{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:40Z","timestamp":1773615580129,"version":"3.50.1"},"reference-count":13,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700774","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:32:40Z","timestamp":1771936360000},"page":"1253-1259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generalized Method for Comparative Analysis of Fuzz-Testing Tools"],"prefix":"10.3103","volume":"59","author":[{"given":"R. A.","family":"Ognev","sequence":"first","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7912_CR1","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/tse.2024.3368208","volume":"50","author":"J. Wang","year":"2024","unstructured":"Wang, J., Huang, Yu., Chen, Ch., Liu, Zh., Wang, S., and Wang, Q., Software testing with large language models: Survey, landscape, and vision, IEEE Trans. Software Eng., 2024, vol. 50, no. 4, pp. 911\u2013936. https:\/\/doi.org\/10.1109\/tse.2024.3368208","journal-title":"IEEE Trans. Software Eng."},{"key":"7912_CR2","doi-asserted-by":"publisher","unstructured":"Xu, H., Zhao, Y., and Wang, H., Directed greybox fuzzing via large language model, arXiv Preprint, 2025. https:\/\/doi.org\/10.48550\/arXiv.2505.03425","DOI":"10.48550\/arXiv.2505.03425"},{"key":"7912_CR3","doi-asserted-by":"publisher","unstructured":"Huang, L., Zhao, P., Chen, H., and Ma, L., Large language models based fuzzing techniques: A survey, arXiv Preprint, 2024. https:\/\/doi.org\/10.48550\/arXiv.2402.00350","DOI":"10.48550\/arXiv.2402.00350"},{"key":"7912_CR4","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems security, Intelligent Distributed Computing XIII, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41\u201347. https:\/\/doi.org\/10.1007\/978-3-030-32258-8_5","DOI":"10.1007\/978-3-030-32258-8_5"},{"key":"7912_CR5","doi-asserted-by":"publisher","unstructured":"Jiang, Yu., Liang, J., Ma, F., Chen, Yu., Zhou, Ch., Shen, Yu., Wu, Zh., Fu, J., Wang, M., Li, Sh., and Zhang, Q., When fuzzing meets LLMs: Challenges and opportunities, Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, Porto de Galinhas, Brazil, 2024, New York: Association for Computing Machinery, 2024, pp. 492\u2013496. https:\/\/doi.org\/10.1145\/3663529.3663784","DOI":"10.1145\/3663529.3663784"},{"key":"7912_CR6","doi-asserted-by":"publisher","unstructured":"Schloegel, M., Bars, N., Schiller, N., Bernhard, L., Scharnowski, T., Crump, A., Ale-Ebrahim, A., Bissantz, N., Muench, M., and Holz, T., SoK: Prudent evaluation practices for fuzzing, 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, 2024, IEEE, 2024, pp. 1974\u20131993. https:\/\/doi.org\/10.1109\/sp54263.2024.00137","DOI":"10.1109\/sp54263.2024.00137"},{"key":"7912_CR7","doi-asserted-by":"publisher","unstructured":"Hazimeh, A., Herrera, A., and Payer, M., Magma: A ground-truth fuzzing benchmark, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2020, vol. 4, no. 3, p. 49. https:\/\/doi.org\/10.1145\/3428334","DOI":"10.1145\/3428334"},{"key":"7912_CR8","doi-asserted-by":"publisher","unstructured":"Metzman, J., Szekeres, L., Simon, L., Sprabery, R., and Arya, A., FuzzBench: An open fuzzer benchmarking platform and service, Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, 2021, New York: Association for Computing Machinery, 2021, pp. 1393\u20131403. https:\/\/doi.org\/10.1145\/3468264.3473932","DOI":"10.1145\/3468264.3473932"},{"key":"7912_CR9","doi-asserted-by":"publisher","unstructured":"Suprun, A., Anisimov, V., Anisimov, E., Saurenko, T., and Manciu, I., Models and method of decision support for the formation of cybersecurity systems, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp.\u00a0357\u2013367. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_29","DOI":"10.1007\/978-3-030-93872-7_29"},{"key":"7912_CR10","doi-asserted-by":"publisher","unstructured":"Deng, Yi., Xia, Ch.S., Peng, H., Yang, Ch., and Zhang, L., Large language models are zero-shot fuzzers: Fuzzing deep-learning libraries via large language models, Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, WA, 2023, New York: Association for Computing Machinery, 2023, pp. 423\u2013435. https:\/\/doi.org\/10.1145\/3597926.3598067","DOI":"10.1145\/3597926.3598067"},{"key":"7912_CR11","doi-asserted-by":"publisher","unstructured":"Deng, Yi., Xia, Ch.S., Peng, H., Yang, Ch., and Zhang, L., Large language models are zero-shot fuzzers: Fuzzing deep-learning libraries via large language models, ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, WA, 2023, New York: Association for Computing Machinery, 2023, pp. 423\u2013435. https:\/\/doi.org\/10.1145\/3597926.3598067","DOI":"10.1145\/3597926.3598067"},{"key":"7912_CR12","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.3390\/sym14102208","volume":"14","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Ovasapyan, T., and Poltavtseva, M., Application of the learning automaton model for ensuring cyber resiliency, Symmetry, 2022, vol. 14, no. 10, p. 2208. https:\/\/doi.org\/10.3390\/sym14102208","journal-title":"Symmetry"},{"key":"7912_CR13","doi-asserted-by":"publisher","unstructured":"Xia, Ch.S., Paltenghi, M., Le Tian, J., Pradel, M., and Zhang, L., Fuzz4All: Universal fuzzing with large language models, Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, Lisbon, 2024, New York: Association for Computing Machinery, 2024, p. 126. https:\/\/doi.org\/10.1145\/3597503.3639121","DOI":"10.1145\/3597503.3639121"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700774.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700774","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700774.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:50Z","timestamp":1773612110000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":13,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7912"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700774","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"12 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}