{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:53:35Z","timestamp":1730256815489,"version":"3.28.0"},"reference-count":103,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icsecs58457.2023.10256324","type":"proceedings-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:36:02Z","timestamp":1695749762000},"page":"64-71","source":"Crossref","is-referenced-by-count":0,"title":["A Systematic Literature Review on Solutions of Mutation Testing Problems"],"prefix":"10.1109","author":[{"given":"Loh Zheung","family":"Yik","sequence":"first","affiliation":[{"name":"University Teknologi Malaysia,Faculty of Computing,Johor Bahru,Johor"}]},{"given":"Wan Mohd","family":"Nasir bin Wan Kadir","sequence":"additional","affiliation":[{"name":"University Teknologi Malaysia,Faculty of Computing,Johor Bahru,Johor"}]},{"given":"Noraini binti","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"University Teknologi Malaysia,Faculty of Computing,Johor Bahru,Johor"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9282883"},{"key":"ref56","first-page":"1","article-title":"Combining Evolutionary Mutation Testing with Random Selection","author":"guti\u00e9rrez-madro\u00f1al","year":"2020","journal-title":"2020 IEEE Congress on Evolutionary Computation (CEC)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-020-00567-y"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.29"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.07.011"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.02.006"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3002496"},{"key":"ref54","first-page":"1315","article-title":"Evaluation of mutant sampling criteria in object-oriented mutation testing","author":"derezi?ska","year":"0","journal-title":"2017 Federated Conference on Computer Science and Information Systems (FedCSIS)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2018.00457"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1108\/DTA-08-2019-0140"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558911"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3439961.3439981"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW50294.2020.00052"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183521"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00028"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2018-184"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110905"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.05.001"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/DTA-03-2020-0073"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106317"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW50294.2020.00068"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2018.00027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.04.031"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.07.100"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468623"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556949"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1630"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C55045.2021.00017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v8i5.pp3238-3249"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106496"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3240506"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.procs.2017.05.095","article-title":"OUTRIDER: Optimizing the mUtation Testing pRocess In Distributed EnviRonments","volume":"108","author":"ca\u00f1izares","year":"0","journal-title":"Procedia Computer Science"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/math7090778"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3356317.3356323"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00016"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/VACE.2017.3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092732"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111039"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3382025.3414966"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2952246"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/sym14040820"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330568"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3266237.3266241"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3136040.3136053"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW50294.2020.00056"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW52544.2021.00016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297499"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP.2017.8313788"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00046"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00036"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2238"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3542946"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.32"},{"key":"ref98","first-page":"25","article-title":"An Extensible, Regular-Expression-Based Tool for Multi-language Mutant Generation","author":"groce","year":"2018","journal-title":"2018 IEEE\/ACM 40th International Conference on Software Engineering Companion (ICSE-Companion) ICSE-Companion"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2684805"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68972-2_11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3555228.3555233"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW50294.2020.00055"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.3390\/info13070327"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3128473.3128479"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3377812.3382134"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106280"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW52544.2021.00017"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF.2019.8713650"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2019.00036"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.016"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.40"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3108-3"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2018.01.05"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2809496"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3510417"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169117"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3010361"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW50294.2020.00053"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678827"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3278186.3278190"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER52604.2021.00023"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2450"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2018.00023"},{"key":"ref102","first-page":"160","article-title":"&#x00B5;bert: Mutation testing using pre-trained language models","author":"degiovanni","year":"0","journal-title":"2022 IEEE International Conference on Software Testing Verification and Validation Workshops (ICSTW)"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2017.15"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.3390\/foods10040809"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW58534.2023.00064"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW52544.2021.00018"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3011423"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.15439\/2017F215"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.25"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106502"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3121245.3121249"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7543896"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950171"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09778-7"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00086"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC51774.2021.00131"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3052987"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW52544.2021.00014"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883776"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510187"}],"event":{"name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","start":{"date-parts":[[2023,8,25]]},"location":"Penang, Malaysia","end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256260\/10256269\/10256324.pdf?arnumber=10256324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:51:33Z","timestamp":1697478693000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":103,"URL":"https:\/\/doi.org\/10.1109\/icsecs58457.2023.10256324","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}