[1]
S. Hanna and M. Munro, An approach for wsdl-based automated robustness testing of web services, presented at the 16th International Conference on Information Systems Development, Nanchang, China, 2009, pp. 1093-1104.
[2]
T. Takase and K. Tajima, Efficient web service message exchange by SOAP bounding framework, in the 11th IEEE International Enterprise Distributed Object Computing, Annapolis, MD, USA, 2007, pp. 63-72.
[3]
L. Wu, X. K. Li, and H. Wang, Research on the reliability testing of web service based on fault injection technology, Journal of Chinese Computer System, vol. 28, no. 1, pp. 127-131, 2007.
[4]
M. Palacios, J. Garcia-Fanjul, and J. Tuya, Testing in service oriented architectures with dynamic binding: A mapping study, Information and Software Technology, vol. 53, no. 3, pp. 171-189, 2011.
[5]
C. A. Sun, G. Wang, B. H. Mu, H. Liu, Z. S. Wang, and T. Y. Chen, A metamorphic relation-based approach to testing web services without oracles, International Journal of Web Services Research, vol. 9, no. 1, pp. 51-73, 2012.
[6]
C. A. Sun, G. Wang, B. H. Mu, H. Liu, Z. S. Wang, and T. Y. Chen, Metamorphic testing for web services: Framework and a case study, presented at the IEEE International Conference on Web Services, Washington DC, USA, 2011, pp. 283-290.
[7]
L. F. de Almeida and S. R. Vergilio, Exploring perturbation based testing for web services, presented at the IEEE International Conference on Web Services, Chicago, USA, 2006, pp. 717-726.
[8]
H. C. Kim, Y. H. Choi, and D. H. Lee, Efficient file fuzz testing using automated analysis of binary file format, Journal of Systems Architecture, vol. 57, no. 3, pp. 259-268, 2011.
[9]
S. Bekrar, C. Bekrar, R. Groz, and L. Mounier, Finding software vulnerabilities by smart fuzzing, in Proceedings of the Fourth IEEE International Conference on Software Testing, Verification and Validation, Berlin, Germany, 2011, pp. 427-430.
[10]
J. Offutt and W. Xu, Generating test cases for web services using data perturbation, ACM SIGSOFT Software Engineering Notes, vol. 29, no. 5, pp. 1-10, 2004.
[11]
A. C. V. de Melo and P. Silveira, Improving data perturbation testing techniques for web services, Information Science, vol. 181, no. 3, pp. 600-619, 2011.
[12]
P. Silveira and A. C. V. de Melo, Exploring XML perturbation techniques for web services testing, Lecture Notes in Computer Science, vol. 5648, pp. 355-369, 2009.
[13]
J. F. Chen, Q. Li, C. Y. Mao, D. Towey, Y. Z. Zhan, and H. H. Wang, A web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation, Service Oriented Computing and Applications, vol. 8, no. 1, pp. 1-13, 2014.
[14]
L. Novak and A. Zamulin, A formal model for XML schema, in Proceedings of the 21st International Conference on Data Engineering Workshops, Tokyo, Japan, pp. 1283-1293, 2005.
[15]
W. Xu, J. Offutt, and J. Luo, Testing web services by XML perturbation, in Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering, Chicago, USA, pp. 257-266, 2005.
[16]
J. F. Chen, Y. S. Lu, and X. D. Xie, Component security testing approach by using interface fault injection, Journal of Chinese Computer System, vol. 31, no. 6, pp. 1090-1096, 2010.
[17]
S. Anand, E. K. Burke, T. Y. Chen, J. Clark, M. B. Cohen, W. Grieskamp, M. Harman, M. J. Harrold, and P. McMinn, An orchestrated survey of methodologies for automated software test case generation, Journal of Systems and Software, vol. 86, no. 8, pp. 1978-2001, 2013.
[18]
T. Y. Chen, F. C. Kuo, H. Liu, and W. E. Wong, Code coverage of adaptive random testing, IEEE Transactions on Reliability, vol. 62 no. 1, pp. 226-237, 2013.
[19]
A. Shahbazi, A. Tappenden, and J. Miller, Centroidal voronoi tessellationsCa new approach to random testing, IEEE Transactions on Software Engineering, vol. 39, no. 2, pp. 163-183, 2013.
[20]
C. Bohm, S. Berchtold, and D. A. Keim, Searching in high dimensional spaces: Index structures for improving the performance of multimedia databases, ACM Computing Surveys, vol. 33, no. 3, pp. 322-373, 2001.
[21]
T. Y. Chen, F. C. Kuo, R. G. Merkel, and T. H. Tse, Adaptive random testing: The ART of test case diversity, Journal of Systems and Software, vol. 83, no. 1, pp. 60-66, 2010.
[22]
M. H. Alsuwaiyel, Algorithms: Design Techniques and Analysis. World Scientific Pub Co Inc, November 1998.
[23]
K. P. Chan, T. Y. Chen, and D. Towey, Adaptive random testing with filtering: An overhead reduction technique, presented at the 17th International Conference on Software Engineering and Knowledge Engineering, Taipei, China, pp. 292-299, 2005.
[24]
K. P. Chan, T. Y. Chen, and D. Towey, Restricted random testing: Adaptive random testing by exclusion, International Journal of Software Engineering and Knowledge Engineering, vol. 16, no. 4, pp. 553-584, 2006.
[25]
T. Y. Chen, F. C. Kuo, and C. A. Sun, Impact of the compactness of failure regions on the performance of adaptive random testing, Journal of Software, vol. 17, no. 12, pp. 2438-2449, 2006.
[26]
I. N. Bronshtein, K. A. Semendyayev, G. Musiol, and H. Mhlig, Handbook of Mathematics. Springer, 2007.
[27]
B. H. Li and Z. X. Hao, Efficient filtration and query algorithm of reverse furthest neighbor, Journal of Chinese Computer Systems, vol 30, no. 10, pp. 1948-1951, 2009.
[28]
J. M. Voas and K. W. Miller, Predicting software’s minimum-time-to-hazard andmean-time-to-hazard for rare input events, presented at the 6th International Symposium on Software Reliability Engineering, Toulouse, France, 1995, pp. 229-238.