{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:08:24Z","timestamp":1770883704893,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Control and Instrumentation Nuclear Industry Forum"},{"name":"European Commission and the Spanish Ministry of Economy and Competitiveness"},{"name":"National Program for Research, Development and Innovation","award":["TIN2015-65845-C3-3-R"],"award-info":[{"award-number":["TIN2015-65845-C3-3-R"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/tr.2018.2864678","type":"journal-article","created":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T22:34:24Z","timestamp":1536014064000},"page":"1406-1419","source":"Crossref","is-referenced-by-count":21,"title":["Evaluation of Mutation Testing in a Nuclear Industry Case Study"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1568-9288","authenticated-orcid":false,"given":"Pedro","family":"Delgado-Perez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2736-8238","authenticated-orcid":false,"given":"Ibrahim","family":"Habli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2414-0115","authenticated-orcid":false,"given":"Steve","family":"Gregory","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3818-0310","authenticated-orcid":false,"given":"Rob","family":"Alexander","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9230-9739","authenticated-orcid":false,"given":"John","family":"Clark","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7543-2671","authenticated-orcid":false,"given":"Inmaculada","family":"Medina-Bulo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2008.18"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-1-4757-5939-6_17","article-title":"Proteum\/IM 2.0: An integrated mutation testing environment","author":"delamaro","year":"2001","journal-title":"Mutation Testing for the New Century"},{"key":"ref33","year":"2004"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.56"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.40"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1145\/2635868.2635929","article-title":"Are mutants a valid substitute for real faults in software testing?","author":"just","year":"2014","journal-title":"Proc Sixth ACM SIGSOFT Int'l Symp Foundations of Software Eng"},{"key":"ref37","first-page":"151","article-title":"Analysis of the development process of a mutation testing tool for the\n C++ language","author":"delgado-p\u00e9rez","year":"2014","journal-title":"Proc Int Multi-Conf Comput Global Inf Technol"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1680\/nuen.2006.2.3.140"},{"key":"ref34","year":"2014","journal-title":"Safety Assessment Principles for Nuclear Facilities"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/125489.125473"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2312"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806863"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1016\/j.infsof.2009.04.016","article-title":"Higher order mutation testing","volume":"51","author":"jia","year":"2009","journal-title":"Inf Softw Technol"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.226"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368136"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SBES.2014.14"},{"key":"ref17","article-title":"Design of mutant operators for the C\n programming language","author":"agrawal","year":"1989"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24855-2_155"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/229000.226313"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.79"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568271"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref6","year":"2011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"ref5","year":"2010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1994.0025"},{"key":"ref7","year":"2011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(93)90053-6"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSE.1977.231145","article-title":"testing programs with the aid of a compiler","volume":"se 3","author":"hamlet","year":"1977","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/CMPASS.1996.507890","article-title":"Detecting equivalent mutants and the feasible path problem","author":"offutt","year":"1996","journal-title":"Proc 11th Ann Conf Computer Assurance"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1473"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.05.012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1528"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.13"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.20"},{"key":"ref23","first-page":"936","article-title":"Trivial compiler equivalence: a large scale empirical study of a simple, fast and effective equivalent mutant detection technique","author":"papadakis","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568265"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.83"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8552524\/08453820.pdf?arnumber=8453820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T16:06:10Z","timestamp":1643299570000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8453820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":42,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2018.2864678","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]}}}