Design of Mutant Operators for the C Programming Language, 1989. ,
Model-based Mutation Testing with Timed Automata, pp.1-21, 2013. ,
A subset of precise UML for model-based testing, Proceedings of the 3rd international workshop on Advances in model-based testing , A-MOST '07, pp.95-104, 2007. ,
DOI : 10.1145/1291535.1291545
URL : https://hal.archives-ouvertes.fr/hal-00563283
Data Flow Coverage for Circus-Based Testing, In: Fund. App. to Soft. Eng., FASE. LNCS, vol.8411, pp.415-429, 2014. ,
DOI : 10.1007/978-3-642-54804-8_29
URL : https://hal.archives-ouvertes.fr/hal-01126796
Using Model Checking to Generate Fault Detecting Tests, Tests and Proofs, pp.189-206, 2007. ,
DOI : 10.1007/978-3-540-73770-4_11
An Analysis and Survey of the Development of Mutation Testing, IEEE Transactions on Software Engineering, vol.37, issue.5, pp.649-678, 2011. ,
DOI : 10.1109/TSE.2010.62
TestEra: Specification-Based Testing of Java Programs Using SAT, Automated Software Engineering, vol.11, issue.4, pp.403-434, 2004. ,
DOI : 10.1023/B:AUSE.0000038938.10589.b9
The Rigorous Generation of Java Mutation Operators Using HAZOP, 1999. ,
ProB: an automated analysis toolset for the B method, International Journal on Software Tools for Technology Transfer, vol.49, issue.3, pp.185-203, 2008. ,
DOI : 10.1007/s10009-007-0063-9
T-UPPAAL: Online model-based testing of real-time systems. In: 19 th Aut, Soft. Eng, pp.396-397, 2004. ,
Automatic Testing from Formal Specifications, Tests and Proofs, pp.95-113, 2007. ,
DOI : 10.1007/978-3-540-73770-4_6
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing, In: Integrated Formal Methods LNCS, vol.7940, pp.223-237, 2013. ,
DOI : 10.1007/978-3-642-38613-8_16
URL : https://hal.archives-ouvertes.fr/hal-00981816
A systematic review of state-based test tools, International Journal on Software Tools for Technology Transfer, vol.45, issue.3, pp.59-76, 2015. ,
DOI : 10.1007/s10009-013-0291-0
Practical Model Based Testing: A Tools Approach, 2007. ,
A taxonomy of model-based testing approaches, Software Testing, Verification and Reliability, vol.30, issue.4, pp.297-312, 2012. ,
DOI : 10.1002/stvr.456
URL : https://hal.archives-ouvertes.fr/hal-00940611