{"id":"https://openalex.org/W2160470560","doi":"https://doi.org/10.1109/ssiri.2011.22","title":"Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing","display_name":"Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing","publication_year":2011,"publication_date":"2011-06-01","ids":{"openalex":"https://openalex.org/W2160470560","doi":"https://doi.org/10.1109/ssiri.2011.22","mag":"2160470560"},"language":"en","primary_location":{"id":"doi:10.1109/ssiri.2011.22","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssiri.2011.22","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://gcris.iyte.edu.tr/bitstreams/10477213-7fc5-4915-93cd-466334f44348/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062663699","display_name":"Tu\u011fkan Tu\u011flular","orcid":"https://orcid.org/0000-0001-6797-3913"},"institutions":[{"id":"https://openalex.org/I120217413","display_name":"Izmir Institute of Technology","ror":"https://ror.org/03stptj97","country_code":"TR","type":"education","lineage":["https://openalex.org/I120217413"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Tugkan Tuglular","raw_affiliation_strings":["Department of Computer Engineering, Izmir Institute of Technology, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Izmir Institute of Technology, Turkey","institution_ids":["https://openalex.org/I120217413"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024229325","display_name":"Gurcan Gercek","orcid":null},"institutions":[{"id":"https://openalex.org/I120217413","display_name":"Izmir Institute of Technology","ror":"https://ror.org/03stptj97","country_code":"TR","type":"education","lineage":["https://openalex.org/I120217413"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Gurcan Gercek","raw_affiliation_strings":["Department of Computer Engineering, Izmir Institute of Technology, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Izmir Institute of Technology, Turkey","institution_ids":["https://openalex.org/I120217413"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062663699"],"corresponding_institution_ids":["https://openalex.org/I120217413"],"apc_list":null,"apc_paid":null,"fwci":0.4048,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.7009311,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"10","issue":null,"first_page":"157","last_page":"164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.9063863754272461},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7491730451583862},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.591111421585083},{"id":"https://openalex.org/keywords/white-box-testing","display_name":"White-box testing","score":0.5337957143783569},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4990417957305908},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.45257091522216797},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3774873614311218},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3031361699104309},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.19586074352264404},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1806693971157074},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.12425458431243896},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.09853625297546387}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.9063863754272461},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7491730451583862},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.591111421585083},{"id":"https://openalex.org/C162443782","wikidata":"https://www.wikidata.org/wiki/Q1066228","display_name":"White-box testing","level":5,"score":0.5337957143783569},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4990417957305908},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45257091522216797},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3774873614311218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3031361699104309},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.19586074352264404},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1806693971157074},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.12425458431243896},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.09853625297546387},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ssiri.2011.22","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssiri.2011.22","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","raw_type":"proceedings-article"},{"id":"pmh:oai:openaccess.iyte.edu.tr:8080:11147/4999","is_oa":true,"landing_page_url":"http://doi.org/10.1109/SSIRI.2011.22","pdf_url":"http://gcris.iyte.edu.tr/bitstreams/10477213-7fc5-4915-93cd-466334f44348/download","source":{"id":"https://openalex.org/S4306400894","display_name":"\u0130YTE (\u0130ZM\u0130R Y\u00dcKSEK TEKNOLOJ\u0130 ENST\u0130T\u00dcS\u00dc)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I120217413","host_organization_name":"Izmir Institute of Technology","host_organization_lineage":["https://openalex.org/I120217413"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conferenceObject"},{"id":"pmh:oai:gcris.iyte.edu.tr:11147/4999","is_oa":true,"landing_page_url":"http://hdl.handle.net/11147/4999","pdf_url":null,"source":{"id":"https://openalex.org/S4306400894","display_name":"\u0130YTE (\u0130ZM\u0130R Y\u00dcKSEK TEKNOLOJ\u0130 ENST\u0130T\u00dcS\u00dc)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I120217413","host_organization_name":"Izmir Institute of Technology","host_organization_lineage":["https://openalex.org/I120217413"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Object"}],"best_oa_location":{"id":"pmh:oai:openaccess.iyte.edu.tr:8080:11147/4999","is_oa":true,"landing_page_url":"http://doi.org/10.1109/SSIRI.2011.22","pdf_url":"http://gcris.iyte.edu.tr/bitstreams/10477213-7fc5-4915-93cd-466334f44348/download","source":{"id":"https://openalex.org/S4306400894","display_name":"\u0130YTE (\u0130ZM\u0130R Y\u00dcKSEK TEKNOLOJ\u0130 ENST\u0130T\u00dcS\u00dc)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I120217413","host_organization_name":"Izmir Institute of Technology","host_organization_lineage":["https://openalex.org/I120217413"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conferenceObject"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2160470560.pdf","grobid_xml":"https://content.openalex.org/works/W2160470560.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W1544658515","https://openalex.org/W1567645817","https://openalex.org/W1573602192","https://openalex.org/W1718921878","https://openalex.org/W1809006150","https://openalex.org/W1965028135","https://openalex.org/W1987278052","https://openalex.org/W2006027584","https://openalex.org/W2059083413","https://openalex.org/W2104299015","https://openalex.org/W2122106619","https://openalex.org/W2128429374","https://openalex.org/W2132434720","https://openalex.org/W2135841285","https://openalex.org/W2139763472","https://openalex.org/W2345578677","https://openalex.org/W4229850662","https://openalex.org/W4233003621","https://openalex.org/W6675904111"],"related_works":["https://openalex.org/W2042688990","https://openalex.org/W2389863504","https://openalex.org/W2785784743","https://openalex.org/W2766864291","https://openalex.org/W2762356698","https://openalex.org/W2127561726","https://openalex.org/W143204455","https://openalex.org/W2357071520","https://openalex.org/W2373857385","https://openalex.org/W2038840231"],"abstract_inverted_index":{"As":[0],"part":[1],"of":[2,100],"network":[3],"security":[4,16],"testing,":[5],"an":[6],"administrator":[7],"needs":[8],"to":[9,46,54,109],"know":[10],"whether":[11],"the":[12,15,68,111],"firewall":[13,49,65,71,82,101],"enforces":[14],"policy":[17],"as":[18],"expected":[19],"or":[20],"not.":[21],"In":[22,33,67],"this":[23,34],"setting,":[24],"black-box":[25],"testing":[26,72],"and":[27,51],"evaluation":[28],"methodologies":[29],"can":[30],"be":[31],"helpful.":[32],"paper,":[35],"we":[36],"employ":[37],"a":[38,44,104],"simple":[39],"mutation":[40],"operation,":[41],"namely":[42],"flipping":[43],"bit,":[45],"generate":[47],"mutant":[48],"policies":[50],"use":[52],"them":[53],"evaluate":[55],"our":[56],"previously":[57,69],"proposed":[58,70,112],"weighted":[59],"test":[60,75,89,94],"case":[61,105],"selection":[62],"method":[63],"for":[64,97],"testing.":[66],"approach,":[73],"abstract":[74],"cases":[76],"that":[77],"are":[78,85],"automatically":[79],"generated":[80],"from":[81,92],"decision":[83],"diagrams":[84],"instantiated":[86],"by":[87],"selecting":[88],"input":[90],"values":[91],"different":[93],"data":[95],"pools":[96],"each":[98],"field":[99],"policy.":[102],"Furthermore,":[103],"study":[106],"is":[107],"presented":[108],"validate":[110],"approach.":[113]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2016-06-24T00:00:00"}
