{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T04:47:59Z","timestamp":1776228479751,"version":"3.50.1"},"reference-count":148,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100002924","name":"European Commission (FEDER)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002924","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Spanish Government"},{"name":"CICYT projects TAPAS","award":["TIN2012-32273"],"award-info":[{"award-number":["TIN2012-32273"]}]},{"name":"BELI","award":["TIN2015-70560-R"],"award-info":[{"award-number":["TIN2015-70560-R"]}]},{"name":"Andalusian Government projects THEOS","award":["TIC-5906"],"award-info":[{"award-number":["TIC-5906"]}]},{"name":"COPAS","award":["P12-TIC-1867"],"award-info":[{"award-number":["P12-TIC-1867"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2016,9,1]]},"DOI":"10.1109\/tse.2016.2532875","type":"journal-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T19:24:19Z","timestamp":1456773859000},"page":"805-824","source":"Crossref","is-referenced-by-count":471,"title":["A Survey on Metamorphic Testing"],"prefix":"10.1109","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8816-6213","authenticated-orcid":false,"given":"Sergio","family":"Segura","sequence":"first","affiliation":[]},{"given":"Gordon","family":"Fraser","sequence":"additional","affiliation":[]},{"given":"Ana B.","family":"Sanchez","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Ruiz-Cortes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Metamorphic testing and its applications","author":"zhou","year":"2004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.24"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982502"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22386-0_19"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.920"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.23"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2009.28"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1188895.1188901"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.179"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2011.65"},{"key":"ref28","first-page":"128","article-title":"Metamorphic testing and testing with special values","author":"chen","year":"0","journal-title":"Proc 5th ACIS Int Conf Softw Eng Artif Intell Netw Parallel\/Distrib Comput"},{"key":"ref27","first-page":"569","article-title":"Case studies on the selection of useful relations in metamorphic testing","author":"chen","year":"0","journal-title":"Proc 4th Ibero-Am Symp Softw Eng Knowl Eng"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2009.00578"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.437"},{"key":"ref22","first-page":"xiii","author":"webster","year":"2002","journal-title":"MIS Quart"},{"key":"ref21","article-title":"Procedures for performing systematic reviews","author":"kitchenham","year":"2004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102580"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.01.001"},{"key":"ref101","first-page":"530","article-title":"Testing central processing unit scheduling algorithms using metamorphic testing","author":"jiang","year":"0","journal-title":"Proc IEEE Int Softw Eng Service Sci Conf"},{"key":"ref26","author":"segura","year":"2016"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115306"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9151-x"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2014.29"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET.2010.28"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302467"},{"key":"ref59","author":"kanewala","year":"2015","journal-title":"Software Testing Verification and Reliability"},{"key":"ref58","article-title":"Properties of machine learning applications for use in metamorphic testing","author":"murphy","year":"2008"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.62"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698899"},{"key":"ref55","first-page":"437","article-title":"Case studies on testing with compositional metamorphic relations","volume":"24","author":"dong","year":"2008","journal-title":"J Southeast Univ (English Edition)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2012.10"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2013.14"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194006002951"},{"key":"ref40","first-page":"24","author":"chen","year":"2009","journal-title":"BioMed Central Bioinformatics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.46"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372785"},{"key":"ref6","first-page":"1980","author":"cody","year":"0","journal-title":"Software Manual for the Elementary Functions"},{"key":"ref5","article-title":"Metamorphic testing: A new approach for generating next test cases","author":"chen","year":"1998"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/12.2185"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1808266.1808280"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(93)90044-W"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/STEP.2003.18"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2011.21"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2009.0084"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.43"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.43"},{"key":"ref42","first-page":"439","article-title":"An optimized method for generating cases of metamorphic testing","author":"chen","year":"0","journal-title":"Proc 6th Int Conf New Trends Inform Sci Service Sci Data Mining"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19423-8_19"},{"key":"ref44","first-page":"193","article-title":"Security assurance with program path analysis and metamorphic testing","author":"dong","year":"0","journal-title":"Proc IEEE Int Softw Eng Service Sci Conf"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2010.25"},{"key":"ref127","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/978-3-642-32129-0_20","article-title":"An automated metamorphic testing technique for designing effective metamorphic relations","volume":"306","author":"batra","year":"2012","journal-title":"Contemporary Computing"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/381389"},{"key":"ref125","first-page":"488","article-title":"Research on metamorphic testing: A case study in integer bugs detection","author":"yao","year":"0","journal-title":"Proc 4th Int Conf Intell Syst Design Eng Appl 2013"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30126-1_16"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1566"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.20"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCE.2015.138"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2007.4385510"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-014-3040-y"},{"key":"ref70","first-page":"19","article-title":"Iterative metamorphic testing","volume":"1","author":"wu","year":"0","journal-title":"Proc Annu Int Comput Softw Appl Conf"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1987993.1988003"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.348"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1496653.1496659"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2007.4385527"},{"key":"ref75","author":"murphy","year":"2010"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.98"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/566171.566202"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2001.960614"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.19"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"ref79","year":"0"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2011.20"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.101"},{"key":"ref138","year":"0"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.08.008"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642994"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.45"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635888"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568287"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591078"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/AST.2015.19"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.9"},{"key":"ref65","author":"chen","year":"2015","journal-title":"J Syst Softw"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.18"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.69"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03095-1_43"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2003.1245319"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390662"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1360\/jos161210"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591109"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"ref69","first-page":"245","author":"segura","year":"0","journal-title":"Inform Softw Technol"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.79"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/25.4.465"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2009.26"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.20"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.438"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1002\/stvr.408","author":"chan","year":"2010","journal-title":"J Software Testing Verification and Reliability"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-012-9208-5"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.167"},{"key":"ref106","first-page":"1","author":"nu\u00f1ez","year":"2014","journal-title":"Ann Telecommun -Ann T&#x00E9;l&#x00E9;commun"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194007003471"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982597"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2006.45"},{"key":"ref104","year":"2015"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2478001"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02138-1_19"},{"key":"ref102","first-page":"91","article-title":"Metamorphic testing using geometric interrogation technique and its application","author":"sim","year":"0","journal-title":"Proc 2nd Int Conf Elect Eng \/Electron Comput Telecommun Inform Technol"},{"key":"ref111","first-page":"623","author":"jing","year":"2011","journal-title":"J Electron (China)"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/BioMedCom.2012.17"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl671"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2005.3"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73230-3_7"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2015.7176238"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2004.1342879"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2005.130"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2010.31"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AST.2015.18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2012.21"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2013.16"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.39"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECSE.2013.6615099"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2015.13"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2014.6968586"},{"key":"ref17","first-page":"130","article-title":"Survey of metamorphic testing","volume":"3","author":"dong","year":"2009","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572295"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00129-5"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.4018\/jwsr.2007040103"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594334"},{"key":"ref19","first-page":"35","author":"ernst","year":"0","journal-title":"Sci Comput Program"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2005.67"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.161"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/BioMedCom.2012.18"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2002.1045022"},{"key":"ref80","first-page":"867","article-title":"Properties of machine learning applications for use in metamorphic testing","author":"murphy","year":"0","journal-title":"Proc Int Conf on Software Eng Knowledge Eng"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2010.75"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/1083231.1083236"},{"key":"ref89","article-title":"Automated functional testing of web search engines in the absence of an oracle","author":"zhou","year":"2007"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2010.5689221"},{"key":"ref122","year":"0"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.26"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.4018\/jwsr.2012010103"},{"key":"ref86","first-page":"1","article-title":"An approach to metamorphic testing for WS-BPEL compositions","author":"castro-cabrera","year":"0","journal-title":"Proc Int Conf E-Bus"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35755-8_13"},{"key":"ref88","year":"2007"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7569153\/07422146.pdf?arnumber=7422146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T15:32:42Z","timestamp":1748791962000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7422146\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,1]]},"references-count":148,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tse.2016.2532875","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,1]]}}}