{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T04:21:03Z","timestamp":1765772463628,"version":"3.40.2"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T00:00:00Z","timestamp":1742515200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T00:00:00Z","timestamp":1742515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03800-0","type":"journal-article","created":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T00:43:06Z","timestamp":1742690586000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Mechanized Method for Risk-Based Test Case Generation and Prioritization by an Improved Correlation System"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8233-5144","authenticated-orcid":false,"given":"Durga Praveen","family":"Deevi","sequence":"first","affiliation":[]},{"given":"Naga Sushma","family":"Allur","sequence":"additional","affiliation":[]},{"given":"Koteswararao","family":"Dondapati","sequence":"additional","affiliation":[]},{"given":"Himabindu","family":"Chetlapalli","sequence":"additional","affiliation":[]},{"given":"Sharadha","family":"Kodadi","sequence":"additional","affiliation":[]},{"given":"Thinagaran","family":"Perumal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,21]]},"reference":[{"key":"3800_CR1","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10270-016-0569-2","volume":"18","author":"M Al-Hajjaji","year":"2019","unstructured":"Al-Hajjaji M, Th\u00fcm T, Lochau M, Meinicke J, Saake G. Effective product-line testing using similarity-based product prioritization. Softw Syst Model. 2019;18:499\u2013521.","journal-title":"Softw Syst Model"},{"issue":"9","key":"3800_CR2","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TSE.2018.2811489","volume":"45","author":"R Matinnejad","year":"2018","unstructured":"Matinnejad R, Nejati S, Briand LC, Bruckmann T. Test generation and test prioritization for Simulink models with dynamic behaviour. IEEE Trans Software Eng. 2018;45(9):919\u201344.","journal-title":"IEEE Trans Software Eng"},{"key":"3800_CR3","doi-asserted-by":"crossref","unstructured":"Zhao L, Duan Y, Yin H, Xuan J. Send hardest problems my way: probabilistic path prioritization for hybrid fuzzing. In:\u00a0NDSS. 2019","DOI":"10.14722\/ndss.2019.23504"},{"issue":"3","key":"3800_CR4","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/TR.2019.2892517","volume":"68","author":"VH Durelli","year":"2019","unstructured":"Durelli VH, Durelli RS, Borges SS, Endo AT, Eler MM, Dias DR, Guimar\u00e3es MP. Machine learning applied to software testing: a systematic mapping study. IEEE Trans Reliab. 2019;68(3):1189\u2013212.","journal-title":"IEEE Trans Reliab"},{"key":"3800_CR5","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.cosrev.2019.07.001","volume":"33","author":"T Ahmad","year":"2019","unstructured":"Ahmad T, Iqbal J, Ashraf A, Truscan D, Porres I. Model-based testing using UML activity diagrams: a systematic mapping study. Comput Sci Rev. 2019;33:98\u2013112.","journal-title":"Comput Sci Rev"},{"issue":"10","key":"3800_CR6","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TSE.2019.2942921","volume":"47","author":"R Huang","year":"2019","unstructured":"Huang R, Sun W, Xu Y, Chen H, Towey D, Xia X. A survey on adaptive random testing. IEEE Trans Software Eng. 2019;47(10):2052\u201383.","journal-title":"IEEE Trans Software Eng"},{"issue":"3","key":"3800_CR7","first-page":"192","volume":"11","author":"O Dahiya","year":"2020","unstructured":"Dahiya O, Solanki K, Dhankhar A. Risk-based testing: identifying, assessing, mitigating & managing risks efficiently in software testing. Int J Adv Res Eng Technol. 2020;11(3):192\u2013203.","journal-title":"Int J Adv Res Eng Technol"},{"key":"3800_CR8","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.csi.2018.08.003","volume":"62","author":"SN Matheu-Garc\u00eda","year":"2019","unstructured":"Matheu-Garc\u00eda SN, Hern\u00e1ndez-Ramos JL, Skarmeta AF, Baldini G. Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Comput Standards Interfaces. 2019;62:64\u201383.","journal-title":"Comput Standards Interfaces"},{"key":"3800_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2019.105762","volume":"118","author":"M Mehrtash","year":"2020","unstructured":"Mehrtash M, Kargarian A. Risk-based dynamic generation and transmission expansion planning with propagating effects of contingencies. Int J Electr Power Energy Syst. 2020;118: 105762.","journal-title":"Int J Electr Power Energy Syst"},{"issue":"9","key":"3800_CR10","doi-asserted-by":"publisher","first-page":"4365","DOI":"10.1287\/mnsc.2018.3138","volume":"65","author":"H Aprahamian","year":"2019","unstructured":"Aprahamian H, Bish DR, Bish EK. Optimal risk-based group testing. Manage Sci. 2019;65(9):4365\u201384.","journal-title":"Manage Sci"},{"key":"3800_CR11","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jss.2018.01.033","volume":"139","author":"Y Wang","year":"2018","unstructured":"Wang Y, Zhu Z, Yang B, Guo F, Yu H. Using reliability risk analysis to prioritize test cases. J Syst Softw. 2018;139:14\u201331.","journal-title":"J Syst Softw"},{"issue":"2","key":"3800_CR12","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S0951-8320(96)00108-1","volume":"55","author":"Y Dutuit","year":"1997","unstructured":"Dutuit Y, Ch\u00e2telet E, Signoret JP, Thomas P. Dependability modelling and evaluation by using stochastic Petri nets: application to two test cases. Reliab Eng Syst Saf. 1997;55(2):117\u201324.","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"3800_CR13","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1111\/j.1539-6924.2010.01519.x","volume":"31","author":"E Borgonovo","year":"2011","unstructured":"Borgonovo E, Castaings W, Tarantola S. Moment independent importance measures: new results and analytical test cases. Risk Anal Int J. 2011;31(3):404\u201328.","journal-title":"Risk Anal Int J"},{"key":"3800_CR14","doi-asserted-by":"publisher","first-page":"6125","DOI":"10.1007\/s13369-020-04472-z","volume":"45","author":"H Jahan","year":"2020","unstructured":"Jahan H, Feng Z, Mahmud SH. Risk-based test case prioritization by correlating system methods and their associated risks. Arab J Sci Eng. 2020;45:6125\u201338.","journal-title":"Arab J Sci Eng"},{"issue":"9","key":"3800_CR15","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1016\/j.jksuci.2018.09.005","volume":"33","author":"R Mukherjee","year":"2021","unstructured":"Mukherjee R, Patnaik KS. A survey on different approaches for software test case prioritization. J King Saud Univ-Comput Inf Sci. 2021;33(9):1041\u201354.","journal-title":"J King Saud Univ-Comput Inf Sci"},{"issue":"1","key":"3800_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MS.2019.2915297","volume":"37","author":"J Gro\u00dfmann","year":"2019","unstructured":"Gro\u00dfmann J, Felderer M, Viehmann J, Schieferdecker I. A taxonomy to assess and tailor risk-based testing in recent testing standards. IEEE Softw. 2019;37(1):40\u20139.","journal-title":"IEEE Softw"},{"key":"3800_CR17","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1007\/s11219-017-9398-y","volume":"26","author":"JFS Ouriques","year":"2018","unstructured":"Ouriques JFS, Cartaxo EG, Machado PD. Test case prioritization techniques for model-based testing: a replicated study. Software Qual J. 2018;26:1451\u201382.","journal-title":"Software Qual J"},{"issue":"13","key":"3800_CR18","first-page":"4180","volume":"96","author":"K Srinivas","year":"2018","unstructured":"Srinivas K. Test case prioritization with special emphasis on automation testing using hybrid framework. J Theor Appl Inf Technol. 2018;96(13):4180\u201390.","journal-title":"J Theor Appl Inf Technol"},{"key":"3800_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/bs.adcom.2018.10.001","volume":"113","author":"Y Lou","year":"2019","unstructured":"Lou Y, Chen J, Zhang L, Hao D. A survey on regression test-case prioritization. Adv Comput. 2019;113:1\u201346.","journal-title":"Adv Comput"},{"key":"3800_CR20","first-page":"303","volume":"103","author":"M Stevenson","year":"2018","unstructured":"Stevenson M. Assessing risk assessment in action. Minn L Rev. 2018;103:303.","journal-title":"Minn L Rev"},{"key":"3800_CR21","doi-asserted-by":"publisher","first-page":"126355","DOI":"10.1109\/ACCESS.2019.2938260","volume":"7","author":"A Bajaj","year":"2019","unstructured":"Bajaj A, Sangwan OP. A systematic literature review of test case prioritization using genetic algorithms. IEEE Access. 2019;7:126355\u201375.","journal-title":"IEEE Access"},{"key":"3800_CR22","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.infsof.2017.08.014","volume":"93","author":"M Khatibsyarbini","year":"2018","unstructured":"Khatibsyarbini M, Isa MA, Jawawi DN, Tumeng R. Test case prioritization approaches in regression testing: a systematic literature review. Inf Softw Technol. 2018;93:74\u201393.","journal-title":"Inf Softw Technol"},{"key":"3800_CR23","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.jss.2017.09.031","volume":"135","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu L, Chen TY, Towey D, Kuo FC, Huang R, Guo Y. Test case prioritization for object-oriented software: an adaptive random sequence approach based on clustering. J Syst Softw. 2018;135:107\u201325.","journal-title":"J Syst Softw"},{"issue":"1","key":"3800_CR24","doi-asserted-by":"publisher","first-page":"W1","DOI":"10.7326\/M18-1377","volume":"170","author":"KG Moons","year":"2019","unstructured":"Moons KG, Wolff RF, Riley RD, Whiting PF, Westwood M, Collins GS, Mallett S. PROBAST: a tool to assess the risk of bias and applicability of prediction model studies: explanation and elaboration. Ann Intern Med. 2019;170(1):W1\u201333.","journal-title":"Ann Intern Med"},{"key":"3800_CR25","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.comtox.2018.06.001","volume":"7","author":"M Dent","year":"2018","unstructured":"Dent M, Amaral RT, Da Silva PA, Ansell J, Boisleve F, Hatao M, Kojima H. Principles underpin new methodologies\u2019 use in the risk assessment of cosmetic ingredients. Comput Toxicol. 2018;7:20\u20136.","journal-title":"Comput Toxicol"},{"key":"3800_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2018.09.055","volume":"149","author":"A Arrieta","year":"2019","unstructured":"Arrieta A, Wang S, Sagardui G, Etxeberria L. Search-based test case prioritization for simulation-based testing of cyber-physical system product lines. J Syst Softw. 2019;149:1\u201334.","journal-title":"J Syst Softw"},{"key":"3800_CR27","unstructured":"https:\/\/www.kaggle.com\/datasets\/joolousada\/test-case-prioritization-data"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03800-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03800-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03800-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T02:58:51Z","timestamp":1742698731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03800-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,21]]},"references-count":27,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["3800"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03800-0","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,21]]},"assertion":[{"value":"18 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest between the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"We have not harmed any human person with our research data collection, which was gathered from an already published article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Patient Consent"}},{"value":"Yes, you can reproduce.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Permission to Reproduce Material from Other Sources"}},{"value":"We have not harmed any human person with our research data collection, which was gathered from an already-published article.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical Trial Registration"}}],"article-number":"310"}}