{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:20:29Z","timestamp":1729671629468,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/bigdata.2017.8258466","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:28Z","timestamp":1516056448000},"page":"4362-4371","source":"Crossref","is-referenced-by-count":1,"title":["Crossing the Streams: Fuzz testing with user input"],"prefix":"10.1109","author":[{"given":"Joseph A.","family":"Cottam","sequence":"first","affiliation":[]},{"given":"Leslie","family":"Blaha","sequence":"additional","affiliation":[]},{"given":"Dimitri","family":"Zarzhitsky","sequence":"additional","affiliation":[]},{"given":"Mathew","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Elliott","family":"Skomski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.260"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8659.1130139"},{"journal-title":"Automated whitebox fuzz testing","year":"2008","author":"godefroid","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390661"},{"journal-title":"Pattern-based Strategy Getting Value from Big Data","year":"2011","key":"ref14"},{"key":"ref15","first-page":"60","article-title":"Big data: The management revolution","volume":"90","author":"mcafee","year":"2012","journal-title":"Harvard Business Review"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1177\/003754977903200304","article-title":"Terminology for model credibility","volume":"32","author":"schlesinger","year":"1979","journal-title":"Simulation"},{"journal-title":"Fundamentals of Verification and Validation","year":"2009","author":"roache","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2009.12.003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jarmac.2013.07.002"},{"journal-title":"Unified Theories of Cognition","year":"1994","author":"newell","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.2005.1532788"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/503271.503260"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/634067.634233"},{"key":"ref6","first-page":"1278","volume":"63","author":"saltzer","year":"1975","journal-title":"The Protection of Information in Computer Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010257"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2008.31"},{"journal-title":"Automated gui interface testing","year":"1998","author":"parker","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/335169.335188"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135811"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303030"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13264"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"195","DOI":"10.7551\/mitpress\/9556.003.0016","article-title":"Robustness in a variable environment","author":"gluck","year":"2012","journal-title":"Evolution and the Mechanisms of Decision Making"},{"journal-title":"Response Times Their Role in Inferring Elementary Mental Organization","year":"1986","author":"luce","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1002\/9780470434697","author":"huber","year":"2009","journal-title":"Robust Statistics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207680"},{"journal-title":"The Stochastic Modeling of Elementary Psychological Processes","year":"1983","author":"townsend","key":"ref23"},{"key":"ref26","article-title":"Software Engineering: Report of a Conference Sponsored by the NATO Science Committee","author":"naur","year":"1969","journal-title":"Garmisch Germany 7&#x2013;11 Oct 1968 Brussels Scientific Affairs Division NATO"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58628-1_33"}],"event":{"name":"2017 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2017,12,11]]},"location":"Boston, MA","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241556\/8257893\/08258466.pdf?arnumber=8258466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T08:41:30Z","timestamp":1693471290000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2017.8258466","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}