{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:54:50Z","timestamp":1769748890177,"version":"3.49.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icis.2017.7960106","type":"proceedings-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T21:18:28Z","timestamp":1498771108000},"page":"821-826","source":"Crossref","is-referenced-by-count":12,"title":["A study for extended regular expression-based testing"],"prefix":"10.1109","author":[{"given":"Pan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Ai","sequence":"additional","affiliation":[]},{"given":"Zhenning Jimmy","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1017753.1017779"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809163"},{"key":"ref12","author":"pressman","year":"2005","journal-title":"Software Engineering A Practitioner's Approach"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2008.26"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2014.148"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2430536.2430540"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2697399"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04915-1_2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591180"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","article-title":"A survey of trust in internet applications","volume":"3","author":"grandison","year":"2000","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/RISP.1991.130788","article-title":"Toward an approach to measuring software trust","author":"amoroso","year":"1991","journal-title":"Research in Security and Privacy 1991 Proceedings 1991 IEEE Computer Society Symposium on"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/256167.256195"}],"event":{"name":"2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)","location":"Wuhan, China","start":{"date-parts":[[2017,5,24]]},"end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951674\/7959951\/07960106.pdf?arnumber=7960106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T18:15:46Z","timestamp":1569608146000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7960106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icis.2017.7960106","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}