{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T07:13:35Z","timestamp":1696662815958},"reference-count":21,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2014,10,5]],"date-time":"2014-10-05T00:00:00Z","timestamp":1412467200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2016,2]]},"abstract":"Summary<\/jats:title>It is generally assumed that using more diverse traffic to test network devices could achieve larger code coverage. However, how to describe the diversity of traffic traces and the relationship between the traffic diversity and code coverage is still an issue. In this paper, the traffic diversity is defined using the number of packets and the size of the subnets involved, and traces having various diversity are used to evaluate the corresponding code coverage for the programs in a network device. Experiment results show that more number of packets or larger size of network segments can generate larger diversity indices and thus larger code coverage. For Snort, as the number of packets increases from 1 to 10,000,000, representative diversity index and the code coverage can increase from 0 to 0.95 on the basis of Simpson's index and from 19.1% to 32.2%, respectively. As the size of network segments increases, representative diversity index and the code coverage can increase from 0.41 to 0.82 and from 28.2% to 32.2%, respectively. Similar results can be obtained in the case of Linux kernel. If the mappings among different diversity indices and the corresponding code coverage can be built beforehand, the quality of the tests can improved. Copyright \u00a9 2014 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.2849","type":"journal-article","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T01:50:58Z","timestamp":1412560258000},"page":"428-440","source":"Crossref","is-referenced-by-count":0,"title":["Traffic diversity and code coverage: a preliminary analysis"],"prefix":"10.1002","volume":"29","author":[{"given":"Ying\u2010Dar","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Computer Science National Chiao Tung University Hsinchu Taiwan"}]},{"given":"Yuan\u2010Cheng","family":"Lai","sequence":"additional","affiliation":[{"name":"Department of Information Management National Taiwan University of Science and Technology Taipei Taiwan"}]},{"given":"Chun\u2010Nan","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Computer Science National Chiao Tung University Hsinchu Taiwan"}]},{"given":"Jui\u2010Tsun","family":"Hung","sequence":"additional","affiliation":[{"name":"Department of Computer Science National Chiao Tung University Hsinchu Taiwan"}]},{"given":"Chun\u2010Pin","family":"Shao","sequence":"additional","affiliation":[{"name":"Department of Computer Science National Chiao Tung University Hsinchu Taiwan"}]}],"member":"311","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1206"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1247"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1262"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5673077"},{"key":"e_1_2_7_6_1","volume-title":"A Different Kind of Country","author":"Dasmann RF","year":"1971"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/163688a0"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/1934933"},{"key":"e_1_2_7_10_1","first-page":"277","article-title":"On some asymptotic properties of maximum likelihood estimates and related Bayes' estimates","author":"Le Cam LM","year":"1953","journal-title":"University of California Publications in Statistics"},{"key":"e_1_2_7_11_1","unstructured":"RenyiA.On the measures of entropy and information inProceedings of Fourth Berkeley Symposium on Mathematics Statistics and Probability Statistical Laboratory of the University of California Berkeley 1961;1:547\u2013561."},{"key":"e_1_2_7_12_1","isbn-type":"print","volume-title":"The Art of Software Testing","author":"Myers GJ","year":"2011","ISBN":"http:\/\/id.crossref.org\/isbn\/0471469122"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/366246.366248"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1327"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1107"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.430"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.021"},{"key":"e_1_2_7_18_1","first-page":"254","article-title":"Automated defect prevention: best practices in software testing","author":"Kolawa A","year":"2007","journal-title":"IEEE Computer Society Press"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.05.003"},{"key":"e_1_2_7_20_1","unstructured":"Gcov. Available:http:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html(accessed April 2013)."},{"key":"e_1_2_7_21_1","unstructured":"RoeschM.SNORT: lightweight intrusion detection for networks Proceedings of the 13th USENIX conference on System administration Seattle Washington USA 1999."},{"key":"e_1_2_7_22_1","unstructured":"Linux Kernel. Available:https:\/\/www.kernel.org(accessed April 2013)"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.2849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.2849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T17:21:12Z","timestamp":1696612872000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.2849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,5]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["10.1002\/dac.2849"],"URL":"https:\/\/doi.org\/10.1002\/dac.2849","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,5]]}}}