{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:40:09Z","timestamp":1749793209873,"version":"3.41.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T00:00:00Z","timestamp":1745712000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T00:00:00Z","timestamp":1745712000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,27]]},"DOI":"10.1109\/formalise66629.2025.00019","type":"proceedings-article","created":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T17:39:05Z","timestamp":1749749945000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Refining Alloy-Based Mutation Operators to Reflect Common Mistakes"],"prefix":"10.1109","author":[{"given":"Ana","family":"Jovanovic","sequence":"first","affiliation":[{"name":"University of Texas at Arlington,Arlington,TX,USA"}]},{"given":"Mohammad Nurullah","family":"Patwary","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington,Arlington,TX,USA"}]},{"given":"Allison","family":"Sullivan","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington,Arlington,TX,USA"}]}],"member":"263","reference":[{"volume-title":"Software FDR2","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2005.63"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38916-0_2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.27"},{"volume":"4676413","volume-title":"Alloy4Fun Benchmark","year":"2022","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-017-0445-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/(sici)1099-1689(199803)8:1<15::aid-stvr146>3.0.co;2-d"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5939-6_5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167339"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2022.3162985"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556944"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tse.1977.231145"},{"volume-title":"Software Abstractions: Logic, Language, and Analysis","year":"2006","author":"Jackson","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2010.62"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MODELS58315.2023.00013"},{"key":"ref17","article-title":"Right or wrong: Understanding how novice users write software models","author":"Jovanovic","year":"2024","journal-title":"arXiv preprint arXiv"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24485-8_44"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989787"},{"key":"ref20","article-title":"The Margrave tool for firewall analysis","author":"Nelson","year":"2010","journal-title":"LISA"},{"key":"ref21","first-page":"1351","article-title":"Testing with model checker: Insuring fault visibility","volume-title":"Proceedings of 2002 WSEAS international conference on system science, applied mathematics & computer science, and power engineering systems","author":"Okun","year":"2003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14107-2_26"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2003.1254388"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.31"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2632362.2632369"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2019.2910010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238162"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183488"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00044"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14107-2_27"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00065"}],"event":{"name":"2025 IEEE\/ACM 13th International Conference on Formal Methods in Software Engineering (FormaliSE)","start":{"date-parts":[[2025,4,27]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2025,4,28]]}},"container-title":["2025 IEEE\/ACM 13th International Conference on Formal Methods in Software Engineering (FormaliSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11024220\/11024281\/11024361.pdf?arnumber=11024361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:27:32Z","timestamp":1749792452000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11024361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,27]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/formalise66629.2025.00019","relation":{},"subject":[],"published":{"date-parts":[[2025,4,27]]}}}