{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:11:14Z","timestamp":1761610274694,"version":"build-2065373602"},"reference-count":12,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2003,9,1]],"date-time":"2003-09-01T00:00:00Z","timestamp":1062374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2003,9,1]],"date-time":"2003-09-01T00:00:00Z","timestamp":1062374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3619,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2003,9]]},"DOI":"10.1016\/s1571-0661(04)81021-1","type":"journal-article","created":{"date-parts":[[2004,9,29]],"date-time":"2004-09-29T12:47:47Z","timestamp":1096462067000},"page":"11-21","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["Performing integrated system tests using malicious component insertion"],"prefix":"10.1016","volume":"82","author":[{"given":"Dr. Charalampos","family":"Patrikakis","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Kalamaris","sequence":"additional","affiliation":[]},{"given":"Vaios","family":"Kakavas","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB1","unstructured":"J. Voas, G. McGraw and A. Gosh, Gluing Together Software Components: How Good is Your Glue, In 14th Annual Pacific Northwest Software Quality Conference, pp 338\u2013349, Oct 1996."},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB2","doi-asserted-by":"crossref","unstructured":"J. voas, F. Charron, K. Miller, Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them?, Proceedings of the 15th Int'l. Conference on Computer Safety, Reliability, and Security (SAFECOMP'96), Vienna, October 1996.","DOI":"10.1007\/978-1-4471-0937-2_11"},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB3","unstructured":"Jeffrey M. Voas, Testing software for characteristics other than correctness: Safety, failure tolernace and security, In Proceedings of the 13th International Conference on Testing Computer Software, June 1996."},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB4","unstructured":"Jeffrey M. Voas, Miller, Keith W., Examining Fault-Tolerance Using Unlikely Inputs: Turning the Test Distribution Up-Side Down., Tenth Annual Conference on Computer Assurance. IEEE, 1993. p. 3\u201311."},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB5","unstructured":"G. Kapfhammer, C. Michael, J. Haddox, R. Coyler, An Approach to Identifying and Understanding Problematic COTS Components, Presented at ISACC 2000, The Software Risk Management Conference."},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB6","unstructured":"Jennifer Haddox, Gregory M. Kapfhammer, C.C. Michael, An Approach for Understanding and Testing Third-Party Software Components, In 48th Reliability and Maintainability Symposium. Seattle, WA, January 2002."},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB7","unstructured":"IEEE Std 610-12-1990, Standard Glossary of Software Engineering Terminology."},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB8","unstructured":"A. Bertolino, KA description of software testing V.05 International Guideline on Software Engineering, IEEE 1999."},{"issue":"Issue 7","key":"10.1016\/S1571-0661(04)81021-1_NEWBIB9","article-title":"Inoculating Software for Survivability","volume":"Volume 42","author":"Ghosh","year":"1999","journal-title":"Communications of the ACM"},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB10","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/2.386985","article-title":"Fault Injection: A method for validating compute-system dependability","author":"Clark","year":"1995","journal-title":"IEEE Computer"},{"key":"10.1016\/S1571-0661(04)81021-1_NEWBIB11","unstructured":"Wenliang Du, A. P. Mathur, Vulnerability Testing of Software System Using Fault Injection, Department of Computer Sciences, Purdue University; Coast TR 98-02; 1998."},{"year":"1998","series-title":"Software Fault Injection: Inoculating Programs Against Errors","author":"Voas","key":"10.1016\/S1571-0661(04)81021-1_NEWBIB12"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104810211?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104810211?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:06:15Z","timestamp":1761609975000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104810211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,9]]},"references-count":12,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2003,9]]}},"alternative-id":["S1571066104810211"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)81021-1","relation":{},"ISSN":["1571-0661"],"issn-type":[{"type":"print","value":"1571-0661"}],"subject":[],"published":{"date-parts":[[2003,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Performing integrated system tests using malicious component insertion","name":"articletitle","label":"Article Title"},{"value":"Electronic Notes in Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1571-0661(04)81021-1","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2003 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}