{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T06:22:55Z","timestamp":1766211775070,"version":"3.48.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10836-025-06209-y","type":"journal-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T05:55:51Z","timestamp":1762926951000},"page":"673-689","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Program-Output Estimator for Software Testing Using Program Analysis and Deep Learning Algorithms"],"prefix":"10.1007","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5202-6315","authenticated-orcid":false,"given":"Bahman","family":"Arasteh","sequence":"first","affiliation":[]},{"given":"Seyed Salar","family":"Sefati","sequence":"additional","affiliation":[]},{"given":"Peri","family":"Gunes","sequence":"additional","affiliation":[]},{"given":"Vahid","family":"Hosseinzadeh","sequence":"additional","affiliation":[]},{"given":"Farzad","family":"Kiani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,12]]},"reference":[{"issue":"2","key":"6209_CR1","doi-asserted-by":"publisher","first-page":"1837","DOI":"10.32604\/csse.2023.029703","volume":"45","author":"K Kamaraj","year":"2023","unstructured":"Kamaraj K, Lanitha B, Karthic S, Prakash PNS, Mahaveerakannan R (2023) A hybridized artificial neural network for an automated software test oracle. Comput Syst Sci Eng 45(2):1837\u20131850. https:\/\/doi.org\/10.32604\/csse.2023.029703","journal-title":"Comput Syst Sci Eng"},{"key":"6209_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-025-10620-6","volume":"30","author":"NU Eisty","year":"2025","unstructured":"Eisty NU, Kanewala U, Carver JC (2025) Testing research software: an in-depth survey of practices, methods, and tools. Empir Software Eng 30:81. https:\/\/doi.org\/10.1007\/s10664-025-10620-6","journal-title":"Empir Software Eng"},{"key":"6209_CR3","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.infsof.2018.11.004","volume":"107","author":"H Homaei","year":"2019","unstructured":"Homaei H, Shahriari HR (2019) Athena: a framework to automatically generate security test oracles via extracting policies from source code and intended software behaviour. Inf Softw Technol 107:112\u2013124. https:\/\/doi.org\/10.1016\/j.infsof.2018.11.004","journal-title":"Inf Softw Technol"},{"issue":"4","key":"6209_CR4","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10515-007-0022-3","volume":"14","author":"AJ Simons","year":"2007","unstructured":"Simons AJ (2007) JWalk: A tool for lazy, systematic testing of Java classes by design introspection and user interaction. Automated Softw Eng 14(4):369\u2013418. https:\/\/doi.org\/10.1007\/s10515-007-0022-3","journal-title":"Automated Softw Eng"},{"key":"6209_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2024.107531","volume":"177","author":"AA Yarifard","year":"2025","unstructured":"Yarifard AA, Araban S, Paydar S, Garousi V, Morisio M, Coppola R (2025) Extraction and empirical evaluation of GUI-level invariants as GUI oracles in mobile app testing. Inf Softw Technol 177:107531. https:\/\/doi.org\/10.1016\/j.infsof.2024.107531","journal-title":"Inf Softw Technol"},{"key":"6209_CR6","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.cl.2016.01.006","volume":"45","author":"H Guo","year":"2016","unstructured":"Guo H (2016) A semantic approach for automated test oracle generation. Comput Lang Syst Struct 45:204\u2013219. https:\/\/doi.org\/10.1016\/j.cl.2016.01.006","journal-title":"Comput Lang Syst Struct"},{"key":"6209_CR7","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.jss.2017.06.023","volume":"136","author":"M K\u0131ra\u00e7","year":"2018","unstructured":"K\u0131ra\u00e7 M, Aktemur B, S\u00f6zer H (2018) Visor: a fast image processing pipeline with scaling and translation invariance for test oracle automation of visual output systems. J Syst Softw 136:266\u2013277. https:\/\/doi.org\/10.1016\/j.jss.2017.06.023","journal-title":"J Syst Softw"},{"key":"6209_CR8","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10515-011-0094-z","volume":"19","author":"SR Shahamiri","year":"2012","unstructured":"Shahamiri SR, Wan-Kadir WMN, Ibrahim S, Hashim Siti Zaiton Mohd (2012) Artificial neural networks as multi-networks automated test oracle. Autom Softw Eng 19:303\u2013334. https:\/\/doi.org\/10.1007\/s10515-011-0094-z","journal-title":"Autom Softw Eng"},{"key":"6209_CR9","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.jss.2017.11.026","volume":"136","author":"R Carver","year":"2018","unstructured":"Carver R, Lei Y (2018) Stateless techniques for generating global and local test oracles for message-passing concurrent programs. J Syst Softw 136:237\u2013265. https:\/\/doi.org\/10.1016\/j.jss.2017.11.026","journal-title":"J Syst Softw"},{"issue":"12","key":"6209_CR10","doi-asserted-by":"publisher","first-page":"6771","DOI":"10.1007\/s00521-024-09429-z","volume":"36","author":"B Arasteh","year":"2024","unstructured":"Arasteh B, Aghaei B, Farzad B, Arasteh Keyvan, Kiani Farzad, Torkamanian-Afshar Mahsa (2024) Detecting SQL injection attacks by binary Gray Wolf optimizer and machine learning algorithms. Neural Comput Appl 36(12):6771\u20136792. https:\/\/doi.org\/10.1007\/s00521-024-09429-z","journal-title":"Neural Comput Appl"},{"issue":"1","key":"6209_CR11","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1108\/DTA-03-2020-0073","volume":"55","author":"MJ Hosseini","year":"2021","unstructured":"Hosseini MJ, Arasteh B, Isazadeh A, Mohsenzadeh M, Mirzarezaee M (2021) An error-propagation aware method to reduce the software mutation cost using genetic algorithm. Data Technol Appl 55(1):118\u2013148. https:\/\/doi.org\/10.1108\/DTA-03-2020-0073","journal-title":"Data Technol Appl"},{"key":"6209_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.compeleceng.2015.09.020","volume":"48","author":"B Arasteh","year":"2015","unstructured":"Arasteh B, Bouyer A, Pirahesh S (2015) An efficient vulnerability-driven method for hardening a program against soft errors using genetic algorithm. Comput Electr Eng 48:25\u201343. https:\/\/doi.org\/10.1016\/j.compeleceng.2015.09.020","journal-title":"Comput Electr Eng"},{"key":"6209_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s10836-014-5438-8","volume":"30","author":"B Arasteh","year":"2014","unstructured":"Arasteh B, Miremadi SG, Rahmani AM (2014) Developing inherently resilient software against soft errors based on algorithm-level inherent features. J Electron Test 30:193\u2013212. https:\/\/doi.org\/10.1007\/s10836-014-5438-8","journal-title":"J Electron Test"},{"key":"6209_CR14","unstructured":"https:\/\/github.com\/bahmanarasteh\/STO-Hos.git"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06209-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-025-06209-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06209-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T04:14:00Z","timestamp":1766204040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-025-06209-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":14,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["6209"],"URL":"https:\/\/doi.org\/10.1007\/s10836-025-06209-y","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2025,11,12]]},"assertion":[{"value":"8 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors state that this study is their original work and has not been previously published elsewhere. The paper is not currently being considered for publication elsewhere. The paper accurately reflects the author\u2019s research and analysis.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"All authors state that there is no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}