{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T12:27:57Z","timestamp":1771590477223,"version":"3.50.1"},"reference-count":67,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1016\/j.infsof.2024.107564","type":"journal-article","created":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T23:14:03Z","timestamp":1724714043000},"page":"107564","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["Enhancing logic-based testing with EvoDomain: A search-based domain-oriented test suite generation approach"],"prefix":"10.1016","volume":"177","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8730-2911","authenticated-orcid":false,"given":"Akram","family":"Kalaee","sequence":"first","affiliation":[]},{"given":"Saeed","family":"Parsa","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Mansouri","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.infsof.2024.107564_bib0001","series-title":"Software testing and quality assurance: theory and practice","author":"Naik","year":"2011"},{"key":"10.1016\/j.infsof.2024.107564_bib0002","series-title":"Introduction to software testing","author":"Ammann","year":"2016"},{"issue":"8","key":"10.1016\/j.infsof.2024.107564_bib0003","doi-asserted-by":"crossref","first-page":"2002","DOI":"10.1016\/j.jss.2012.08.024","article-title":"Improving logic-based testing","volume":"86","author":"Kaminski","year":"2013","journal-title":"Journal of Systems and Software"},{"issue":"12","key":"10.1016\/j.infsof.2024.107564_bib0004","doi-asserted-by":"crossref","first-page":"2618","DOI":"10.1016\/j.jss.2010.08.021","article-title":"A uniform random test data generator for path testing","volume":"83","author":"Gotlieb","year":"2010","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"10.1016\/j.infsof.2024.107564_bib0005","doi-asserted-by":"crossref","first-page":"2666","DOI":"10.3906\/elk-1801-18","article-title":"Path-oriented random testing through iterative partitioning (IP-PRT)","volume":"27","author":"Nikravan","year":"2019","journal-title":"Turkish Journal of Electrical Engineering and Computer Sciences"},{"issue":"2","key":"10.1016\/j.infsof.2024.107564_bib0006","first-page":"167","article-title":"The dynamic domain reduction procedure for test data generation","volume":"29","author":"Offutt","year":"1999","journal-title":"Software: Practice and Experience"},{"issue":"2","key":"10.1016\/j.infsof.2024.107564_bib0007","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1007\/s11219-019-09471-4","article-title":"Improving dynamic domain reduction test data generation method by Euler\/Venn reasoning system","volume":"28","author":"Nikravan","year":"2020","journal-title":"Software Quality Journal"},{"key":"10.1016\/j.infsof.2024.107564_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2022.107091","article-title":"COSMOS: A comprehensive framework for automatically generating domain-oriented test suite","volume":"154","author":"Kalaee","year":"2023","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2024.107564_bib0009","series-title":"Proceedings of the ACM on Programming Languages","first-page":"474","article-title":"Enhancing Static Analysis for Practical Bug Detection: An LLM-Integrated Approach","author":"Li","year":"2024"},{"key":"10.1016\/j.infsof.2024.107564_bib0010","series-title":"The fifth international conference on the applications of digital information and web technologies (ICADIWT 2014)","first-page":"232","article-title":"February. DBSCAN: Past, present and future","author":"Khan","year":"2014"},{"key":"10.1016\/j.infsof.2024.107564_bib0011","series-title":"arXiv preprint","author":"De Souza","year":"2016"},{"issue":"2","key":"10.1016\/j.infsof.2024.107564_bib0012","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1002\/stvr.294","article-title":"Search-based software test data generation: a survey","volume":"14","author":"McMinn","year":"2004","journal-title":"Software testing, Verification and reliability"},{"key":"10.1016\/j.infsof.2024.107564_bib0013","series-title":"Genetic algorithms","first-page":"15","author":"Sivanandam","year":"2008"},{"key":"10.1016\/j.infsof.2024.107564_bib0014","doi-asserted-by":"crossref","unstructured":"N. Tracey, J. Clark, K., Mander, and J. McDermid. \"An automated framework for structural test-data generation.\" Proceeding 13th IEEE International Conference on Automated Software Engineering, Hawaii, HI, USA, pp. 285\u2013288, 1998.","DOI":"10.1109\/ASE.1998.732680"},{"issue":"1","key":"10.1016\/j.infsof.2024.107564_bib0015","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1609\/socs.v1i1.18182","article-title":"A comparison of greedy search algorithms","volume":"1","author":"Wilt","year":"2010","journal-title":"Proceedings of the International Symposium on Combinatorial Search"},{"key":"10.1016\/j.infsof.2024.107564_bib0016","series-title":"Handbook of Heuristics","first-page":"1","article-title":"Memetic algorithms","author":"Cotta","year":"2017"},{"key":"10.1016\/j.infsof.2024.107564_bib0017","first-page":"275","article-title":"Mutation testing advances: an analysis and survey","volume":"112","author":"Papadakis","year":"2019"},{"key":"10.1016\/j.infsof.2024.107564_bib0018","unstructured":"Software considerations in airborne systems and equipment certification. Washington, RTCA, Inc., December 1992."},{"key":"10.1016\/j.infsof.2024.107564_bib0019","doi-asserted-by":"crossref","unstructured":"King, K.N., Offutt, J., 1991. A Fortran language system for mutation-based software.","DOI":"10.1002\/spe.4380210704"},{"key":"10.1016\/j.infsof.2024.107564_bib0020","series-title":"Proceedings of the 24th international conference on Software engineering","first-page":"467","article-title":"Visualization of test information to assist fault localization","author":"Jones","year":"2002"},{"key":"10.1016\/j.infsof.2024.107564_bib0021","series-title":"Testing: Academic and industrial conference practice and research techniques-MUTATION","first-page":"89","article-title":"On the accuracy of spectrum-based fault localization","author":"Abreu","year":"2007"},{"key":"10.1016\/j.infsof.2024.107564_bib0022","series-title":"Proceedings International Conference on Dependable Systems and Networks","first-page":"595","article-title":"Pinpoint: Problem determination in large, dynamic internet services","author":"Chen","year":"2002"},{"key":"10.1016\/j.infsof.2024.107564_bib0023","series-title":"Proceedings of the 22nd International Conference on Software Engineering","article-title":"A theoretical and empirical analysis of evolutionary testing and hill climbing for structural test data generation","author":"Harman","year":"2010"},{"key":"10.1016\/j.infsof.2024.107564_bib0024","article-title":"On evolution, search, optimization, genetic algorithms and martial arts: Towards memetic algorithms. Caltech Concurrent Computation Program","volume":"826","author":"Moscato","year":"1989","journal-title":"C3P Report"},{"key":"10.1016\/j.infsof.2024.107564_bib0025","series-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)","first-page":"328","article-title":"A practical schema theorem for genetic algorithm design and tuning","author":"Goldberg","year":"2001"},{"issue":"2","key":"10.1016\/j.infsof.2024.107564_bib0026","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","article-title":"A fast and elitist multiobjective genetic algorithm: NSGA-II","volume":"6","author":"Deb","year":"2002","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"3","key":"10.1016\/j.infsof.2024.107564_bib0027","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1162\/evco.1994.2.3.221","article-title":"Multiobjective optimization using nondominated sorting in genetic algorithms","volume":"2","author":"Srinivas","year":"1994","journal-title":"Evol. Comput."},{"key":"10.1016\/j.infsof.2024.107564_bib0028","series-title":"Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"139","article-title":"Boundary coverage criteria for test generation from formal models","author":"Kosmatov","year":"2004"},{"key":"10.1016\/j.infsof.2024.107564_bib0029","series-title":"Proceedings of the 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","first-page":"346","article-title":"Boundary value exploration for software analysis","author":"Dobslaw","year":"2020"},{"key":"10.1016\/j.infsof.2024.107564_bib0030","series-title":"Proceedings of the 2nd Workshop on Testing for Deep Learning and Deep Learning for Testing (DeepTest)","article-title":"OffSide: Learning to Identify Mistakes in Boundary Conditions","author":"Briem","year":"2020"},{"issue":"5","key":"10.1016\/j.infsof.2024.107564_bib0031","doi-asserted-by":"crossref","first-page":"8091","DOI":"10.1007\/s11042-020-10139-6","article-title":"A review on genetic algorithm: past, present, and future","volume":"80","author":"Katoch","year":"2021","journal-title":"Multimed. Tools. Appl."},{"key":"10.1016\/j.infsof.2024.107564_bib0032","series-title":"International conference on intelligent data communication technologies and Internet of things (ICICI) 2018","first-page":"758","article-title":"A review on random forest: An ensemble classifier","author":"Parmar","year":"2019"},{"key":"10.1016\/j.infsof.2024.107564_bib0033","series-title":"ESANN","first-page":"441","article-title":"The'K'in K-fold Cross Validation","author":"Anguita","year":"2012"},{"key":"10.1016\/j.infsof.2024.107564_bib0034","unstructured":"MutMut, \"Mutmut 1.9.0: Python mutation tester,\" 2024. [Online]. Available: https:\/\/mutmut.readthedocs.io\/en\/latest\/. [Accessed: 13- September- 2023]."},{"key":"10.1016\/j.infsof.2024.107564_bib0035","unstructured":"Software-artifact Infrastructure Repository. (2023) 'Tcas', available at: https:\/\/sir.csc.ncsu.edu\/portal\/bios\/tcas.php (Accessed: 26 October 2023)."},{"key":"10.1016\/j.infsof.2024.107564_bib0036","first-page":"177","article-title":"Modelling of design decisions for CAD. Computer Aided Design Modelling, Systems Engineering, CAD-Systems","author":"Nowacki","year":"2005","journal-title":"CREST Advanced Course Darmstadt"},{"issue":"1","key":"10.1016\/j.infsof.2024.107564_bib0037","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s00521-013-1474-z","article-title":"Harmony search-based test data generation for branch coverage in software structural testing","volume":"25","author":"Mao","year":"2014","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.infsof.2024.107564_bib0038","series-title":"Proceedings of the 14th International Symposium on Software Reliability Engineering","first-page":"99","article-title":"Coverage criteria for logical expressions","author":"Ammann","year":"2003"},{"key":"10.1016\/j.infsof.2024.107564_bib0039","series-title":"Hyperparameter Optimization: Comparing Genetic Algorithm against Grid Search and Bayesian Optimization","author":"Alibrahim","year":"2021"},{"issue":"3","key":"10.1016\/j.infsof.2024.107564_bib0040","doi-asserted-by":"crossref","first-page":"1186","DOI":"10.3390\/app12031186","article-title":"Simple Deterministic Selection-Based Genetic Algorithm for Hyperparameter Tuning of Machine Learning Models","volume":"12","author":"Raji","year":"2022","journal-title":"Applied Sciences"},{"key":"10.1016\/j.infsof.2024.107564_bib0041","series-title":"Hyperparameter Tuning in Machine Learning Models","author":"Ludwig","year":"2021"},{"key":"10.1016\/j.infsof.2024.107564_bib0042","series-title":"Thinking Data Science","first-page":"209","article-title":"DBSCAN: Density-Based Spatial Clustering of Applications with Noise","author":"Sarang","year":"2023"},{"key":"10.1016\/j.infsof.2024.107564_bib0043","series-title":"Applied Statistical Learning","first-page":"183","article-title":"Random Forest Algorithm: Parameters and Performance","author":"Schonlau","year":"2023"},{"key":"10.1016\/j.infsof.2024.107564_bib0044","series-title":"Elementary statistics for the social sciences: Study guide","author":"Capon","year":"1991"},{"issue":"2","key":"10.1016\/j.infsof.2024.107564_bib0045","first-page":"101","article-title":"A critique and improvement of the cl common language effect size statistics of McGraw and Wong","volume":"25","author":"Vargha","year":"2000","journal-title":"Journal of Educational and Behavioral Statistics"},{"issue":"8","key":"10.1016\/j.infsof.2024.107564_bib0046","doi-asserted-by":"crossref","first-page":"2112","DOI":"10.4304\/jsw.9.8.2112-2119","article-title":"Effective fault localization using weighted test cases","volume":"9","author":"Li","year":"2014","journal-title":"J. Softw."},{"issue":"3","key":"10.1016\/j.infsof.2024.107564_bib0047","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1002\/stvr.1486","article-title":"A hitchhiker's guide to statistical tests for assessing randomized algorithms in software engineering","volume":"24","author":"Arcuri","year":"2014","journal-title":"Software Testing, Verification and Reliability"},{"key":"10.1016\/j.infsof.2024.107564_bib0048","series-title":"2010 IEEE International Conference on Software Maintenance","first-page":"1","article-title":"Guided test generation for coverage criteria","author":"Pandita","year":"2010"},{"key":"10.1016\/j.infsof.2024.107564_bib0049","series-title":"2014 Eighth International Conference on Software Security and Reliability (SERE)","first-page":"118","article-title":"Automatic test data generation for unit testing to achieve MC\/DC criterion","author":"Wu","year":"2014"},{"issue":"5","key":"10.1016\/j.infsof.2024.107564_bib0050","first-page":"e2336","article-title":"A new disjunctive literal insertion fault detection strategy in boolean specifications","volume":"33","author":"Paul","year":"2021","journal-title":"Journal of Software: Evolution and Process"},{"issue":"10","key":"10.1016\/j.infsof.2024.107564_bib0051","doi-asserted-by":"crossref","first-page":"9757","DOI":"10.1016\/j.jksuci.2021.12.007","article-title":"Boompizer: Minimization and prioritization of concolic based boosted mc\/dc test cases","volume":"34","author":"Barisal","year":"2022","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"5","key":"10.1016\/j.infsof.2024.107564_bib0052","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.jss.2005.05.030","article-title":"A comparison of MC\/DC, MUMCUT and several other coverage criteria for logical decisions","volume":"79","author":"Yu","year":"2006","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.infsof.2024.107564_bib0053","series-title":"Software Engineering Advances, 2009. ICSEA'09. Fourth International Conference on","article-title":"Automatic test data generation for multiple condition and MCDC coverage","author":"Ghani","year":"2009"},{"key":"10.1016\/j.infsof.2024.107564_bib0054","series-title":"Proceedings of the 11th Annual conference on Genetic and evolutionary computation","first-page":"1657","article-title":"Mc\/dc automatic test input data generation","author":"Awedikian","year":"2009"},{"issue":"28","key":"10.1016\/j.infsof.2024.107564_bib0055","first-page":"4","article-title":"Feasible Test Case Generation Using Search Based Technique","volume":"70","author":"Minj","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.infsof.2024.107564_bib0056","series-title":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","first-page":"1301","article-title":"A systematic literature review on modified condition and decision coverage","author":"Paul","year":"2014"},{"issue":"7","key":"10.1016\/j.infsof.2024.107564_bib0057","doi-asserted-by":"crossref","first-page":"e1641","DOI":"10.1002\/stvr.1641","article-title":"Prioritizing MCDC test cases by spectral analysis of Boolean functions","volume":"27","author":"Ayav","year":"2017","journal-title":"Software Testing, Verification and Reliability"},{"key":"10.1016\/j.infsof.2024.107564_bib0058","series-title":"2017 IEEE 28th Annual Software Technology Conference (STC)","first-page":"1","article-title":"Using mc\/dc as a black-box testing technique","author":"Vilkomir","year":"2017"},{"key":"10.1016\/j.infsof.2024.107564_bib0059","series-title":"Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice","first-page":"256","article-title":"Evaluating specification-level mc\/dc criterion in model-based testing of safety critical systems","author":"Arefin","year":"2018"},{"key":"10.1016\/j.infsof.2024.107564_bib0060","series-title":"2015 National Postgraduate Conference","first-page":"1","article-title":"Search Based Test Data Generation Strategy for Safety Critical Software using MC\/DC Criterion","author":"Haque","year":"2015"},{"key":"10.1016\/j.infsof.2024.107564_bib0061","series-title":"faculty of computer systems and software engineering","article-title":"An Experimental Study of Neighbourhood Based Metaheuristic Algorithms for Test Case Generation Satisfying the Modified Condition \/Decision Coverage Criterion","author":"Haque","year":"2018"},{"key":"10.1016\/j.infsof.2024.107564_bib0062","series-title":"Proceedings of the 3rd ACM\/IEEE International Conference on Automation of Software Test","first-page":"148","article-title":"Evaluating system-level test generation for industrial software: A comparison between manual, combinatorial and model-based testing","author":"Zafar","year":"2022"},{"key":"10.1016\/j.infsof.2024.107564_bib0063","series-title":"2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","first-page":"354","article-title":"Test Data Generation for MC\/DC Criterion using Reinforcement Learning","author":"\u010cegi\u0148","year":"2020"},{"key":"10.1016\/j.infsof.2024.107564_bib0064","series-title":"Search-Based Software Engineering: 11th International Symposium, SSBSE 2019","first-page":"105","article-title":"A search-based approach to generate mc\/dc test data for ocl constraints","author":"Sartaj","year":"2019"},{"key":"10.1016\/j.infsof.2024.107564_bib0065","series-title":"Handbook of software fault localization: foundations and advances","author":"Wong","year":"2023"},{"issue":"8","key":"10.1016\/j.infsof.2024.107564_bib0066","doi-asserted-by":"crossref","first-page":"2112","DOI":"10.4304\/jsw.9.8.2112-2119","article-title":"Effective fault localization using weighted test cases","volume":"9","author":"Li","year":"2014","journal-title":"J. Softw."},{"issue":"3","key":"10.1016\/j.infsof.2024.107564_bib0067","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1049\/iet-sen.2017.0026","article-title":"How test suites impact fault localisation starting from the size","volume":"12","author":"Lei","year":"2018","journal-title":"IET Software"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584924001691?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584924001691?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T01:39:55Z","timestamp":1738114795000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584924001691"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":67,"alternative-id":["S0950584924001691"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2024.107564","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing logic-based testing with EvoDomain: A search-based domain-oriented test suite generation approach","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2024.107564","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"107564"}}