{"id":"https://openalex.org/W2049280001","doi":"https://doi.org/10.1007/s11761-013-0139-1","title":"A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation","display_name":"A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation","publication_year":2013,"publication_date":"2013-08-09","ids":{"openalex":"https://openalex.org/W2049280001","doi":"https://doi.org/10.1007/s11761-013-0139-1","mag":"2049280001"},"language":"en","primary_location":{"id":"doi:10.1007/s11761-013-0139-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11761-013-0139-1","pdf_url":null,"source":{"id":"https://openalex.org/S4210170441","display_name":"Service Oriented Computing and Applications","issn_l":"1863-2386","issn":["1863-2386","1863-2394"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Service Oriented Computing and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063671391","display_name":"Jinfu Chen","orcid":"https://orcid.org/0000-0002-3124-5452"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinfu Chen","raw_affiliation_strings":["School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100734609","display_name":"Qing Li","orcid":"https://orcid.org/0000-0002-6071-473X"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Li","raw_affiliation_strings":["School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005231122","display_name":"Chengying Mao","orcid":"https://orcid.org/0000-0001-8178-1205"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengying Mao","raw_affiliation_strings":["School of Software and Communication Engineering, Jiangxi University of Finance and Economics, Nanchang, 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Communication Engineering, Jiangxi University of Finance and Economics, Nanchang, 330013, China","institution_ids":["https://openalex.org/I59649739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049154334","display_name":"Dave Towey","orcid":"https://orcid.org/0000-0003-0877-4353"},"institutions":[{"id":"https://openalex.org/I12615008","display_name":"Beijing Normal University - Hong Kong Baptist University United International College","ror":"https://ror.org/04snvc712","country_code":"CN","type":"education","lineage":["https://openalex.org/I12615008"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dave Towey","raw_affiliation_strings":["BNU-HKBU: United International College, Zhuhai, 519085, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"BNU-HKBU: United International College, Zhuhai, 519085, Guangdong, China","institution_ids":["https://openalex.org/I12615008"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101715360","display_name":"Yongzhao Zhan","orcid":"https://orcid.org/0000-0003-2182-3770"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzhao Zhan","raw_affiliation_strings":["School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100379124","display_name":"Huanhuan Wang","orcid":"https://orcid.org/0000-0002-2542-6206"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huanhuan Wang","raw_affiliation_strings":["School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, 212013, China","institution_ids":["https://openalex.org/I115592961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5063671391"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":3.5079,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.92360991,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"8","issue":"1","first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7238256335258484},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.6717404127120972},{"id":"https://openalex.org/keywords/mutation-testing","display_name":"Mutation testing","score":0.56777024269104},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48494699597358704},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4235299825668335},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.42099496722221375},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41546106338500977},{"id":"https://openalex.org/keywords/mutation","display_name":"Mutation","score":0.38746577501296997},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2603922486305237},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16846594214439392},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12709683179855347}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7238256335258484},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.6717404127120972},{"id":"https://openalex.org/C163565370","wikidata":"https://www.wikidata.org/wiki/Q4308623","display_name":"Mutation testing","level":4,"score":0.56777024269104},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48494699597358704},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4235299825668335},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.42099496722221375},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41546106338500977},{"id":"https://openalex.org/C501734568","wikidata":"https://www.wikidata.org/wiki/Q42918","display_name":"Mutation","level":3,"score":0.38746577501296997},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2603922486305237},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16846594214439392},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12709683179855347},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11761-013-0139-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11761-013-0139-1","pdf_url":null,"source":{"id":"https://openalex.org/S4210170441","display_name":"Service Oriented Computing and Applications","issn_l":"1863-2386","issn":["1863-2386","1863-2394"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Service Oriented Computing and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1583562696","https://openalex.org/W1974084061","https://openalex.org/W2016346178","https://openalex.org/W2029254184","https://openalex.org/W2071367891","https://openalex.org/W2079189937","https://openalex.org/W2113001423","https://openalex.org/W2116818527","https://openalex.org/W2120006848","https://openalex.org/W2120995930","https://openalex.org/W2127371139","https://openalex.org/W2132137724","https://openalex.org/W2155285174","https://openalex.org/W2156149999","https://openalex.org/W2163362445","https://openalex.org/W2169630048","https://openalex.org/W2170184798","https://openalex.org/W2355689272","https://openalex.org/W2532322811","https://openalex.org/W3007141082"],"related_works":["https://openalex.org/W3140427364","https://openalex.org/W2192249094","https://openalex.org/W1645931506","https://openalex.org/W2889332190","https://openalex.org/W2076609667","https://openalex.org/W2607274985","https://openalex.org/W1987278052","https://openalex.org/W2979574739","https://openalex.org/W2189142505","https://openalex.org/W3129295186"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
