{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T13:49:58Z","timestamp":1649166598641},"reference-count":69,"publisher":"Elsevier","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1016\/b978-0-12-396525-7.00002-2","type":"book-chapter","created":{"date-parts":[[2012,4,6]],"date-time":"2012-04-06T14:39:53Z","timestamp":1333723193000},"page":"39-92","source":"Crossref","is-referenced-by-count":0,"title":["Modeling, Analysis, and Testing of System Vulnerabilities"],"prefix":"10.1016","author":[{"given":"Fevzi","family":"Belli","sequence":"first","affiliation":[]},{"given":"Mutlu","family":"Beyazit","sequence":"additional","affiliation":[]},{"given":"Aditya P.","family":"Mathur","sequence":"additional","affiliation":[]},{"given":"Nimal","family":"Nissanke","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0005","series-title":"Safeware, System Safety and Computers","author":"Leveson","year":"1995"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0010","series-title":"Safety-Critical Computer Systems","author":"Storey","year":"1996"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0015","first-page":"201","article-title":"Enhancing system validation with behavioral types","author":"Gossens","year":"2002"},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0020","doi-asserted-by":"crossref","first-page":"120","DOI":"10.2307\/2974979","article-title":"Regular expressions for program computations","volume":"104","author":"Prather","year":"1997","journal-title":"Am. Math. Mon."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0025","series-title":"Finite-state modeling, analysis and testing of system vulnerabilities\u2014approach and case study","author":"Belli","year":"2003"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0030","series-title":"Test Generation Using Event Sequence Graphs","author":"Belli","year":"2005"},{"issue":"6","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0035","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/32.87278","article-title":"Specification of fault-tolerant system issues by predicate\/transition nets and regular expressions\u2014approach and case study","volume":"17","author":"Belli","year":"1991","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0040","first-page":"139","article-title":"A Theory on Analysis and Construction of Fault-Tolerant Systems","volume":"vol. 84","author":"Eggers","year":"1984"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0045","first-page":"121","article-title":"A formal framework for mutation testing","author":"Belli","year":"2010"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0050","first-page":"34","article-title":"Finite-state testing and analysis of graphical user interfaces","author":"Belli","year":"2001"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0055","series-title":"Finite Automata and the Representation of Events","author":"Myhill","year":"1957"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0060","first-page":"87","article-title":"Logic schemes of algorithms","volume":"I","author":"Ianow","year":"1958","journal-title":"Probl. Cybern."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0065","series-title":"Pascal, User Manual and Report","author":"Jensen","year":"1974"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0070","series-title":"Specifying Software","author":"Tennent","year":"2002"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0075","first-page":"209","article-title":"Automated test data generation for programs with procedures","author":"Korel","year":"1996"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0080","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1002\/j.1538-7305.1955.tb03788.x","article-title":"A method for synthesizing sequential circuits","volume":"34","author":"Mealy","year":"1955","journal-title":"Bell Syst. Tech. J."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0085","series-title":"Automata Studies","first-page":"129","article-title":"Gedanken experiments on sequential machines","volume":"vol. 34","author":"Moore","year":"1956"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0090","first-page":"166","article-title":"Timed I\/O automata: a mathematical framework for modeling and analyzing real-time systems","author":"Kaynar","year":"2003"},{"issue":"5","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0095","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2009.35","article-title":"Scalable and effective test generation for role-based access control systems","volume":"35","author":"Masood","year":"2009","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0100","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TDSC.2008.41","article-title":"Conformance testing of temporal role-based access control systems","volume":"7","author":"Masood","year":"2010","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0105","series-title":"Introduction to Automata Theory, Languages and Computation","author":"Hopcroft","year":"2006"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0110","first-page":"249","article-title":"Mutation testing of \u201cGo-Back\u201d functions based on pushdown automata","author":"Belli","year":"2011"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0115","first-page":"770","article-title":"The pushdown automaton and its coverage criterion for testing undo\/redo functions of software","author":"Takagi","year":"2010"},{"issue":"3","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0120","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","article-title":"Statecharts: a visual formalism for complex systems","volume":"8","author":"Harel","year":"1987","journal-title":"Sci. Comp. Programm."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0125","series-title":"A Comparison of Statecharts Variants, in: Formal Techniques of Real-Time and Fault-Tolerant Systems (FTRTFT 1994)","first-page":"128","volume":"vol. 863","author":"von der Beeck","year":"1994"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0130","series-title":"Specification and Proof in Real-Time CSP","author":"Davies","year":"1993"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0135","series-title":"Communicating Sequential Processes","author":"Hoare","year":"1985"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0140","series-title":"Communications and Concurrency","author":"Milner","year":"1989"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0145","series-title":"Petri Nets: An Introduction","author":"Reisig","year":"1985"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0150","series-title":"UML 2 Toolkit","author":"Eriksson","year":"2004"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0155","unstructured":"Object Management Group. Unified Modeling Language (UML), http:\/\/www.omg.org\/spec\/UML\/"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0160","series-title":"Model-Based Software Performance Analysis","author":"Cortellessa","year":"2011"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0165","series-title":"Theory of Automata","author":"Salomaa","year":"1969"},{"issue":"12","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0170","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1145\/361227.361230","article-title":"Exception handling\u2014issues and a proposed notation","volume":"18","author":"Goodenough","year":"1975","journal-title":"Commun. ACM"},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0175","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1145\/356725.356729","article-title":"Reliability issues in computing system design","volume":"10","author":"Randell","year":"1978","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0180","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1145\/267580.267590","article-title":"Software unit test coverage and adequacy","volume":"29","author":"Zhu","year":"1997","journal-title":"ACM Comput. Surv."},{"issue":"11","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0185","doi-asserted-by":"crossref","first-page":"1604","DOI":"10.1109\/26.111442","article-title":"An optimization technique for protocol conformance test generation based on UIO sequences and rural chinese postman tours","volume":"39","author":"Aho","year":"1991","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0190","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/BF01580113","article-title":"Matching, Euler tours and the Chinese postman","volume":"5","author":"Edmonds","year":"1973","journal-title":"Math. Programm."},{"issue":"3","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0195","first-page":"273","article-title":"Graphic programming using odd or even points","volume":"1","author":"Kwan","year":"1962","journal-title":"Chin. Math."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0200","series-title":"A Top-Down Presentation of Purdom's Sentence-Generation Algorithm","author":"Malloy","year":"2005"},{"issue":"3","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0205","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/BF01932308","article-title":"A sentence generator for testing parsers","volume":"12","author":"Purdom","year":"1972","journal-title":"BIT Numer. Math."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0210","first-page":"130","article-title":"A sentence generation algorithm for testing grammars","author":"Zheng","year":"2009"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0215","first-page":"128","article-title":"Foundation of software testing: dependability theory","author":"Hamlet","year":"1994"},{"issue":"9","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0220","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1016\/S0925-7535(01)00089-3","article-title":"Design for safety in safecharts with risk ordering of states","volume":"40","author":"Nissanke","year":"2002","journal-title":"Saf. Sci."},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0225","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/7474.7528","article-title":"Software safety: why, what, and how","volume":"18","author":"Leveson","year":"1986","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0230","first-page":"109","article-title":"Protocol testing: review of methods and relevance for software testing","author":"Bochmann","year":"1994"},{"issue":"3","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0235","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/TSE.1978.231496","article-title":"Testing software design modeled by finite-state machines","volume":"SE-4","author":"Chow","year":"1978","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0240","first-page":"379","article-title":"On the use of transition diagrams in the design of a user interface for an interactive computer system","author":"Parnas","year":"1969"},{"issue":"1","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0245","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1002\/stvr.264","article-title":"Generating test data from state-based specifications","volume":"13","author":"Offutt","year":"2003","journal-title":"J. Softw. Test. Verif. Reliab."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0250","first-page":"80","article-title":"A method to automate user interface testing using variable finite state machines","author":"Shehady","year":"1997"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0255","first-page":"110","article-title":"Generating test cases for GUI responsibilities using complete interaction sequences","author":"White","year":"2000"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0260","series-title":"Human Factors in Safety-Critical Systems","author":"Redmill","year":"1997"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0265","series-title":"Designing the User Interface: Strategies for Effective Human-Computer Interaction","author":"Shneiderman","year":"1998"},{"issue":"7","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0270","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/32.605761","article-title":"The AETG system: an approach to testing based on combinatorial design","volume":"23","author":"Cohen","year":"1997","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0275","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/32.979992","article-title":"A test generation strategy for pairwise testing","volume":"28","author":"Tai","year":"2002","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0280","series-title":"Combinatorial and Random Testing Effectiveness for a Grid Computer Simulator","author":"Kuhn","year":"2008"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0285","first-page":"83","article-title":"Random vs. combinatorial methods for discrete event simulation of a grid computer network","author":"Kuhn","year":"2009"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0290","first-page":"146","article-title":"Using model checking to generate tests from requirements specification","author":"Gargantini","year":"1999"},{"issue":"8","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0295","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1109\/26.156631","article-title":"Protocol conformance testing using multiple UIO sequences","volume":"40","author":"Shen","year":"1992","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0300","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10489-006-0008-0","article-title":"Test minimization for human-computer interaction","volume":"26","author":"Belli","year":"2007","journal-title":"Appl. Intell."},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0305","first-page":"9","article-title":"Basic operations for generating behavioral mutants","author":"Belli","year":"2006"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0310","first-page":"220","article-title":"Mutation analysis testing for finite-state machines","author":"Fabbri","year":"1994"},{"key":"10.1016\/B978-0-12-396525-7.00002-2_bb0315","first-page":"210","article-title":"Mutation Testing Applied to Validate Specifications Based on Statecharts","author":"Fabbri","year":"1999"},{"issue":"1","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0320","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TC.1982.1675879","article-title":"Design for testability\u2014a survey","volume":"31","author":"Williams","year":"1982","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0325","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1145\/235321.235322","article-title":"The STATEMATE semantics of statecharts","volume":"5","author":"Harel","year":"1996","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"4","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0330","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1049\/ip-sen:19990602","article-title":"Test cases generation from UML state diagrams","volume":"146","author":"Kim","year":"1999","journal-title":"IEE Proc. Softw."},{"issue":"1","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0335","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/s10270-002-0004-8","article-title":"A UML-based approach to system testing","volume":"1","author":"Briand","year":"2002","journal-title":"Softw. Syst. Model."},{"issue":"4","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0340","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/98163.98167","article-title":"Implementing fault-tolerant services using the state machine approach: a tutorial","volume":"22","author":"Schneider","year":"1990","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"10.1016\/B978-0-12-396525-7.00002-2_bb0345","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1002\/spe.4380240203","article-title":"A prototyping environment for specifying, executing and checking communicating real-time state machines","volume":"24","author":"Raju","year":"1994","journal-title":"Softw. Pract. Exp."}],"container-title":["Advances in Computers","Dependable and Secure Systems Engineering"],"original-title":[],"deposited":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T07:53:07Z","timestamp":1543045987000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780123965257000022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-396525-7.00002-2","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2012]]}}}