{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T12:50:36Z","timestamp":1777639836847,"version":"3.51.4"},"reference-count":154,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T00:00:00Z","timestamp":1489104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61572197, 61402178, 61361136002 and 61572312"],"award-info":[{"award-number":["61572197, 61402178, 61361136002 and 61572312"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"United States NSF","award":["1117603, 1319187 and 1349528"],"award-info":[{"award-number":["1117603, 1319187 and 1349528"]}]},{"name":"Shanghai STC Project","award":["14YF1404300"],"award-info":[{"award-number":["14YF1404300"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2018,1,31]]},"abstract":"<jats:p>Data-flow testing (DFT) is a family of testing strategies designed to verify the interactions between each program variable\u2019s definition and its uses. Such a test objective of interest is referred to as a<jats:italic>def-use pair<\/jats:italic>. DFT selects test data with respect to various test adequacy criteria (i.e.,<jats:italic>data-flow coverage criteria<\/jats:italic>) to exercise each pair. The original conception of DFT was introduced by Herman in 1976. Since then, a number of studies have been conducted, both theoretically and empirically, to analyze DFT\u2019s complexity and effectiveness. In the past four decades, DFT has been continuously concerned, and various approaches from different aspects are proposed to pursue automatic and efficient data-flow testing. This survey presents a detailed overview of data-flow testing, including challenges and approaches in enforcing and automating it: (1) it introduces the data-flow analysis techniques that are used to identify def-use pairs; (2) it classifies and discusses techniques for data-flow-based test data generation, such as search-based testing, random testing, collateral-coverage-based testing, symbolic-execution-based testing, and model-checking-based testing; (3) it discusses techniques for tracking data-flow coverage; (4) it presents several DFT applications, including software fault localization, web security testing, and specification consistency checking; and (5) it summarizes recent advances and discusses future research directions toward more practical data-flow testing.<\/jats:p>","DOI":"10.1145\/3020266","type":"journal-article","created":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T12:25:15Z","timestamp":1489407915000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["A Survey on Data-Flow Testing"],"prefix":"10.1145","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1628-9796","authenticated-orcid":false,"given":"Ting","family":"Su","sequence":"first","affiliation":[{"name":"School of Computer Science and Software Engineering, East China Normal University, Shanghai, China"}]},{"given":"Ke","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, East China Normal University, Shanghai, China"}]},{"given":"Weikai","family":"Miao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, East China Normal University, Shanghai, China"}]},{"given":"Geguang","family":"Pu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, East China Normal University, Shanghai, China"}]},{"given":"Jifeng","family":"He","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, East China Normal University, Shanghai, China"}]},{"given":"Yuting","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"e_1_2_1_2_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"1986"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.417"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/360018.360025"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336759"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2003.1251034"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809163"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001452"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570123"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100119"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.17"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503274"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025173"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1808266.1808275"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9150-y"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.54"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810353"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390634"},{"key":"e_1_2_1_21_1","volume-title":"Software Testing Techniques","author":"Beizer B."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317455"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0044-z"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_16"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.223.0229"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DepCoS-RELCOMEX.2009.34"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28038-2_17"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/267896.267921"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/347324.348870"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation. 209--224","author":"Cadar Cristian"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"e_1_2_1_34_1","volume-title":"POKE-TOOL-A tool to support structural program testing based on data flow analysis. School of Electrical and Computer Engineering","author":"Chaim M. L."},{"key":"e_1_2_1_35_1","volume-title":"Delano Medeiros Beder, and Marcelo Morandini","author":"Chaim Marcos L.","year":"2011"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.02.007"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Sagar Chaki Edmund M. Clarke Alex Groce Somesh Jha and Helmut Veith. 2003. Modular verification of software components in C. In ICSE. 385--395. Sagar Chaki Edmund M. Clarke Alex Groce Somesh Jha and Helmut Veith. 2003. Modular verification of software components in C. In ICSE. 385--395.","DOI":"10.1109\/ICSE.2003.1201217"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.22"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368099"},{"key":"e_1_2_1_42_1","volume-title":"Workshop. 52--71","author":"Clarke Edmund M."},{"key":"e_1_2_1_43_1","volume-title":"Peled","author":"Clarke Edmund M.","year":"1999"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.41326"},{"key":"e_1_2_1_45_1","volume-title":"A Practitioner\u2019s Guide to Software Test Design","author":"Copeland Lee"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the IEEE 7th International Conference on Software Testing, Verification and Validation (ICST\u201914)","author":"Andrioli de Araujo Roberto Paulo","year":"2014"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78743-3_18"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-COMPANION.2009.5071042"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.104"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2013.6595804"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.18"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCPC.2009.5420148"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493451"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/267959.269970"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the 2nd Conference on Computer Science and Engineering. 21--28","author":"Edvardsson Jon","year":"1999"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90024-R"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/288195.288298"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.238581"},{"key":"e_1_2_1_60_1","volume-title":"Weyuker","author":"Frankl Phyllis G.","year":"1985"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the 2nd Conference on Software Development Tools, Techniques, and Alternatives. IEEE Computer Society Press","author":"Phyllis"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6194"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227195"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.14"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.402"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2009.31"},{"key":"e_1_2_1_67_1","first-page":"1","article-title":"A new software data-flow testing approach via ant colony algorithms","volume":"1","author":"Ghiduk Ahmed S.","year":"2010","journal-title":"Universal J. Comput. Sci. Eng. Technol."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPEC.2007.73"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370030205"},{"key":"e_1_2_1_70_1","first-page":"898","article-title":"Automatic test data generation for data flow testing using a genetic algorithm","volume":"11","author":"Girgis Moheb R.","year":"2005","journal-title":"J. UCS"},{"key":"e_1_2_1_71_1","first-page":"12","article-title":"Automatic generation of data flow test paths using a genetic algorithm","volume":"89","author":"Girgis Moheb R.","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181790"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102580"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.31"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPPS.1994.288300"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/152388.152391"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1992.242534"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/193173.195402"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/174662.174663"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606563"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503279"},{"key":"e_1_2_1_83_1","first-page":"92","article-title":"A data flow analysis approach to program testing","volume":"8","author":"Herman P. M.","year":"1976","journal-title":"Australian Comput. J."},{"key":"e_1_2_1_84_1","doi-asserted-by":"crossref","volume-title":"Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence","author":"Holland John H.","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"e_1_2_1_85_1","volume-title":"Insup Lee, Oleg Sokolsky, and Hasan Ural.","author":"Hong Hyoung Seok","year":"2003"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1689(200012)10:4%3C203::AID-STVR212%3E3.0.CO;2-2"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/11430230_3"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/AQSDT.1992.205829"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234184"},{"key":"e_1_2_1_90_1","volume-title":"Ostrand","author":"Hutchins Monica","year":"1994"},{"key":"e_1_2_1_91_1","volume-title":"DO-178b: Software considerations in airborne systems and equipment certification. Requirements and Technical Concepts for Aviation (December","author":"RTCA.","year":"1992"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.40"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568271"},{"key":"e_1_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Mariam Kamkar Peter Fritzson and Nahid Shahmehri. 1993. Interprocedural dynamic slicing applied to interprocedural data flow testing. In ICSM. 386--395. Mariam Kamkar Peter Fritzson and Nahid Shahmehri. 1993. Interprocedural dynamic slicing applied to interprocedural data flow testing. In ICSM. 386--395.","DOI":"10.1109\/ICSM.1993.366924"},{"key":"e_1_2_1_95_1","unstructured":"Ken Kennedy. 1979. A Survey of Data Flow Analysis Techniques. IBM Thomas J. Watson Research Division. Ken Kennedy. 1979. A Survey of Data Flow Analysis Techniques. IBM Thomas J. Watson Research Division."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.31671\/dogus.2019.387"},{"key":"e_1_2_1_97_1","volume-title":"Software Testing - Techniques and Applications","author":"Khannur Arunkumar"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277175"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAICPART.2009.15"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16573-3_11"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236871"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/357062.357071"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509553"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.24"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2008.21"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277183"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.13"},{"key":"e_1_2_1_109_1","volume-title":"Proceedings of the 1st Asia-Pacific Conference on Quality Software","author":"Liu Chien-Hung","year":"2000"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23702-7_11"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.07.006"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/229000.226312"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1245299"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2002.1181506"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368139"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595720"},{"key":"e_1_2_1_118_1","unstructured":"Ettore Merlo and Giuliano Antoniol. 1999. A static measure of a subset of intra-procedural data flow testing coverage based on node coverage. In CASCON. 7. Ettore Merlo and Giuliano Antoniol. 1999. A static measure of a subset of intra-procedural data flow testing coverage based on node coverage. In CASCON. 7."},{"key":"e_1_2_1_119_1","volume-title":"Genetic Algorithms + Data Structures &equals","author":"Michalewicz Zbigniew"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31985-6_17"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062496"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572280"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14825-5_1"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199902)29:2%3C167::AID-SPE225%3E3.0.CO;2-V"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558569_16"},{"key":"e_1_2_1_127_1","volume-title":"Proceedings of the Symposium on Testing, Analysis, and Verification. 74--86","author":"Thomas"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120814"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.286418"},{"key":"e_1_2_1_131_1","volume-title":"Software Testing and Analysis: Process, Principles and Techniques","author":"Pezz\u00e8 Mauro"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.06.005"},{"key":"e_1_2_1_133_1","volume-title":"Proceedings of the 6th International Conference on Software Engineering (ICSE\u201982)","author":"Rapps Sandra"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232226"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/581396.581398"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321682"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070508"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188895.1188899"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_2_1_140_1","first-page":"15","article-title":"A hybrid PSO approach to automate test data generation for data flow coverage with dominance concepts","volume":"37","author":"Singla Sanjay","year":"2011","journal-title":"J. Adv. Sci. Technol."},{"key":"e_1_2_1_141_1","first-page":"265","article-title":"An automatic test data generation for data flow coverage using soft computing approach","volume":"2","author":"Singla Sanjay","year":"2011","journal-title":"IJRRCS"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1245302"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.81"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.23"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2009.53"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007528"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00227-3"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.11.013"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591079"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698890"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2009.58"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2009.10"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00190-2"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.44376"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.241773"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm021"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2011.07.008"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.5555\/950785.950862"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3020266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3020266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:53Z","timestamp":1750220633000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3020266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,10]]},"references-count":154,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1,31]]}},"alternative-id":["10.1145\/3020266"],"URL":"https:\/\/doi.org\/10.1145\/3020266","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,10]]},"assertion":[{"value":"2015-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}