{"id":"https://openalex.org/W950259339","doi":"https://doi.org/10.1007/978-3-662-44857-1_4","title":"Plan It! Automated Security Testing Based on Planning","display_name":"Plan It! Automated Security Testing Based on Planning","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W950259339","doi":"https://doi.org/10.1007/978-3-662-44857-1_4","mag":"950259339"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-662-44857-1_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-44857-1_4","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-44857-1_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-44857-1_4.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011388533","display_name":"Franz Wotawa","orcid":"https://orcid.org/0000-0002-0462-2283"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Franz Wotawa","raw_affiliation_strings":["Institute for Software Technology, Graz University of Technology, A-8010, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Software Technology, Graz University of Technology, A-8010, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040492454","display_name":"Josip Bo\u017ei\u0107","orcid":"https://orcid.org/0000-0001-6086-8846"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Josip Bozic","raw_affiliation_strings":["Institute for Software Technology, Graz University of Technology, A-8010, Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Software Technology, Graz University of Technology, A-8010, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011388533"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.5678,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.81176471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"48","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7576869130134583},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.6449823379516602},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5705252885818481},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5382646322250366},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5078900456428528},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.46612218022346497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43501412868499756},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.13241592049598694},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1253231167793274},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.11648279428482056}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7576869130134583},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.6449823379516602},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5705252885818481},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5382646322250366},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5078900456428528},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.46612218022346497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43501412868499756},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.13241592049598694},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1253231167793274},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.11648279428482056},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-662-44857-1_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-44857-1_4","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-44857-1_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01405274v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01405274","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.48-62, &#x27E8;10.1007/978-3-662-44857-1_4&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-662-44857-1_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-44857-1_4","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-44857-1_4.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320313144","display_name":"ITEA","ror":null},{"id":"https://openalex.org/F4320323031","display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","ror":"https://ror.org/028jc0449"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W950259339.pdf","grobid_xml":"https://content.openalex.org/works/W950259339.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W202029017","https://openalex.org/W445426465","https://openalex.org/W1491155388","https://openalex.org/W1550227173","https://openalex.org/W1566733061","https://openalex.org/W1597750657","https://openalex.org/W1699699942","https://openalex.org/W1841879996","https://openalex.org/W2003803959","https://openalex.org/W2008172252","https://openalex.org/W2080482853","https://openalex.org/W2105242187","https://openalex.org/W2129906605","https://openalex.org/W2167075505","https://openalex.org/W2184914857","https://openalex.org/W2241040117","https://openalex.org/W2337392266","https://openalex.org/W2497789484","https://openalex.org/W2505960402","https://openalex.org/W2617307175","https://openalex.org/W2948004622","https://openalex.org/W3100908892","https://openalex.org/W4235141498","https://openalex.org/W4239648710"],"related_works":["https://openalex.org/W2997567050","https://openalex.org/W1483272040","https://openalex.org/W4283377908","https://openalex.org/W2362245765","https://openalex.org/W2296529071","https://openalex.org/W4296193476","https://openalex.org/W25269108","https://openalex.org/W3196886776","https://openalex.org/W3023142714","https://openalex.org/W3018912750"],"abstract_inverted_index":{"Testing":[0],"of":[1,15,59,83],"web":[2,33],"applications":[3],"for":[4],"common":[5],"vulnerabilities":[6,27],"still":[7],"represents":[8],"a":[9,40,81,117],"major":[10],"challenge":[11],"in":[12,39,92,113],"the":[13,32,53,57,60,121,126,131,135,142],"area":[14],"security":[16],"testing.":[17],"The":[18],"objective":[19],"here":[20],"is":[21,63,123],"not":[22,64],"necessarily":[23],"to":[24,29,52,72,88,94,110,124],"find":[25],"new":[26],"but":[28],"ensure":[30],"that":[31,86],"application":[34,127],"handles":[35],"well-known":[36],"attack":[37,49,61],"patterns":[38,50],"reliable":[41],"way.":[42],"Previously":[43],"developed":[44],"methods":[45],"based":[46,138],"on":[47],"formalizing":[48],"contribute":[51],"underlying":[54,143],"challenge.":[55],"However,":[56],"adaptation":[58],"models":[62],"easy":[65],"and":[66,103,145,147],"requires":[67],"substantial":[68],"effort.":[69],"In":[70,130],"order":[71,93],"make":[73],"modeling":[74],"easier":[75],"we":[76,107,133],"suggest":[77],"representing":[78],"attacks":[79],"as":[80,116],"sequence":[82],"known":[84],"actions":[85],"have":[87],"be":[89,95],"carried":[90],"out":[91],"successful.":[96],"Each":[97],"action":[98],"has":[99],"some":[100,104,149],"pre":[101],"conditions":[102],"effects.":[105],"Hence,":[106],"are":[108],"able":[109],"represent":[111],"testing":[112,139],"this":[114],"context":[115],"planning":[118,137],"problem":[119],"where":[120],"goal":[122],"break":[125],"under":[128],"test.":[129],"paper,":[132],"discuss":[134],"proposed":[136],"approach,":[140],"introduce":[141],"concepts":[144],"definitions,":[146],"present":[148],"experimental":[150],"results":[151],"obtained":[152],"from":[153],"an":[154],"implementation.":[155]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-10T00:00:00"}
