{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T23:40:05Z","timestamp":1759016405741,"version":"3.44.0"},"reference-count":86,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1016\/j.jss.2020.110864","type":"journal-article","created":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T12:24:20Z","timestamp":1606998260000},"page":"110864","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["How to kill them all: An exploratory study on the impact of code observability on mutation testing"],"prefix":"10.1016","volume":"173","author":[{"given":"Qianqian","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Andy","family":"Zaidman","sequence":"additional","affiliation":[]},{"given":"Annibale","family":"Panichella","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2017","series-title":"Introduction to Software Testing","author":"Ammann","key":"10.1016\/j.jss.2020.110864_b1"},{"key":"10.1016\/j.jss.2020.110864_b2","series-title":"International Conference on Software Engineering","first-page":"402","article-title":"Is mutation an appropriate tool for testing experiments?","author":"Andrews","year":"2005"},{"year":"2019","series-title":"Antlr","key":"10.1016\/j.jss.2020.110864_b3"},{"year":"2019","series-title":"Apache commons BCEL","key":"10.1016\/j.jss.2020.110864_b4"},{"key":"10.1016\/j.jss.2020.110864_b5","series-title":"Proceedings of the 2006 ACM\/IEEE International Symposium on Empirical Software Engineering","first-page":"8","article-title":"Predicting fault-prone components in a java legacy system","author":"Arisholm","year":"2006"},{"issue":"11","key":"10.1016\/j.jss.2020.110864_b6","doi-asserted-by":"crossref","first-page":"1100","DOI":"10.1109\/TSE.2014.2342227","article-title":"Test code quality and its relation to issue handling performance","volume":"40","author":"Athanasiou","year":"2014","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2020.110864_b7","first-page":"75","article-title":"Bad smells in code","author":"Beck","year":"1999","journal-title":"Refactoring: Improv. Des. Exist. Code"},{"issue":"3","key":"10.1016\/j.jss.2020.110864_b8","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/TSE.2017.2776152","article-title":"Developer testing in the IDE: Patterns, beliefs, and behavior","volume":"45","author":"Beller","year":"2019","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"10.1016\/j.jss.2020.110864_b9","series-title":"Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE)","first-page":"179","article-title":"When, how and why developers (do not) test in their IDEs","author":"Beller","year":"2015"},{"key":"10.1016\/j.jss.2020.110864_b10","series-title":"Proceedings of the International Conference on Software Engineering (ICSE - Volume 2)","first-page":"559","article-title":"How (much) do developers test?","author":"Beller","year":"2015"},{"year":"2006","series-title":"Object Oriented Analysis & Design with Application","author":"Booch","key":"10.1016\/j.jss.2020.110864_b11"},{"issue":"1","key":"10.1016\/j.jss.2020.110864_b12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"year":"2017","series-title":"Classification and Regression Trees","author":"Breiman","key":"10.1016\/j.jss.2020.110864_b13"},{"key":"10.1016\/j.jss.2020.110864_b14","series-title":"Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering","first-page":"511","article-title":"The care and feeding of wild-caught mutants","author":"Brown","year":"2017"},{"issue":"9","key":"10.1016\/j.jss.2020.110864_b15","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1016\/j.jss.2006.02.036","article-title":"An empirical study into class testability","volume":"79","author":"Bruntink","year":"2006","journal-title":"J. Syst. Softw."},{"year":"1979","series-title":"Mutation Analysis","author":"Budd","key":"10.1016\/j.jss.2020.110864_b16"},{"year":"2018","series-title":"Selecting fault revealing mutants","author":"Chekam","key":"10.1016\/j.jss.2020.110864_b17"},{"year":"2019","series-title":"Github repository for PIT","author":"Coles","key":"10.1016\/j.jss.2020.110864_b18"},{"year":"2019","series-title":"Mutation testing - a practitioners perspective","author":"Coles","key":"10.1016\/j.jss.2020.110864_b19"},{"year":"2019","series-title":"PIT Mutation operators","author":"Coles","key":"10.1016\/j.jss.2020.110864_b20"},{"year":"2019","series-title":"PIT Incremental analysis","author":"Coles","key":"10.1016\/j.jss.2020.110864_b21"},{"year":"2019","series-title":"PIT Main page","author":"Coles","key":"10.1016\/j.jss.2020.110864_b22"},{"key":"10.1016\/j.jss.2020.110864_b23","series-title":"Software Engineering, 1989. 11th International Conference on","first-page":"355","article-title":"Test adequacy and program mutation","author":"DeMillo","year":"1989"},{"issue":"8","key":"10.1016\/j.jss.2020.110864_b24","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1109\/32.879815","article-title":"Quantitative analysis of faults and failures in a complex software system","volume":"26","author":"Fenton","year":"2000","journal-title":"IEEE Trans. Softw. Eng."},{"year":"2016","series-title":"The WEKA Workbench. Online Appendix for \u201cData Mining: Practical Machine Learning Tools and Techniques\u201d","author":"Frank","key":"10.1016\/j.jss.2020.110864_b25"},{"issue":"3","key":"10.1016\/j.jss.2020.110864_b26","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/S0164-1212(96)00154-9","article-title":"All-uses vs mutation testing: an experimental comparison of effectiveness","volume":"38","author":"Frankl","year":"1997","journal-title":"J. Syst. Softw."},{"issue":"6","key":"10.1016\/j.jss.2020.110864_b27","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/32.87281","article-title":"Testability of software components","volume":"17","author":"Freedman","year":"1991","journal-title":"IEEE Trans. Softw .Eng."},{"key":"10.1016\/j.jss.2020.110864_b28","series-title":"29th Annual International Computer Software and Applications Conference (COMPSAC\u201905)","first-page":"211","article-title":"A component testability model for verification and measurement","volume":"2","author":"Gao","year":"2005"},{"issue":"12","key":"10.1016\/j.jss.2020.110864_b29","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.1109\/32.106988","article-title":"Cyclomatic complexity density and software maintenance productivity","volume":"17","author":"Gill","year":"1991","journal-title":"IEEE Trans. Softw. Eng."},{"year":"2019","series-title":"Github repository for mull","key":"10.1016\/j.jss.2020.110864_b30"},{"key":"10.1016\/j.jss.2020.110864_b31","series-title":"Software Testing, Verification and Validation (ICST), 2017 IEEE International Conference on","first-page":"47","article-title":"The theory of composite faults","author":"Gopinath","year":"2017"},{"key":"10.1016\/j.jss.2020.110864_b32","series-title":"2009 International Conference on Software Testing, Verification, and Validation Workshops","first-page":"192","article-title":"The impact of equivalent mutants","author":"Gr\u00fcn","year":"2009"},{"issue":"6","key":"10.1016\/j.jss.2020.110864_b33","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/TSE.2011.103","article-title":"A systematic literature review on fault prediction performance in software engineering","volume":"38","author":"Hall","year":"2011","journal-title":"IEEE Trans. Softw. Eng."},{"year":"2011","series-title":"Data Mining: Concepts and Techniques","author":"Han","key":"10.1016\/j.jss.2020.110864_b34"},{"year":"1988","series-title":"Applied Statistics for the Behavioral Sciences","author":"Hinkle","key":"10.1016\/j.jss.2020.110864_b35"},{"key":"10.1016\/j.jss.2020.110864_b36","doi-asserted-by":"crossref","first-page":"11","DOI":"10.2307\/2533093","article-title":"The behavior of the p-value when the alternative hypothesis is true","author":"Hung","year":"1997","journal-title":"Biometrics"},{"key":"10.1016\/j.jss.2020.110864_b37","series-title":"2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)","first-page":"234","article-title":"Interpreting coverage information using direct and indirect coverage","author":"Huo","year":"2016"},{"key":"10.1016\/j.jss.2020.110864_b38","series-title":"Proceedings of the 36th International Conference on Software Engineering","first-page":"435","article-title":"Coverage is not strongly correlated with test suite effectiveness","author":"Inozemtseva","year":"2014"},{"key":"10.1016\/j.jss.2020.110864_b39","first-page":"12","article-title":"Iso 9126\/iso, iec (hrsg.): International standard iso\/iec 9126: Information technology-software product evaluation","author":"ISO","year":"1991","journal-title":"Qual. Charact. Guidel. Use"},{"year":"2019","series-title":"Java-callgraph github repositry","key":"10.1016\/j.jss.2020.110864_b40"},{"year":"2019","series-title":"Jhawk","key":"10.1016\/j.jss.2020.110864_b41"},{"issue":"5","key":"10.1016\/j.jss.2020.110864_b42","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSE.2010.62","article-title":"An analysis and survey of the development of mutation testing","volume":"37","author":"Jia","year":"2011","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2020.110864_b43","series-title":"12th International Symposium on Empirical Software Engineering and Measurement (ESEM\u201918)","article-title":"Are mutants really natural? A study on how naturalness helps mutant selection","author":"Jimenez","year":"2018"},{"key":"10.1016\/j.jss.2020.110864_b44","series-title":"Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering","first-page":"654","article-title":"Are mutants a valid substitute for real faults in software testing?","author":"Just","year":"2014"},{"key":"10.1016\/j.jss.2020.110864_b45","series-title":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"284","article-title":"Inferring mutant utility from program context","author":"Just","year":"2017"},{"key":"10.1016\/j.jss.2020.110864_b46","unstructured":"Kohavi, R., et al., 1995. A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai, Vol. 14, Montreal, Canada, pp. 1137\u20131145."},{"key":"10.1016\/j.jss.2020.110864_b47","series-title":"2006 17th International Symposium on Software Reliability Engineering","first-page":"204","article-title":"Assessing the relationship between software assertions and faults: An empirical investigation","author":"Kudrjavets","year":"2006"},{"key":"10.1016\/j.jss.2020.110864_b48","series-title":"Software Testing, Verification and Validation Workshops (ICSTW), 2014 IEEE Seventh International Conference on","first-page":"176","article-title":"Mutant subsumption graphs","author":"Kurtz","year":"2014"},{"key":"10.1016\/j.jss.2020.110864_b49","series-title":"Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering","first-page":"571","article-title":"Analyzing the validity of selective mutation with dominator mutants","author":"Kurtz","year":"2016"},{"key":"10.1016\/j.jss.2020.110864_b50","series-title":"Software Testing, Verification and Validation Workshops, 2009. ICSTW\u201909. International Conference on","first-page":"220","article-title":"An experimental comparison of four unit test criteria: Mutation, edge-pair, all-uses and prime path coverage","author":"Li","year":"2009"},{"issue":"1","key":"10.1016\/j.jss.2020.110864_b51","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TSE.2013.44","article-title":"Overcoming the equivalent mutant problem: A systematic literature review and a comparative experiment of second order mutation","volume":"40","author":"Madeyski","year":"2014","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/j.jss.2020.110864_b52","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1002\/stvr.4370040104","article-title":"An empirical comparison of data flow and mutation-based test adequacy criteria","volume":"4","author":"Mathur","year":"1994","journal-title":"Softw. Test. Verif. Reliab."},{"year":"2019","series-title":"version 9.6.0 (R2019a)","key":"10.1016\/j.jss.2020.110864_b53"},{"key":"10.1016\/j.jss.2020.110864_b54","series-title":"2013 IEEE Sixth International Conference on Software Testing, Verification and Validation","first-page":"74","article-title":"Efficient javascript mutation testing","author":"Mirshokraie","year":"2013"},{"key":"10.1016\/j.jss.2020.110864_b55","series-title":"Software Evolution","first-page":"173","article-title":"On the interplay between software testing and evolution and its effect on program comprehension","author":"Moonen","year":"2008"},{"issue":"15","key":"10.1016\/j.jss.2020.110864_b56","doi-asserted-by":"crossref","first-page":"979","DOI":"10.1016\/j.infsof.2005.09.003","article-title":"A measurement framework for object-oriented software testability","volume":"47","author":"Mouchawrab","year":"2005","journal-title":"Inf. Softw. Technol."},{"issue":"5","key":"10.1016\/j.jss.2020.110864_b57","first-page":"9","article-title":"Testability estimation framework","volume":"2","author":"Nazir","year":"2010","journal-title":"Int. J. Comput. Appl."},{"issue":"10","key":"10.1016\/j.jss.2020.110864_b58","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1016\/j.infsof.2011.03.007","article-title":"A mutation carol: Past, present and future","volume":"53","author":"Offutt","year":"2011","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2020.110864_b59","series-title":"Mutation Testing for the New Century","first-page":"34","article-title":"Mutation 2000: Uniting the orthogonal","author":"Offutt","year":"2001"},{"key":"10.1016\/j.jss.2020.110864_b60","series-title":"Proceedings of the International Symposium on Software Testing and Analysis (ISSTA)","first-page":"130","article-title":"Automatic test case generation: What if test code quality matters?","author":"Palomba","year":"2016"},{"key":"10.1016\/j.jss.2020.110864_b61","series-title":"40th International Conference on Software Engineering, May 27-3 June 2018, Gothenburg, Sweden","article-title":"Are mutation scores correlated with real fault detection? a large scale empirical study on the relationship between mutants and real faults","author":"Papadakis","year":"2018"},{"key":"10.1016\/j.jss.2020.110864_b62","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.jss.2020.110864_b63","unstructured":"Petrovic, G., Ivankovic, M., 2018. State of mutation testing at google. In: Proceedings of the International Conference on Software Engineering in Practice (ICSE SEIP)."},{"key":"10.1016\/j.jss.2020.110864_b64","series-title":"2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICST Workshops)","first-page":"47","article-title":"An industrial application of mutation testing: Lessons, challenges, and research directions","author":"Petrovic","year":"2018"},{"year":"1993","series-title":"C4.5: Programs for Machine Learning","author":"Quinlan","key":"10.1016\/j.jss.2020.110864_b65"},{"issue":"7","key":"10.1016\/j.jss.2020.110864_b66","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1002\/stvr.1497","article-title":"Checked coverage: an indicator for oracle quality","volume":"23","author":"Schuler","year":"2013","journal-title":"Softw. Test. Verif. Reliab."},{"year":"2019","series-title":"Scikit-learn randomforestregressor","key":"10.1016\/j.jss.2020.110864_b67"},{"issue":"2","key":"10.1016\/j.jss.2020.110864_b68","doi-asserted-by":"crossref","first-page":"122","DOI":"10.3923\/jse.2010.122.136","article-title":"Predicting testability of eclipse: a case study","volume":"4","author":"Singh","year":"2010","journal-title":"J. Softw. Eng."},{"key":"10.1016\/j.jss.2020.110864_b69","series-title":"Proceedings of the International Conference on Software Maintenance and Evolution (ICSME)","first-page":"12","article-title":"On the relation of test smells to software code quality","author":"Spadini","year":"2018"},{"key":"10.1016\/j.jss.2020.110864_b70","series-title":"Proceedings of the 33rd International Conference on Software Engineering","first-page":"892","article-title":"Better testing through oracle selection (NIER track)","author":"Staats","year":"2011"},{"issue":"4","key":"10.1016\/j.jss.2020.110864_b71","first-page":"3047","article-title":"Object oriented software testability survey at designing and implementation phase","volume":"4","author":"Suri","year":"2015","journal-title":"Int. J. Sci. Res."},{"key":"10.1016\/j.jss.2020.110864_b72","series-title":"Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement","first-page":"477","article-title":"Reducing false alarms in software defect prediction by decision threshold optimization","author":"Tosun","year":"2009"},{"key":"10.1016\/j.jss.2020.110864_b73","first-page":"1","article-title":"A comprehensive study of pseudo-tested methods","author":"Vera-P\u00e9rez","year":"2017","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.jss.2020.110864_b74","series-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering","first-page":"39","article-title":"What makes killing a mutant hard","author":"Visser","year":"2016"},{"issue":"8","key":"10.1016\/j.jss.2020.110864_b75","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/32.153381","article-title":"Pie: A dynamic failure-based technique","volume":"18","author":"Voas","year":"1992","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2020.110864_b76","series-title":"Software Engineering (ICSE), 2013 35th International Conference on","first-page":"102","article-title":"Observable modified condition\/decision coverage","author":"Whalen","year":"2013"},{"issue":"1\u20133","key":"10.1016\/j.jss.2020.110864_b77","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","article-title":"Principal component analysis","volume":"2","author":"Wold","year":"1987","journal-title":"Chemom. Intell. Lab. Syst."},{"issue":"1","key":"10.1016\/j.jss.2020.110864_b78","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/TSE.1979.226497","article-title":"A measure of control flow complexity in program text","author":"Woodward","year":"1979","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2020.110864_b79","series-title":"Proceedings of the 36th International Conference on Software Engineering","first-page":"919","article-title":"A study of equivalent and stubborn mutation operators using human analysis of equivalence","author":"Yao","year":"2014"},{"key":"10.1016\/j.jss.2020.110864_b80","series-title":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering","first-page":"214","article-title":"Assertions are strongly correlated with test suite effectiveness","author":"Zhang","year":"2015"},{"key":"10.1016\/j.jss.2020.110864_b81","first-page":"1","article-title":"Predictive mutation testing","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2020.110864_b82","series-title":"Proceedings of the 38th International Conference on Software Engineering","first-page":"309","article-title":"Cross-project defect prediction using a connectivity-based unsupervised classifier","author":"Zhang","year":"2016"},{"issue":"12","key":"10.1016\/j.jss.2020.110864_b83","doi-asserted-by":"crossref","first-page":"2800","DOI":"10.1007\/s11432-012-4745-x","article-title":"An in-depth investigation into the relationships between structural metrics and unit testability in object-oriented systems","volume":"55","author":"Zhou","year":"2012","journal-title":"Sci. China Inf. Sci."},{"year":"2019","series-title":"Github repository for mutation observer","author":"Zhu","key":"10.1016\/j.jss.2020.110864_b84"},{"key":"10.1016\/j.jss.2020.110864_b85","series-title":"2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)","first-page":"274","article-title":"An investigation of compression techniques to speed up mutation testing","author":"Zhu","year":"2018"},{"issue":"6","key":"10.1016\/j.jss.2020.110864_b86","doi-asserted-by":"crossref","DOI":"10.1002\/stvr.1675","article-title":"A systematic literature review of how mutation testing supports quality assurance processes","volume":"28","author":"Zhu","year":"2018","journal-title":"Softw. Test. Verif. Reliab."}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0164121220302545?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0164121220302545?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T23:23:48Z","timestamp":1759015428000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121220302545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":86,"alternative-id":["S0164121220302545"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jss.2020.110864","relation":{},"ISSN":["0164-1212"],"issn-type":[{"type":"print","value":"0164-1212"}],"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"How to kill them all: An exploratory study on the impact of code observability on mutation testing","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jss.2020.110864","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 The Authors. Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"110864"}}