{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:44:24Z","timestamp":1730299464282,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,24]]},"DOI":"10.1109\/syscon47679.2020.9275875","type":"proceedings-article","created":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T04:40:26Z","timestamp":1607402426000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Mutation Testing to Validate Networks Protocols"],"prefix":"10.1109","author":[{"given":"Izzat","family":"Alsmadi","sequence":"first","affiliation":[]},{"given":"Anis","family":"Zarrad","sequence":"additional","affiliation":[]},{"given":"Abdulrahmane","family":"Yassine","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.835"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00027-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(93)90053-6"},{"journal-title":"Design of mutant operators for the C programming language","year":"2006","author":"agrawal","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3242102.3242118"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3242102.3242136"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/DISTRA.2018.8601014"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1145\/2931037.2931040","article-title":"Threats to the Validity of Mutation-Based Test Assessment","author":"papadakis","year":"2016","journal-title":"Proceedings of the International Symposium on Software Testing and Analysis - ISSTA '00"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2010.64"},{"key":"ref40","article-title":"Simulation-Based Performance Evaluation of Routing Protocols in Vehicular Ad-hoc Network","volume":"3","author":"vaishali","year":"2013","journal-title":"International Journal of Scientific and Research Publications"},{"key":"ref11","article-title":"One methodological approach to the development of dynamic adaptation structures in network simulators","author":"kalji?","year":"2010","journal-title":"9th International Symposium on Electronics and Telecommunications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2012.90"},{"key":"ref13","article-title":"Analysis of the Development Process of a Mutation Testing Tool for the C++ Language","author":"delgado-perez","year":"2014","journal-title":"The Ninth International Multi-Conference on Computing in the Global Information Technology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SIITME.2011.6102728"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/65.953234"},{"article-title":"A Survey of Network Simulation Tools: Current Status and Future Developments","year":"2008","author":"pan","key":"ref16"},{"key":"ref17","article-title":"A reliability test case generation algorithm based on a profile for communication network","author":"liu","year":"2010","journal-title":"IIS Industrial and Information Systems 2nd International Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868420"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NGCT.2016.7877527"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2768498"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDSS.2017.8073696"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71760-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904764"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514441"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717738216"},{"key":"ref5","article-title":"Comparative analysis of ad-hoc routing protocols based on user&#x2019;s point of view","author":"bilandi","year":"2013","journal-title":"Advance Computing Conference IACC"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DISTRA.2017.8167679"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DS-RT.2006.6"},{"key":"ref2","article-title":"Implementation and real-world evaluations of routing protocols for wireless ad hock networks","author":"lundgren","year":"2002","journal-title":"IT Licentiate Theses Dept IT UPPSALA Univ"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.133"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02138-1_19"},{"key":"ref20","first-page":"3021","article-title":"Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time","volume":"2","author":"ambhaikar","year":"2010","journal-title":"IJCSEInternational Journal on Computer Science and Engineering"},{"key":"ref22","article-title":"Performance Evaluation of OLSR Routing Protocol in Ad Hoc Network","volume":"10","author":"lumbantoruan","year":"0","journal-title":"ARPN Journal of Engineering and Applied Sciences"},{"key":"ref21","first-page":"379","article-title":"Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET","volume":"3","author":"maleh","year":"2014","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.242"},{"key":"ref24","article-title":"Wireless Mesh Network Implementation for Data Communication Network in Wireless Weather Station","author":"yunazar","year":"2012","journal-title":"PusatPenelitianInformatikaLembagaIlmuPengetahuan Indonesia"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815477"},{"key":"ref23","article-title":"Community based home security system using wireless mesh network","author":"emegat","year":"2013","journal-title":"Malaysia Department of MIIT University of Kuala Lumpur"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.59"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2006.49"}],"event":{"name":"2020 IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2020,8,24]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,9,20]]}},"container-title":["2020 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9275655\/9275656\/09275875.pdf?arnumber=9275875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:15:52Z","timestamp":1656602152000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9275875\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,24]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/syscon47679.2020.9275875","relation":{},"subject":[],"published":{"date-parts":[[2020,8,24]]}}}