{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:40:08Z","timestamp":1747809608328,"version":"3.41.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1109\/icst62969.2025.10988986","type":"proceedings-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T17:05:21Z","timestamp":1747760721000},"page":"290-301","source":"Crossref","is-referenced-by-count":0,"title":["Testing Practices, Challenges, and Developer Perspectives in Open-Source IoT Platforms"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Rodriguez-Cardenas","sequence":"first","affiliation":[{"name":"William &#x0026; Mary,Williamsburg,VA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Safwat Ali","family":"Khan","sequence":"additional","affiliation":[{"name":"George Mason University,Fairfax,VA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Prianka","family":"Mandal","sequence":"additional","affiliation":[{"name":"William &#x0026; Mary,Williamsburg,VA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adwait","family":"Nadkarni","sequence":"additional","affiliation":[{"name":"William &#x0026; Mary,Williamsburg,VA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kevin","family":"Moran","sequence":"additional","affiliation":[{"name":"University of Central Florida,Orlando,FL,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Denys","family":"Poshyvanyk","sequence":"additional","affiliation":[{"name":"William &#x0026; Mary,Williamsburg,VA,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"volume-title":"Number of internet of things (iot) connected devices worldwide from 2019 to 2023, with forecasts from 2022 to 2030.","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300031"},{"key":"ref3","article-title":"Helion: Enabling a Natural Perspective of Home Automation","author":"Manandhar","year":"2019","journal-title":"arXiv"},{"volume-title":"Technogym connected gym equipment.","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3184710"},{"key":"ref6","first-page":"460","article-title":"IoT Bugs and Development Challenges","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"Makhshari"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"110389","DOI":"10.1016\/j.jss.2019.07.101","article-title":"On the challenges novice programmers experience in developing iot systems: A survey","volume":"157","author":"Corno","year":"2019","journal-title":"Journal of Systems and Software"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972364"},{"volume-title":"openHAB.","key":"ref9"},{"volume-title":"Home Assistant","key":"ref10"},{"key":"ref11","first-page":"299","article-title":"Methods2Test: A dataset of focal methods mapped to test cases","volume-title":"Proceedings of the 19th International Conference on Mining Software Repositories","author":"Tufano"},{"volume-title":"Nest App.","key":"ref12"},{"volume-title":"Iot testing study online appendix.","author":"Rodriguez-Cardenas","key":"ref13"},{"key":"ref14","first-page":"233","article-title":"Enabling Mutation Testing for Android Apps","volume-title":"Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering","author":"Linares-Vasquez"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/KSE.2019.8919324"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0650-5"},{"volume-title":"Tree-sitter Introduction.","key":"ref17"},{"volume-title":"Amazon Alexa.","key":"ref18"},{"volume-title":"Homekit.","key":"ref19"},{"volume-title":"Thematic Analysis: A Practical Guide.","year":"2021","author":"Braun","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00019"},{"key":"ref22","volume-title":"Xuat-copilot: Multi-agent collaborative system for automated user acceptance testing with large language model","volume":"abs\/2401.02705","author":"Wang","year":"2024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10873-0_4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/dsa59317.2023.00022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2023.3348036"},{"volume-title":"Apache jmeter","year":"2008","author":"Halili","key":"ref26"},{"volume-title":"gatling: Modern Load Testing as Code.","year":"2023","key":"ref27"},{"volume-title":"taurus: Automation-friendly framework for Continuous Testing.","year":"2023","key":"ref28"},{"volume-title":"General Data Protection Regulation (GDPR) - Official Legal Text.","year":"2023","key":"ref29"},{"volume-title":"California Privacy Rights Act of 2020 (\u201cCPRA\u201d)","year":"2020","author":"Legislature","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400261"},{"key":"ref32","first-page":"61","article-title":"Practitioners\u2019 Views on Good Software Testing Practices","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP).","author":"Kochhar"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.47"},{"article-title":"Looking from the mirror: Evaluating iot device security through mobile companion apps","volume-title":"USENIX Security Symposium","author":"Wang","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3042898"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIS46948.2019.9014711"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3411838"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300782"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"100313","DOI":"10.1016\/j.iot.2020.100313","article-title":"What are iot systems for real? an experts\u2019 survey on software engineering aspects","volume":"12","author":"Reggio","year":"2020","journal-title":"Internet of Things"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58768-0_6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00051"},{"issue":"9","key":"ref42","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11091502","article-title":"Learning-based methods for cyber attacks detection in iot systems: A survey on methods, analysis, and future prospects","volume":"11","author":"Inayat","year":"2022","journal-title":"Electronics"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105860"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560640"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"108771","DOI":"10.1016\/j.comnet.2022.108771","article-title":"State-of-the-art survey of artificial intelligent techniques for iot security","volume":"206","author":"Ahanger","year":"2022","journal-title":"Computer Networks"},{"key":"ref46","first-page":"614","article-title":"Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques","volume-title":"2022 IEEE Symposium on Security and Privacy (SP)","author":"Ami"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09124-5"}],"event":{"name":"2025 IEEE Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2025,3,31]]},"location":"Napoli, Italy","end":{"date-parts":[[2025,4,4]]}},"container-title":["2025 IEEE Conference on Software Testing, Verification and Validation (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10988917\/10988918\/10988986.pdf?arnumber=10988986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:03:16Z","timestamp":1747807396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10988986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icst62969.2025.10988986","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}