{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:47:58Z","timestamp":1775144878829,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10664-021-10047-9","type":"journal-article","created":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T08:02:51Z","timestamp":1636012971000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Injecting software faults in Python applications"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6965-8618","authenticated-orcid":false,"given":"Henrique","family":"Marques","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0011-9901","authenticated-orcid":false,"given":"Nuno","family":"Laranjeiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9660-2011","authenticated-orcid":false,"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"key":"10047_CR1","doi-asserted-by":"publisher","first-page":"110,451","DOI":"10.1016\/j.jss.2019.110451","volume":"159","author":"J Agnelo","year":"2020","unstructured":"Agnelo J, Laranjeiro N, Bernardino J (2020) Using orthogonal defect classification to characterize nosql database defects. J Syst Softw 159:110,451. https:\/\/doi.org\/10.1016\/j.jss.2019.110451. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121219302250","journal-title":"J Syst Softw"},{"issue":"9","key":"10047_CR2","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1109\/TC.2003.1228509","volume":"52","author":"J Arlat","year":"2003","unstructured":"Arlat J, Crouzet Y, Karlsson J, Folkesson P, Fuchs E, Leber GH (2003) Comparison of physical and software-implemented fault injection techniques. IEEE Trans Comput 52(9):1115\u20131133. https:\/\/doi.org\/10.1109\/TC.2003.1228509","journal-title":"IEEE Trans Comput"},{"key":"10047_CR3","unstructured":"AS SN (2021) Cosmic ray. https:\/\/pypi.org\/project\/cosmic-ray, original-date: 2015-04-18T07:44:21Z"},{"issue":"4","key":"10047_CR4","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/12.54853","volume":"39","author":"JH Barton","year":"1990","unstructured":"Barton JH, Czeck EW, Segall ZZ, Siewiorek DP (1990) Fault injection experiments using fiat. IEEE Trans Comput 39(4):575\u2013582. https:\/\/doi.org\/10.1109\/12.54853","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"10047_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/0164-1212(93)90005-I","volume":"20","author":"C Byoungju","year":"1993","unstructured":"Byoungju C, Mathur AP (1993) High-performance mutation testing. J Syst Softw 20(2):135\u2013152. https:\/\/doi.org\/10.1016\/0164-1212(93)90005-I. http:\/\/www.sciencedirect.com\/science\/article\/pii\/016412129390005I","journal-title":"J Syst Softw"},{"key":"10047_CR6","unstructured":"Chillarege R (1996) Orthogonal defect classification. In: Lyu MR (ed) Handbook of software reliability engineering. IEEE CS Press, chap 9, pp 359\u2013399"},{"issue":"1","key":"10047_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Meas 20(1):37\u201346. https:\/\/doi.org\/10.1177\/001316446002000104","journal-title":"Educ Psychol Meas"},{"key":"10047_CR8","doi-asserted-by":"publisher","unstructured":"Cotroneo D, De Simone L, Liguori P, Natella R, Bidokhti N (2019) How bad can a bug get? an empirical analysis of software failures in the OpenStack cloud computing platform. In: Proceedings of the 2019 27th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering, ESEC\/FSE 2019. ACM, New York, pp 200-211. https:\/\/doi.org\/10.1145\/3338906.3338916","DOI":"10.1145\/3338906.3338916"},{"key":"10047_CR9","doi-asserted-by":"publisher","unstructured":"Cotroneo D, Simone LD, Liguori P, Natella R (2020) ProFIPy: programmable software fault injection as-a-service. In: 2020 50th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). pp 364\u2013372. https:\/\/doi.org\/10.1109\/DSN48063.2020.00052","DOI":"10.1109\/DSN48063.2020.00052"},{"issue":"4-5","key":"10047_CR10","doi-asserted-by":"publisher","first-page":"e1630","DOI":"10.1002\/stvr.1630","volume":"27","author":"P Delgado-P\u00e9rez","year":"2017","unstructured":"Delgado-P\u00e9rez P, Segura S, Medina-Bulo I (2017) Assessment of C++ object-oriented mutation operators: A selective mutation approach. Software Testing Verification Reliab 27(4-5):e1630. https:\/\/doi.org\/10.1002\/stvr.1630","journal-title":"Software Testing Verification Reliab"},{"key":"10047_CR11","doi-asserted-by":"publisher","unstructured":"Denisov A, Pankevich S (2018) Mull it over: mutation testing based on LLVM. In: 2018 IEEE international conference on software testing, verification and validation workshops (ICSTW). pp 25\u201331. https:\/\/doi.org\/10.1109\/ICSTW.2018.00024","DOI":"10.1109\/ICSTW.2018.00024"},{"key":"10047_CR12","doi-asserted-by":"publisher","unstructured":"Derezi\u0144ska A (2013) A quality estimation of mutation clustering in c# programs. In: Zamojski W, Mazurkiewicz J, Sugier J, Walkowiak T, Kacprzyk J (eds) New results in dependability and computer systems, advances in Intelligent Systems and Computing. Springer International Publishing, Heidelberg, pp 119\u2013129. https:\/\/doi.org\/10.1007\/978-3-319-00945-2_11","DOI":"10.1007\/978-3-319-00945-2_11"},{"key":"10047_CR13","doi-asserted-by":"crossref","unstructured":"Dur\u00e3es JA, Madeira HS (2006) Emulation of software faults: A field data study and a practical approach. IEEE Trans Softw Eng 32(11)","DOI":"10.1109\/TSE.2006.113"},{"issue":"2","key":"10047_CR14","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1214\/009053604000000067","volume":"32","author":"B Efron","year":"2004","unstructured":"Efron B, Hastie T, Johnstone I, Tibshirani R (2004) Least angle regression. Ann Statist 32(2):407\u2013499. https:\/\/doi.org\/10.1214\/009053604000000067","journal-title":"Ann Statist"},{"issue":"5","key":"10047_CR15","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/TDSC.2013.45","volume":"11","author":"J Fonseca","year":"2014","unstructured":"Fonseca J, Vieira M, Madeira H (2014) Evaluation of web security mechanisms using vulnerability attack injection. IEEE Trans Dependable Secur Comput 11(5):440\u2013453. https:\/\/doi.org\/10.1109\/TDSC.2013.45","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"10047_CR16","doi-asserted-by":"publisher","unstructured":"Fraser G, Arcuri A (2015) Achieving scalable mutation-based generation of whole test suites. https:\/\/doi.org\/10.1007\/s10664-013-9299-z, vol 20, pp 783\u2013812","DOI":"10.1007\/s10664-013-9299-z"},{"key":"10047_CR17","volume-title":"Practical software metrics for project management and process improvement","author":"RB Grady","year":"1992","unstructured":"Grady RB (1992) Practical software metrics for project management and process improvement. Prentice-Hall, Inc., Upper Saddle River"},{"key":"10047_CR18","unstructured":"Ha\u0142as K (2021) MutPy: Mutation testing tool for Python 3.x. https:\/\/pypi.org\/project\/mutpy"},{"key":"10047_CR19","doi-asserted-by":"publisher","unstructured":"Hajdu A, Ivaki N, Kocsis I, Klenik A, G\u00f6nczy L, Laranjeiro N, Madeira H, Pataricza A (2020) Using fault injection to assess blockchain systems in presence of faulty smart contracts. https:\/\/doi.org\/10.1109\/ACCESS.2020.3032239, vol 8, pp 190,760\u2013190,783","DOI":"10.1109\/ACCESS.2020.3032239"},{"key":"10047_CR20","unstructured":"Hovm\u00f6ller A (2021) Mutmut: mutation testing for Python 3. https:\/\/pypi.org\/project\/mutmut"},{"issue":"4","key":"10047_CR21","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/2.585157","volume":"30","author":"MC Hsueh","year":"1997","unstructured":"Hsueh MC, Tsai TK, Iyer RK (1997) Fault injection techniques and tools. Computer 30(4):75\u201382. http:\/\/portal.acm.org\/citation.cfm?id=619017.620685&coll=Portal&dl=GUIDE&CFID=74933873&CFTOKEN=73521499","journal-title":"Computer"},{"issue":"2","key":"10047_CR22","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/24.229487","volume":"42","author":"J Hudak","year":"1993","unstructured":"Hudak J, Suh BH, Siewiorek D, Segall Z (1993) Evaluation and comparison of fault-tolerant software techniques. IEEE Trans Reliab 42(2):190\u2013204. https:\/\/doi.org\/10.1109\/24.229487","journal-title":"IEEE Trans Reliab"},{"key":"10047_CR23","unstructured":"IBM (2013) Orthogonal defect classification v 5.2 for software design and code. https:\/\/researcher.watson.ibm.com\/researcher\/files\/us-pasanth\/ODC-5-2.pdf"},{"key":"10047_CR24","doi-asserted-by":"publisher","unstructured":"IEEE (2010) IEEE standard classification for software anomalies. IEEE Std 1044-2009 (Revision of IEEE Std 1044-1993) pp 1?23. https:\/\/doi.org\/10.1109\/IEEESTD.2010.5399061","DOI":"10.1109\/IEEESTD.2010.5399061"},{"issue":"5-7","key":"10047_CR25","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1002\/stvr.1561","volume":"25","author":"R Just","year":"2015","unstructured":"Just R, Schweiggert F (2015) Higher accuracy and lower run time: efficient mutation analysis using non-redundant mutation operators. Software Testing Verification Reliab 25(5-7):490\u2013507. https:\/\/doi.org\/10.1002\/stvr.1561","journal-title":"Software Testing Verification Reliab"},{"key":"10047_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/9780470370506","volume-title":"Dependability benchmarking for computer systems","author":"K Kanoun","year":"2008","unstructured":"Kanoun K, Spainhower L (2008) Dependability benchmarking for computer systems. Wiley-IEEE Computer Society Press, Washington"},{"issue":"11","key":"10047_CR27","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1109\/32.256857","volume":"19","author":"W Kao","year":"1993","unstructured":"Kao W, Iyer RK, Tang D (1993) Fine: A fault injection and monitoring environment for tracing the unix system behavior under faults. IEEE Trans Softw Eng 19(11):1105\u20131118. https:\/\/doi.org\/10.1109\/32.256857","journal-title":"IEEE Trans Softw Eng"},{"key":"10047_CR28","unstructured":"Kepner E (2021) Mutatest. https:\/\/pypi.org\/project\/mutatest\/, original-date: 2018-12-22T15:04:53Z"},{"key":"10047_CR29","doi-asserted-by":"publisher","unstructured":"Kintis M, Papadakis M, Jia Y, Malevris N, Traon YL, Harman M (2018) Detecting trivial mutant equivalences via compiler optimisations. https:\/\/doi.org\/10.1109\/TSE.2017.2684805. https:\/\/www.computer.org\/csdl\/journal\/ts\/2018\/04\/07882714\/13rRUxBa5ty, publisher: IEEE Computer Society, vol 44, pp 308\u2013333","DOI":"10.1109\/TSE.2017.2684805"},{"issue":"9","key":"10047_CR30","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1109\/32.877845","volume":"26","author":"P Koopman","year":"2000","unstructured":"Koopman P, DeVale J (2000) The exception handling effectiveness of posix operating systems. IEEE Trans Softw Eng 26(9):837\u2013848. https:\/\/doi.org\/10.1109\/32.877845","journal-title":"IEEE Trans Softw Eng"},{"key":"10047_CR31","doi-asserted-by":"crossref","unstructured":"Kropp NP, Koopman PJ, Siewiorek DP (1998) Automated robustness testing of off-the-shelf software components. In: Proceedings of the the twenty-eighth annual international symposium on fault-tolerant computing, FTCS \u201998. IEEE Computer Society, Washington, pp 230\u2013. http:\/\/dl.acm.org\/citation.cfm?id=795671.796919","DOI":"10.1109\/FTCS.1998.689474"},{"key":"10047_CR32","doi-asserted-by":"publisher","unstructured":"Kurtz B, Ammann P, Offutt J, Delamaro ME, Kurtz M, G\u00f6k\u00e7e N (2016) Analyzing the validity of selective mutation with dominator mutants. In: Proceedings of the 2016 24th ACM SIGSOFT international symposium on foundations of software engineering, FSE 2016. Association for Computing Machinery, New York, pp 571-582. https:\/\/doi.org\/10.1145\/2950290.2950322","DOI":"10.1145\/2950290.2950322"},{"issue":"1","key":"10047_CR33","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis JR, Koch GG (1977) The measurement of observer agreement for categorical data. Biometrics 33 (1):159\u2013174. https:\/\/doi.org\/10.2307\/2529310. https:\/\/www.jstor.org\/stable\/2529310","journal-title":"Biometrics"},{"issue":"4","key":"10047_CR34","doi-asserted-by":"publisher","first-page":"89:1","DOI":"10.1145\/3448977","volume":"54","author":"N Laranjeiro","year":"2021","unstructured":"Laranjeiro N, Agnelo J, Bernardino J (2021) A Systematic Review on Software Robustness Assessment. ACM Comput Surv 54(4):89:1\u201389:65. https:\/\/doi.org\/10.1145\/3448977","journal-title":"ACM Comput Surv"},{"key":"10047_CR35","doi-asserted-by":"publisher","unstructured":"Li N, West M, Escalona A, Durelli VHS (2015) Mutation testing in practice using Ruby. In: 2015 IEEE eighth international conference on software testing, verification and validation workshops (ICSTW). IEEE Computer Society. pp 1\u20136. https:\/\/doi.org\/10.1109\/ICSTW.2015.7107453. https:\/\/www.computer.org\/csdl\/proceedings-article\/icstw\/2015\/07107453\/12OmNvUaNme","DOI":"10.1109\/ICSTW.2015.7107453"},{"key":"10047_CR36","doi-asserted-by":"publisher","unstructured":"Lima JAP, Vergilio SR (2018) Search-Based Higher Order Mutation Testing: A Mapping Study. In: Proceedings of the III Brazilian symposium on systematic and automated software testing, SAST \u201918. Association for Computing Machinery, New York, pp 87\u201396. https:\/\/doi.org\/10.1145\/3266003.3266013.","DOI":"10.1145\/3266003.3266013."},{"key":"10047_CR37","doi-asserted-by":"publisher","unstructured":"Mahmood A, Andrews DM, McCluskey EJ (1984) Executable assertions and flight software. In: Digital avionics systems conference, american institute of aeronautics and astronautics. pp 346\u2013351. https:\/\/doi.org\/10.2514\/6.1984-2726.","DOI":"10.2514\/6.1984-2726."},{"key":"10047_CR38","doi-asserted-by":"publisher","unstructured":"Marques H, Laranjeiro N, Bernardino J (2021) Injecting software faults in Python applications: The OpenStack case study - supplemental material. https:\/\/doi.org\/10.5281\/zenodo.4581121","DOI":"10.5281\/zenodo.4581121"},{"key":"10047_CR39","doi-asserted-by":"publisher","unstructured":"Martins E, Rubira C, Leme N (2002) Jaca: a reflective fault injection tool based on patterns. In: Proceedings international conference on dependable systems and networks. pp 483\u2013487. https:\/\/doi.org\/10.1109\/DSN.2002.1028934","DOI":"10.1109\/DSN.2002.1028934"},{"issue":"4","key":"10047_CR40","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"SE-2","author":"T McCabe","year":"1976","unstructured":"McCabe T (1976) A complexity measure. IEEE Transactions on Software Engineering SE-2(4):308\u2013320. https:\/\/doi.org\/10.1109\/TSE.1976.233837","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10047_CR41","unstructured":"Miller BP, Koski D, Pheow C, Maganty LV, Murthy R, Natarajan A, Steidl J (1995) Fuzz revisited: A re-examination of the reliability of unix utilities and services. Tech. rep., University of Wisconsin-Madison Department of Computer Sciences"},{"key":"10047_CR42","doi-asserted-by":"publisher","unstructured":"Namin AS, Andrews J, Murdoch D (2008) Sufficient mutation operators for measuring test effectiveness. In: 2008 ACM\/IEEE 30th international conference on software engineering. pp 351\u2013360. https:\/\/doi.org\/10.1145\/1368088.1368136","DOI":"10.1145\/1368088.1368136"},{"key":"10047_CR43","doi-asserted-by":"publisher","unstructured":"Natella R (2011) Achieving representative faultloads in software fault injection. PhD Thesis, Universit\u00e0 degli Studi di Napoli Federico II, Napoli, Italy. https:\/\/doi.org\/10.6092\/UNINA\/FEDOA\/8833. http:\/\/www.fedoa.unina.it\/8833\/","DOI":"10.6092\/UNINA\/FEDOA\/8833"},{"key":"10047_CR44","doi-asserted-by":"publisher","unstructured":"Natella R, Cotroneo D, Madeira HS (2016a) Assessing dependability with software fault injection: a survey. https:\/\/doi.org\/10.1145\/2841425, vol 48, pp 44:1\u201344:55","DOI":"10.1145\/2841425"},{"key":"10047_CR45","doi-asserted-by":"publisher","unstructured":"Natella R, Cotroneo D, Madeira HS (2016b) Assessing dependability with software fault injection: a survey. https:\/\/doi.org\/10.1145\/2841425, vol 48, pp 1\u201355","DOI":"10.1145\/2841425"},{"issue":"4","key":"10047_CR46","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1109\/12.919278","volume":"50","author":"W Ng","year":"2001","unstructured":"Ng W, Chen P (2001) The design and verification of the Rio file cache. IEEE Trans Comput 50(4):322\u2013337. https:\/\/doi.org\/10.1109\/12.919278","journal-title":"IEEE Trans Comput"},{"key":"10047_CR47","unstructured":"OpenStack (2021) Conceptual architecture. https:\/\/docs.openstack.org\/install-guide\/get-started-conceptual-architecture.html"},{"key":"10047_CR48","doi-asserted-by":"publisher","unstructured":"Petrovi\u0107 G, Ivankovi\u0107 M (2018) State of mutation testing at google. In: Proceedings of the 40th international conference on software engineering: software engineering in practice, ICSE-SEIP \u201918. Association for Computing Machinery, New York, pp 163\u2013171. https:\/\/doi.org\/10.1145\/3183519.3183521.","DOI":"10.1145\/3183519.3183521."},{"key":"10047_CR49","doi-asserted-by":"publisher","first-page":"110,388","DOI":"10.1016\/j.jss.2019.07.100","volume":"157","author":"AV Pizzoleto","year":"2019","unstructured":"Pizzoleto AV, Ferrari FC, Offutt J, Fernandes L, Ribeiro M (2019) A systematic literature review of techniques and metrics to reduce the cost of mutation testing. J Syst Softw 157:110,388. https:\/\/doi.org\/10.1016\/j.jss.2019.07.100. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121219301554","journal-title":"J Syst Softw"},{"key":"10047_CR50","doi-asserted-by":"publisher","unstructured":"Praphamontripong U, Offutt J (2017) Finding redundancy in web mutation operators. In: 2017 IEEE international conference on software testing, verification and validation workshops (ICSTW). pp 134\u2013142. https:\/\/doi.org\/10.1109\/ICSTW.2017.30","DOI":"10.1109\/ICSTW.2017.30"},{"key":"10047_CR51","doi-asserted-by":"publisher","unstructured":"Praphamontripong U, Offutt J (2017) Finding redundancy in web mutation operators. In: 2017 IEEE international conference on software testing, verification and validation workshops (ICSTW). pp 134\u2013142. https:\/\/doi.org\/10.1109\/ICSTW.2017.30","DOI":"10.1109\/ICSTW.2017.30"},{"key":"10047_CR52","doi-asserted-by":"publisher","unstructured":"Sanches BP, Basso T, Moraes R (2011) J-SWFIT: a java software fault injection tool. In: 2011 5th Latin-American symposium on dependable computing. pp 106\u2013115. https:\/\/doi.org\/10.1109\/LADC.2011.20","DOI":"10.1109\/LADC.2011.20"},{"key":"10047_CR53","unstructured":"Tiobe (2021) TIOBE Index. https:\/\/www.tiobe.com\/tiobe-index\/"},{"key":"10047_CR54","doi-asserted-by":"publisher","unstructured":"Wang B, Xiong Y, Shi Y, Zhang L, Hao D (2017) Faster mutation analysis via equivalence modulo states. In: Proceedings of the 26th ACM SIGSOFT international symposium on software testing and analysis, ISSTA 2017. Association for Computing Machinery, New York, pp 295\u2013306. https:\/\/doi.org\/10.1145\/3092703.3092714","DOI":"10.1145\/3092703.3092714"},{"key":"10047_CR55","doi-asserted-by":"publisher","unstructured":"Wei-Lun K, Iyer RK (1994) Define: a distributed fault injection and monitoring environment. In: Proceedings of IEEE workshop on fault-tolerant parallel and distributed systems. pp 252\u2013259. https:\/\/doi.org\/10.1109\/FTPDS.1994.494497","DOI":"10.1109\/FTPDS.1994.494497"},{"key":"10047_CR56","volume-title":"Root cause analysis: A tool for total quality management","author":"PF Wilson","year":"1993","unstructured":"Wilson PF, Dell L, Anderson G (1993) Root cause analysis: A tool for total quality management. ASQ Quality Press, Milwaukee"},{"key":"10047_CR57","unstructured":"Wood A (1996) Software reliability growth models. Technical Report 96.1, Tandem Computers"},{"issue":"3","key":"10047_CR58","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/0950-5849(93)90053-6","volume":"35","author":"M Woodward","year":"1993","unstructured":"Woodward M (1993) Mutation testing\u2014its origin and evolution. Inf Softw Technol 35(3):163\u2013169. https:\/\/doi.org\/10.1016\/0950-5849(93)90053-6. http:\/\/www.sciencedirect.com\/science\/article\/pii\/0950584993900536","journal-title":"Inf Softw Technol"},{"key":"10047_CR59","doi-asserted-by":"publisher","unstructured":"Zhang L, Gligoric M, Marinov D, Khurshid S (2013) Operator-based and random mutant selection: Better together. In: 2013 28th IEEE\/ACM international conference on automated software engineering (ASE). pp 92\u2013102. https:\/\/doi.org\/10.1109\/ASE.2013.6693070","DOI":"10.1109\/ASE.2013.6693070"},{"key":"10047_CR60","doi-asserted-by":"publisher","unstructured":"Zhang L, Marinov D, Khurshid S (2013) Faster mutation testing inspired by test prioritization and reduction. In: Proceedings of the 2013 international symposium on software testing and analysis, ISSTA 2013. Association for Computing Machinery, New York, pp 235-245. https:\/\/doi.org\/10.1145\/2483760.2483782","DOI":"10.1145\/2483760.2483782"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10047-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-10047-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10047-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:09:04Z","timestamp":1643184544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-10047-9"}},"subtitle":["The OpenStack case study"],"short-title":[],"issued":{"date-parts":[[2021,11,4]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10047"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-10047-9","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,4]]},"assertion":[{"value":"13 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"20"}}