ (2006). Accessed July 2017"},{"key":"655_CR52","unstructured":"Platform independent Petri net editor 2, Open source software. http:\/\/pipe2.sourceforge.net (2007). Accessed Jan 2015"},{"key":"655_CR53","unstructured":"Ammann, P., Offutt, J., Xu, W., Li, N.: Coverage computation web applications. Online. https:\/\/cs.gmu.edu:8080\/offutt\/coverage\/ (2008). Accessed July 2016"},{"key":"655_CR54","doi-asserted-by":"crossref","unstructured":"Billington, J., Christensen, S., van Hee, K., Kindler, E., Kummer, O., Petrucci, L., Post, R., Stehno, C., Weber, M.: The Petri net markup language: Concepts, technology, and tools. In: 24th International Conference of Applications and Theory of Petri Nets (ICATPN), W. M. P. van der Aalst and E. Best, Eds, pp. 483\u2013505. Springer, Berlin (2003)","DOI":"10.1007\/3-540-44919-1_31"},{"key":"655_CR55","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wesslen, A.: Experimentation in Software Engineering: An introduction. Kluwer Academic Publishers, Norwell (2008), ISBN: 0-7923-8682-5"},{"key":"655_CR56","unstructured":"Darondeau, P., Demri, S., Meyer, R., Morvan, C.: Petri net reachability graphs: decidability status of FO properties. In: 31st International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), pp. 140\u2013151 (2011)"},{"key":"655_CR57","unstructured":"GitHub.: Github: The largest open source community in the world. https:\/\/github.com\/open-source (2007). Accessed 20 June 2016"},{"key":"655_CR58","unstructured":"Students3K.: Open source software: an educational website. http:\/\/projects.students3k.com\/ (2012). Accessed 20 June 2016"},{"key":"655_CR59","unstructured":"Danial, A.: CLOC: count lines of code. Online, 2006 https:\/\/github.com\/AlDanial\/cloc (2006). Accessed June 2016"},{"key":"655_CR60","unstructured":"StackOverFlow.com.: Session mix-up using stateserver. Online, December 7th 2010, http:\/\/stackoverflow.com\/questions\/1646274\/asp-net-session-mix-up-using-stateserver-scary (2010). Accessed Jan 2015"},{"key":"655_CR61","unstructured":"StackOverFlow.com.: Mixing user session data in JBoss, Online, December 2013, http:\/\/stackoverflow.com\/questions\/20706567\/mixing-user-session-data-in-jboss (2013). Accessed Jan 2015"},{"key":"655_CR62","unstructured":"Durbin, P.: User sessions mixed up when Java app deployed to glassfish, Online, October 2014, http:\/\/shibboleth.net\/pipermail\/users\/2014-October\/017878.html (2014). Accessed Jan 2015"},{"key":"655_CR63","volume-title":"Practical Statistics Simply Explained","author":"R Langley","year":"1971","unstructured":"Langley, R.: Practical Statistics Simply Explained. Dover Publications, New York (1971)"},{"issue":"1","key":"655_CR64","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/64789.64791","volume":"7","author":"PD Stotts","year":"1989","unstructured":"Stotts, P.D., Furuta, R.: Petri-net-based hypertext: Document structure with browsing semantics. ACM Trans Inf Syst 7(1), 3\u201329 (1989)","journal-title":"ACM Trans Inf Syst"},{"key":"655_CR65","doi-asserted-by":"crossref","unstructured":"Stotts, D., Navon, J.: Model checking cobweb protocols for verification of HTML frames behavior. In: Proceedings of the 11th International Conference On World Wide Web, pp. 182\u2013190. ACM Press, New York (2002)","DOI":"10.1145\/511446.511470"},{"key":"655_CR66","doi-asserted-by":"crossref","unstructured":"Chachkov, S., Buchs, D.: From formal specifications to ready-to-use software components: The concurrent object oriented Petri net approach. In: International Conference on Application of Concurrency to System Design, pp. 99\u2013110 (2001)","DOI":"10.1109\/CSD.2001.981768"},{"key":"655_CR67","unstructured":"Hamadi, R., Benatallah, B.: A Petri net-based model for web service composition. In: Proceedings of the 14th Australasian Database Conference, vol. 17, pp. 191\u2013200 (2003)"},{"key":"655_CR68","unstructured":"Grigore, L., Buy, U.: Enforcing safety properties in web applications using Petri nets. In: Proceedings of the 9th IASTED International Conference, vol. 632, p. 33 (2008)"},{"issue":"8","key":"655_CR69","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/S0950-5849(02)00048-4","volume":"44","author":"H Zhu","year":"2002","unstructured":"Zhu, H., He, X.: A methodology of testing high-level Petri nets. Inf Softw Technol 44(8), 473\u2013489 (2002)","journal-title":"Inf Softw Technol"},{"key":"655_CR70","doi-asserted-by":"crossref","unstructured":"Adjir, N., De Saqui-Sannes, P., Rahmouni, K.M.: Testing real-time systems using TINA. In: Testing of Software and Communication Systems, pp. 1\u201315. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-05031-2_1"},{"key":"655_CR71","unstructured":"Lill, R., Saglietti, F.: Test coverage criteria for autonomous mobile systems based on colored Petri nets. In: Ninth Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems, pp. 155\u2013162 (2012)"},{"key":"655_CR72","doi-asserted-by":"crossref","unstructured":"Pugh, W., Ayewah, N.: Unit testing concurrent software. In : Proceedings of the 22nd IEEE\/ACM International Conference on Automated Software Engineering, pp. 513\u2013516 (2007)","DOI":"10.1145\/1321631.1321722"},{"issue":"3","key":"655_CR73","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/226295.226298","volume":"21","author":"PV Koppol","year":"1996","unstructured":"Koppol, P.V., Tai, K.-C.: An incremental approach to structural testing of concurrent software. SIGSOFT Softw Eng Notes 21(3), 14\u201323 (1996)","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"655_CR74","doi-asserted-by":"crossref","unstructured":"Ricca, F., Tonella, P.: Analysis and testing of web applications. In: IEEE 23rd International Conference on Software Engineering (ICSE), pp. 25\u201334. Toronto, CA (2001)","DOI":"10.1109\/ICSE.2001.919078"},{"key":"655_CR75","unstructured":"Benedikt, M., Freire, J., Godefroid, P.: VeriWeb: automatically testing dynamic web sites. In: Proceedings of 11th International World Wide Web Conference, pp. 654\u2013668 (2002)"},{"issue":"2","key":"655_CR76","first-page":"25","volume":"19","author":"J Offutt","year":"2002","unstructured":"Offutt, J.: Quality attributes of Web software applications. IEEE Softw Spec Issue Softw Eng Internet Softw 19(2), 25\u201332 (2002)","journal-title":"IEEE Softw Spec Issue Softw Eng Internet Softw"},{"key":"655_CR77","doi-asserted-by":"crossref","unstructured":"Guerra, E., Sanz, D., D\u00edaz, P., Aedo, I.: A transformation-driven approach to the verification of security policies in web designs. In: Web Engineering, pp. 269\u2013284. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-73597-7_22"},{"issue":"3","key":"655_CR78","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TSE.2005.36","volume":"31","author":"S Elbaum","year":"2005","unstructured":"Elbaum, S., Rothermel, G., Karre, S., Fisher, M.: Leveraging user-session data to support web application testing. IEEE Trans Softw Eng 31(3), 187\u2013202 (2005)","journal-title":"IEEE Trans Softw Eng"},{"key":"655_CR79","doi-asserted-by":"crossref","unstructured":"Di Lucca, G.A., Di Penta, M.: Considering browser interaction in web application testing. In: IEEE Fifth International Workshop on Web Site Evolution, pp. 74\u201381 (2003)","DOI":"10.1109\/WSE.2003.1234011"}],"container-title":["Software &amp; Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-018-0655-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-018-0655-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-018-0655-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T23:59:26Z","timestamp":1660521566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-018-0655-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,28]]},"references-count":79,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["655"],"URL":"https:\/\/doi.org\/10.1007\/s10270-018-0655-8","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,28]]},"assertion":[{"value":"13 September 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}