default search action
D. Richard Kuhn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j86]D. Richard Kuhn, M. S. Raunak, Raghu N. Kacker:
Measuring and Visualizing Dataset Coverage for Machine Learning. Computer 58(4): 18-26 (2025) - [j85]Qiping Wei
, Fadul Sikder
, Huadong Feng
, Yu Lei
, Raghu Kacker
, D. Richard Kuhn
:
SmartExecutor: Coverage-Driven Symbolic Execution Guided via State Prioritization and Function Selection. Distributed Ledger Technol. Res. Pract. 4(1): 4:1-4:29 (2025) - [c104]Megan M. Olsen, M. S. Raunak, D. Richard Kuhn, Hans Van Lierop, Fenrir Badorf, Francis Durso:
A Combinatorial Approach to Reduce Machine Learning Dataset Size. ICSTW 2025: 248-257 - [c103]Erin Lanus, Brian Lee, Jaganmohan Chandrasekaran, Laura J. Freeman, M. S. Raunak, Raghu N. Kacker, D. Richard Kuhn:
Data Frequency Coverage Impact on AI Performance. ICSTW 2025: 258-267 - [c102]Arjun Dahal, Sunny Shree, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Fairness Testing of Machine Learning Models using Combinatorial Testing in Latent Space. ICSTW 2025: 268-277 - [c101]Klaus Kieseberg, Konstantin Gerner, Bernhard Garn, Wolfgang Czerni, Dimitris E. Simos, D. Richard Kuhn, Raghu Kacker:
Combinatorial Methods for Enhancing the Resilience of Production Facilities. ICSTW 2025: 310-313 - 2024
- [j84]Phil Laplante
, Joanna F. DeFranco
, Rick Kuhn
:
Assured Autonomy, Artificial Intelligence, and Machine Learning: A Roundtable Discussion. Computer 57(3): 14-21 (2024) - [j83]Joanna F. DeFranco
, Phil Laplante
, Rick Kuhn
, Zhaojun Steven Li
:
Dependable Computing. Computer 57(4): 13-15 (2024) - [j82]D. Richard Kuhn
, M. S. Raunak
, Raghu N. Kacker
, Jaganmohan Chandrasekaran
, Erin Lanus
, Tyler Cody
, Laura J. Freeman
:
Assured Autonomy Through Combinatorial Methods. Computer 57(5): 86-90 (2024) - [j81]M. S. Raunak, D. Richard Kuhn
:
AI Failures. Computer 57(11): 14-16 (2024) - [j80]Jeffrey M. Voas
, D. Richard Kuhn
:
"Over Spooked". Computer 57(12): 25-26 (2024) - [j79]Megan M. Olsen
, D. Richard Kuhn, M. S. Raunak:
Explaining the impact of parameter combinations in agent-based models. J. Comput. Sci. 81: 102342 (2024) - [j78]D. Richard Kuhn
:
Challenges of Assured Autonomy. IEEE Trans. Reliab. 73(1): 83-84 (2024) - [c100]Sunny Shree
, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Proxima: A Proxy Model-Based Approach to Influence Analysis. AITest 2024: 64-72 - [c99]Krishna Khadka
, Jaganmohan Chandrasekaran
, Yu Lei
, Raghu N. Kacker
, D. Richard Kuhn
:
A Combinatorial Approach to Hyperparameter Optimization. CAIN 2024: 140-149 - [c98]Krishna Khadka, Sunny Shree
, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Assessing the Degree of Feature Interactions that Determine a Model Prediction. ICSTW 2024: 180-187 - [c97]Dimitris E. Simos, Bernhard Garn, Dominik Schreiber, Manuel Leithner, D. Richard Kuhn, Raghu Kacker:
On Combinatorial Security Testing for the Tor Anonymity Network Client. ICSTW 2024: 207-210 - [c96]Sunny Shree
, Krishna Khadka
, Yu Lei
, Raghu N. Kacker, D. Richard Kuhn:
Constructing Surrogate Models in Machine Learning Using Combinatorial Testing and Active Learning. ASE 2024: 1645-1654 - 2023
- [j77]Irena Bojanova
, Rick Kuhn
, Jeffrey M. Voas
:
Emerging Disruptive Technologies. Computer 56(12): 27-30 (2023) - [j76]Joshua Roberts
, Joanna F. DeFranco
, D. Richard Kuhn
:
Data Block Matrix and Hyperledger Implementation: Extending Distributed Ledger Technology for Privacy Requirements. Distributed Ledger Technol. Res. Pract. 2(2): 1-11 (2023) - [c95]Qiping Wei, Fadul Sikder, Huadong Feng, Yu Lei, Raghu Kacker, D. Richard Kuhn:
SmartExecutor: Coverage-Driven Symbolic Execution Guided by a Function Dependency Graph. BRAINS 2023: 1-8 - [c94]Megan M. Olsen, M. S. Raunak, D. Richard Kuhn:
Predicting ABM Results with Covering Arrays and Random Forests. ICCS (1) 2023: 237-252 - [c93]Huadong Feng, Xiaolei Ren, Qiping Wei, Yu Lei, Raghu Kacker, D. Richard Kuhn, Dimitris E. Simos:
MagicMirror: Towards High-Coverage Fuzzing of Smart Contracts. ICST 2023: 141-152 - [c92]Krishna Khadka, Jaganmohan Chandrasekaran, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Synthetic Data Generation Using Combinatorial Testing and Variational Autoencoder. ICSTW 2023: 228-236 - [c91]D. Richard Kuhn, M. S. Raunak, Raghu N. Kacker:
Ordered t-way Combinations for Testing State-based Systems. ICSTW 2023: 246-254 - [c90]Bernhard Garn, Dominik-Philip Schreiber, Dimitris E. Simos, Rick Kuhn, Jeffrey M. Voas, Raghu Kacker:
Summary of Combinatorial methods for testing Internet of Things smart home systems. ICSTW 2023: 266-267 - 2022
- [j75]Ludwig Kampel
, Dimitris E. Simos, D. Richard Kuhn, Raghu N. Kacker:
An exploration of combinatorial testing-based approaches to fault localization for explainable AI. Ann. Math. Artif. Intell. 90(7-9): 951-964 (2022) - [j74]Bernhard Garn, Stefan Zauner, Dimitris E. Simos, Manuel Leithner, D. Richard Kuhn, Raghu Kacker:
A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences. Comput. Secur. 114: 102575 (2022) - [j73]Laura J. Freeman, Feras A. Batarseh, D. Richard Kuhn, M. S. Raunak, Raghu N. Kacker:
The Path to a Consensus on Artificial Intelligence Assurance. Computer 55(3): 82-86 (2022) - [j72]Linghuan Hu, W. Eric Wong
, D. Richard Kuhn, Raghu N. Kacker, Shuo Li:
CT-IoT: a combinatorial testing-based path selection framework for effective IoT testing. Empir. Softw. Eng. 27(2): 32 (2022) - [j71]Raghu N. Kacker, D. Richard Kuhn, Yu Lei, Dimitris E. Simos:
Measuring the Adequacy of a Test Suite With Respect to a Modeled Test Space. IEEE Softw. 39(5): 62-67 (2022) - [j70]Bernhard Garn, Dominik-Philip Schreiber, Dimitris E. Simos
, Rick Kuhn, Jeffrey M. Voas, Raghu Kacker:
Combinatorial methods for testing Internet of Things smart home systems. Softw. Test. Verification Reliab. 32(2) (2022) - [j69]Chang Rao
, Nan Li
, Yu Lei
, Jin Guo, Yadong Zhang, Raghu N. Kacker
, D. Richard Kuhn
:
Combinatorial Test Generation for Multiple Input Models With Shared Parameters. IEEE Trans. Software Eng. 48(7): 2606-2628 (2022) - [c89]Sunny Shree
, Jaganmohan Chandrasekaran, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations. AITest 2022: 103-110 - [c88]Jaganmohan Chandrasekaran, Feras A. Batarseh, Laura J. Freeman, Raghu Kacker, M. S. Raunak, Rick Kuhn:
Enabling AI Adoption through Assurance. FLAIRS 2022 - [c87]Michael Wagner, Manuel Leithner, Dimitris E. Simos, Rick Kuhn, Raghu Kacker:
Developing multithreaded techniques and improved constraint handling for the tool CAgen. ICST Workshops 2022: 87-93 - [c86]Ankita Ramjibhai Patel, Jaganmohan Chandrasekaran, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
A Combinatorial Approach to Fairness Testing of Machine Learning Models. ICST Workshops 2022: 94-101 - [c85]D. Richard Kuhn, M. S. Raunak, Charles B. Prado, Vinay C. Patil, Raghu N. Kacker:
Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions. ICST Workshops 2022: 110-117 - [c84]Phil Laplante, Ben Amaba, Rick Kuhn:
Message from the WAAM 2022 Chairs. ISSRE Workshops 2022: 1 - [c83]Rick Kuhn, M. S. Raunak, Raghu Kacker:
Combinatorial Coverage for Assured Autonomy. ISSRE Workshops 2022: 357-358 - 2021
- [j68]Alexander Weiss
, Smitha Gautham, Athira Varma Jayakumar, Carl R. Elks
, D. Richard Kuhn
, Raghu N. Kacker, Thomas B. Preußer:
Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems. Computer 54(1): 49-60 (2021) - [j67]Joanna F. DeFranco
, David F. Ferraiolo, Rick Kuhn
, Joshua Roberts:
A Trusted Federated System to Share Granular Data Among Disparate Database Resources. Computer 54(3): 55-62 (2021) - [j66]M. S. Raunak
, Rick Kuhn
:
Explainable Artificial Intelligence and Machine Learning. Computer 54(10): 25-27 (2021) - [j65]Raghu N. Kacker, D. Richard Kuhn, Yu Lei, Dimitris E. Simos:
Factorials Experiments, Covering Arrays, and Combinatorial Testing. Math. Comput. Sci. 15(4): 715-739 (2021) - [j64]Raghu N. Kacker, D. Richard Kuhn, Yu Lei, Dimitris E. Simos:
Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing. Math. Comput. Sci. 15(4): 741 (2021) - [j63]David F. Ferraiolo, Joanna F. DeFranco, D. Richard Kuhn, Joshua Roberts:
A New Approach to Data Sharing and Distributed Ledger Technology: A Clinical Trial Use Case. IEEE Netw. 35(1): 4-5 (2021) - [c82]Jaganmohan Chandrasekaran, Ankita Ramjibhai Patel, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Evaluation of T-Way Testing of DNNs in Autonomous Driving Systems. AITest 2021: 17-18 - [c81]Jaganmohan Chandrasekaran, Yu Lei, Raghu Kacker, D. Richard Kuhn:
A Combinatorial Approach to Explaining Image Classifiers. ICST Workshops 2021: 35-43 - [c80]Jaganmohan Chandrasekaran, Yu Lei, Raghu Kacker, D. Richard Kuhn:
A Combinatorial Approach to Testing Deep Neural Network-based Autonomous Driving Systems. ICST Workshops 2021: 57-66 - [c79]Erin Lanus, Laura J. Freeman, D. Richard Kuhn, Raghu N. Kacker:
Combinatorial Testing Metrics for Machine Learning. ICST Workshops 2021: 81-84 - [c78]Bernhard Garn, Daniel Sebastian Lang, Manuel Leithner
, D. Richard Kuhn, Raghu Kacker, Dimitris E. Simos:
Combinatorially XSSing Web Application Firewalls. ICST Workshops 2021: 85-94 - [i4]Alexander Weiss, Smitha Gautham, Athira Varma Jayakumar, Carl R. Elks, D. Richard Kuhn, Raghu N. Kacker, Thomas B. Preußer:
Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems. CoRR abs/2102.03420 (2021) - 2020
- [j62]Rick Kuhn
, Raghu N. Kacker, Yu Lei, Dimitris E. Simos:
Input Space Coverage Matters. Computer 53(1): 37-44 (2020) - [j61]Rick Kuhn, M. S. Raunak:
Narrow Spectrum Software Testing Addressing Complexity and Trust. Computer 53(4): 15-18 (2020) - [j60]James Bret Michael, D. Richard Kuhn
, Jeffrey M. Voas:
Cyberthreats in 2025. Computer 53(6): 16-27 (2020) - [j59]James Bret Michael
, D. Richard Kuhn, Jeffrey M. Voas:
Security or Privacy: Can You Have Both? Computer 53(9): 20-30 (2020) - [j58]Linghuan Hu, W. Eric Wong
, D. Richard Kuhn, Raghu N. Kacker:
How does combinatorial testing perform in the real world: an empirical study. Empir. Softw. Eng. 25(4): 2661-2693 (2020) - [j57]Laleh Shikh Gholamhossein Ghandehari
, Yu Lei
, Raghu Kacker, D. Richard Kuhn
, Tao Xie, David Chenho Kung:
A Combinatorial Testing-Based Approach to Fault Localization. IEEE Trans. Software Eng. 46(6): 616-645 (2020) - [c77]Jaganmohan Chandrasekaran, Huadong Feng, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Effectiveness of dataset reduction in testing machine learning algorithms. AITest 2020: 133-140 - [c76]D. Richard Kuhn, Raghu N. Kacker, Yu Lei, Dimitris E. Simos:
Combinatorial Methods for Explainable AI. ICST Workshops 2020: 167-170 - [c75]Michael Wagner, Kristoffer Kleine, Dimitris E. Simos, Rick Kuhn, Raghu Kacker:
CAGEN: A fast combinatorial test generation tool with support for constraints and higher-index arrays. ICST Workshops 2020: 191-200 - [c74]Athira Varma Jayakumar, Smitha Gautham, D. Richard Kuhn, Brandon J. Simon, Aidan G. Collins, Thomas Dirsch, Raghu Kacker, Carl R. Elks
:
Systematic Software Testing of Critical Embedded Digital Devices in Nuclear Power Applications. ISSRE Workshops 2020: 85-90 - [c73]D. Richard Kuhn:
How do Ordinary Coding Errors Contribute to Security Vulnerabilities? ISSRE Workshops 2020: xl - [c72]Temure Saidkhodjaev, Jeffrey M. Voas, Rick Kuhn, Joanna F. DeFranco, Phillip A. Laplante:
Aggregating Atomic Clocks for Time-Stamping. SOSE 2020: 1-6
2010 – 2019
- 2019
- [j56]Rick Kuhn, Dylan Yaga, Jeffrey M. Voas:
Rethinking Distributed Ledger Technology. Computer 52(2): 68-72 (2019) - [j55]Rick Kuhn
, Jeffrey M. Voas, Phillip A. Laplante:
Taking Score on the Success of Blockchain, So Far. Computer 52(9): 24-34 (2019) - [j54]Rick Kuhn, Samee U. Khan
:
Leading-Edge Technologies. IT Prof. 21(6): 4-5 (2019) - [c71]Dimitris E. Simos, Bernhard Garn, Ludwig Kampel, D. Richard Kuhn, Raghu N. Kacker:
Knowledge Extraction for Cryptographic Algorithm Validation Test Vectors by Means of Combinatorial Coverage Measurement. CD-MAKE 2019: 195-208 - [c70]Bestoun S. Ahmed
, Amador Pahim, Cleber R. Rosa Junior, D. Richard Kuhn, Miroslav Bures:
Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing. EASE 2019: 252-258 - [c69]Bernhard Garn, Dimitris E. Simos, Stefan Zauner, Rick Kuhn, Raghu Kacker:
Browser fingerprinting using combinatorial sequence testing. HotSoS 2019: 7:1-7:9 - [c68]Sydney Pugh
, M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Systematic testing of post-quantum cryptographic implementations using metamorphic testing. MET@ICSE 2019: 2-8 - [c67]Riley Smith, Darryl C. Jarman, Raghu Kacker, D. Richard Kuhn, Dimitris E. Simos, Ludwig Kampel, Manuel Leithner
, Gabe Gosney:
Applying Combinatorial Testing to Large-Scale Data Processing at Adobe. ICST Workshops 2019: 190-193 - [c66]Riley Smith, Darryl C. Jarman, Jared Bellows, D. Richard Kuhn, Raghu Kacker, Dimitris E. Simos:
Measuring Combinatorial Coverage at Adobe. ICST Workshops 2019: 194-197 - [c65]Feng Duan
, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
An Approach to T-Way Test Sequence Generation With Constraints. ICST Workshops 2019: 241-250 - [c64]Chang Rao, Nan Li, Yu Lei, Raghu N. Kacker, D. Richard Kuhn, Jin Guo:
Using Parameter Mapping to Avoid Forbidden Tuples in a Covering Array. ICST Workshops 2019: 251-259 - [c63]Zachary B. Ratliff, D. Richard Kuhn, Daniel J. Ragsdale:
Detecting Vulnerabilities in Android Applications using Event Sequences. QRS 2019: 159-166 - [i3]Bestoun S. Ahmed, Amador Pahim, Cleber R. Rosa Junior, D. Richard Kuhn, Miroslav Bures:
Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing. CoRR abs/1903.05387 (2019) - 2018
- [j53]Jeffrey M. Voas, Rick Kuhn, Celia Paulsen
, Kim Schaffer:
Educating Next-Gen Computer Scientists. Computer 51(1): 80-88 (2018) - [j52]Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou
, Georgios Kambourakis:
Cybertrust in the IoT Age. Computer 51(7): 12-15 (2018) - [j51]Rick Kuhn, M. S. Raunak, Raghu Kacker:
Can Reducing Faults Prevent Vulnerabilities? Computer 51(7): 82-85 (2018) - [j50]Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
Access Control for Emerging Distributed Systems. Computer 51(10): 100-103 (2018) - [j49]Jeffrey M. Voas, Rick Kuhn, Celia Paulsen
, Kim Schaffer:
Computer Science Education in 2018. IT Prof. 20(1): 9-14 (2018) - [j48]Jeffrey M. Voas, Rick Kuhn, Phillip A. Laplante:
IoT Metrology. IT Prof. 20(3): 6-10 (2018) - [j47]J. Morris Chang, Rick Kuhn, Timothy R. Weil:
Cyberthreats and Security. IT Prof. 20(3): 20-22 (2018) - [j46]Nicky Mouha
, M. S. Raunak
, D. Richard Kuhn, Raghu Kacker:
Finding Bugs in Cryptographic Hash Function Implementations. IEEE Trans. Reliab. 67(3): 870-884 (2018) - [c62]Huadong Feng, Jaganmohan Chandrasekaran, Yu Lei, Raghu Kacker, D. Richard Kuhn:
A Method-Level Test Generation Framework for Debugging Big Data Applications. IEEE BigData 2018: 221-230 - [c61]Linghuan Hu, W. Eric Wong, D. Richard Kuhn, Raghu Kacker:
MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC Coverage. DSA 2018: 102-112 - [c60]Dimitris E. Simos, Rick Kuhn, Yu Lei, Raghu Kacker:
Combinatorial security testing course. HotSoS 2018: 10:1-10:3 - [c59]Rick Kuhn, M. S. Raunak, Raghu Kacker:
What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster. HotSoS 2018: 30:1 - [c58]Rick Kuhn, Dylan Yaga, Raghu Kacker, Jeff Yu Lei, Vincent C. Hu:
Pseudo-Exhaustive Verification of Rule Based Systems. SEKE 2018: 586-585 - [c57]Jeffrey M. Voas, Rick Kuhn, Phillip A. Laplante:
Testing IoT Systems. SOSE 2018: 48-52 - [e1]Munindar P. Singh, Laurie A. Williams, Rick Kuhn, Tao Xie:
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018, Raleigh, North Carolina, USA, April 10-11, 2018. ACM 2018 [contents] - 2017
- [j45]Jeffrey M. Voas, Rick Kuhn:
What Happened to Software Metrics? Computer 50(5): 88-98 (2017) - [j44]Rick Kuhn, M. S. Raunak, Raghu Kacker:
It Doesn't Have to Be Like This: Cybersecurity Vulnerability Trends. IT Prof. 19(6): 66-70 (2017) - [c56]D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
A Model for T-Way Fault Profile Evolution during Testing. ICST Workshops 2017: 162-170 - [c55]Feng Duan
, Yu Lei, Linbin Yu, Raghu N. Kacker, D. Richard Kuhn:
Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring. ICST Workshops 2017: 181-188 - [c54]Jaganmohan Chandrasekaran, Huadong Feng, Yu Lei, D. Richard Kuhn, Raghu Kacker:
Applying Combinatorial Testing to Data Mining Algorithms. ICST Workshops 2017: 253-261 - [c53]Sergiy Vilkomir, Aparna Alluri, D. Richard Kuhn, Raghu N. Kacker:
Combinatorial and MC/DC Coverage Levels of Random Testing. QRS Companion 2017: 61-68 - [c52]M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Combinatorial Testing of Full Text Search in Web Applications. QRS Companion 2017: 100-107 - [c51]Dong Li, Linghuan Hu, Ruizhi Gao, W. Eric Wong, D. Richard Kuhn, Raghu N. Kacker:
Improving MC/DC and Fault Detection Strength Using Combinatorial Testing. QRS Companion 2017: 297-303 - [c50]D. Richard Kuhn, M. S. Raunak, Raghu Kacker:
An Analysis of Vulnerability Trends, 2008-2016. QRS Companion 2017: 587-588 - [i2]Nicky Mouha, M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Finding Bugs in Cryptographic Hash Function Implementations. IACR Cryptol. ePrint Arch. 2017: 891 (2017) - 2016
- [j43]Dimitris E. Simos, Rick Kuhn, Artemios G. Voyiatzis, Raghu Kacker:
Combinatorial Methods in Security Testing. Computer 49(10): 80-83 (2016) - [j42]Vincent C. Hu
, Rick Kuhn:
Access Control Policy Verification. Computer 49(12): 80-83 (2016) - [j41]Constantinos Kolias, Angelos Stavrou
, Jeffrey M. Voas, Irena Bojanova, D. Richard Kuhn:
Learning Internet-of-Things Security "Hands-On". IEEE Secur. Priv. 14(1): 37-46 (2016) - [j40]D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Measuring and specifying combinatorial coverage of test input configurations. Innov. Syst. Softw. Eng. 12(4): 249-261 (2016) - [j39]Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacker, D. Richard Kuhn, James Lawrence:
Using combinatorial testing to build navigation graphs for dynamic web applications. Softw. Test. Verification Reliab. 26(4): 318-346 (2016) - [c49]David F. Ferraiolo, Ramaswamy Chandramouli, Rick Kuhn, Vincent C. Hu
:
Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). ABAC@CODASPY 2016: 13-24 - [c48]D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Estimating t-Way Fault Profile Evolution During Testing. COMPSAC Workshops 2016: 596-597 - [c47]Jaganmohan Chandrasekaran, Laleh S. Ghandehari, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Evaluating the Effectiveness of BEN in Localizing Different Types of Software Fault. ICST Workshops 2016: 26-34 - [c46]D. Richard Kuhn, Vincent C. Hu
, David F. Ferraiolo, Raghu N. Kacker, Yu Lei:
Pseudo-Exhaustive Testing of Attribute Based Access Control Rules. ICST Workshops 2016: 51-58 - [c45]Vincent C. Hu
, D. Richard Kuhn:
General Methods for Access Control Policy Verification (Application Paper). IRI 2016: 315-323 - [c44]Zachary B. Ratliff, D. Richard Kuhn, Raghu N. Kacker, Yu Lei, Kishor S. Trivedi:
The Relationship between Software Bug Type and Number of Factors Involved in Failures. ISSRE Workshops 2016: 119-124 - [c43]Dimitris E. Simos, Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, Raghu Kacker:
TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach. QRS 2016: 69-73 - 2015
- [j38]D. Richard Kuhn, Renée C. Bryce, Feng Duan
, Laleh Shikh Gholamhossein Ghandehari, Yu Lei, Raghu N. Kacker:
Combinatorial Testing: Theory and Practice. Adv. Comput. 99: 1-66 (2015) - [j37]Vincent C. Hu
, D. Richard Kuhn, David F. Ferraiolo:
Attribute-Based Access Control. Computer 48(2): 85-88 (2015) - [j36]Jon D. Hagar, Thomas L. Wissink, D. Richard Kuhn, Raghu Kacker:
Introducing Combinatorial Testing in a Large Organization. Computer 48(4): 64-72 (2015) - [j35]J. Morris Chang, Rick Kuhn, Timothy R. Weil:
IT Security [Guest editors' introduction]. IT Prof. 17(1): 14-15 (2015) - [c42]Feng Duan
, Yu Lei, Linbin Yu, Raghu N. Kacker, D. Richard Kuhn:
Improving IPOG's vertical growth based on a graph coloring scheme. ICST Workshops 2015: 1-8 - [c41]Laleh Shikh Gholamhossein Ghandehari, Jaganmohan Chandrasekaran, Yu Lei, Raghu Kacker, D. Richard Kuhn:
BEN: A combinatorial testing-based fault localization tool. ICST Workshops 2015: 1-4 - [c40]D. Richard Kuhn, Raghu N. Kacker, Yu Lei, Jose Torres-Jimenez:
Equivalence class verification and oracle-free testing using two-layer covering arrays. ICST Workshops 2015: 1-4 - [c39]Linbin Yu, Feng Duan
, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Constraint handling in combinatorial test generation using forbidden tuples. ICST Workshops 2015: 1-9 - [c38]Vincent C. Hu
, David F. Ferraiolo, D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Implementing and Managing Policy Rules in Attribute Based Access Control. IRI 2015: 518-525 - [c37]Rick Kuhn:
Combinatorial Methods in Software Testing. SCSE 2015: 9-10 - 2014
- [j34]Renée C. Bryce, Rick Kuhn:
Software Testing. Computer 47(2): 21-22 (2014) - [j33]Linda Wilbanks, Rick Kuhn, Wesley Chou:
IT Risks. IT Prof. 16(1): 20-21 (2014) - [c36]Vincent C. Hu
, Tim Grance, David F. Ferraiolo, D. Richard Kuhn:
An Access Control scheme for Big Data processing. CollaborateCom 2014: 1-7 - [c35]Linbin Yu, Feng Duan
, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Combinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples. HASE 2014: 65-72 - [c34]Laleh S. Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu Kacker, D. Richard Kuhn:
An Empirical Comparison of Combinatorial and Random Testing. ICST Workshops 2014: 68-77 - [c33]Jon D. Hagar, Rick Kuhn, Raghu Kacker, Tom Wissink:
Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report. ICST Workshops 2014: 153 - [c32]Rick Kuhn, Raghu Kacker, Yu Lei:
Estimating Fault Detection Effectiveness. ICST Workshops 2014: 154 - 2013
- [c31]Itzel Dominguez Mendoza, D. Richard Kuhn, Raghu Kacker, Yu Lei:
CCM: A Tool for Measuring Combinatorial Coverage of System State Space. ESEM 2013: 291 - [c30]Linbin Yu, Yu Lei, Mehra Nouroz Borazjany, Raghu Kacker, D. Richard Kuhn:
An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation. ICST 2013: 242-251 - [c29]D. Richard Kuhn, Itzel Dominguez Mendoza, Raghu Kacker, Yu Lei:
Combinatorial Coverage Measurement Concepts and Applications. ICST Workshops 2013: 352-361 - [c28]Laleh Shikh Gholamhossein Ghandehari, Mehra N. Borazjany, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Applying Combinatorial Testing to the Siemens Suite. ICST Workshops 2013: 362-371 - [c27]Linbin Yu, Yu Lei, Raghu Kacker, D. Richard Kuhn:
ACTS: A Combinatorial Test Generation Tool. ICST 2013: 370-375 - [c26]Mehra N. Borazjany, Laleh Shikh Gholamhossein Ghandehari, Yu Lei, Raghu Kacker, Rick Kuhn:
An Input Space Modeling Methodology for Combinatorial Testing. ICST Workshops 2013: 372-381 - [c25]Laleh Shikh Gholamhossein Ghandehari, Yu Lei, David Chenho Kung, Raghu Kacker, D. Richard Kuhn:
Fault localization based on failure-inducing combinations. ISSRE 2013: 168-177 - [c24]Linbin Yu, Yu Lei, Raghu Kacker, D. Richard Kuhn, Ram D. Sriram, Kevin Brady:
A general conformance testing framework for IEEE 11073 PHD's communication model. PETRA 2013: 12:1-12:8 - 2012
- [j32]Shirley Radack, Rick Kuhn:
Protecting Wireless Local Area Networks. IT Prof. 14(6): 59-61 (2012) - [c23]Linbin Yu, Yu Lei, Raghu Kacker, D. Richard Kuhn, James Lawrence:
Efficient Algorithms for T-way Test Sequence Generation. ICECCS 2012: 220-229 - [c22]Laleh Shikh Gholamhossein Ghandehari, Yu Lei, Tao Xie, D. Richard Kuhn, Raghu Kacker:
Identifying Failure-Inducing Combinations in a Combinatorial Test Set. ICST 2012: 370-379 - [c21]Mehra N. Borazjany, Linbin Yu, Yu Lei, Raghu Kacker, Rick Kuhn:
Combinatorial Testing of ACTS: A Case Study. ICST 2012: 591-600 - [c20]D. Richard Kuhn, James M. Higdon, James Lawrence, Raghu Kacker, Yu Lei:
Combinatorial Methods for Event Sequence Testing. ICST 2012: 601-609 - [c19]Kiran Shakya, Tao Xie, Nuo Li, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification. ICST 2012: 620-623 - 2011
- [j31]Jim Lawrence, Raghu Kacker, Yu Lei, D. Richard Kuhn, Michael A. Forbes:
A Survey of Binary Covering Arrays. Electron. J. Comb. 18(1) (2011) - [j30]Vincent C. Hu
, D. Richard Kuhn, Tao Xie, JeeHyun Hwang:
Model Checking for Verification of Mandatory Access Control Models and Properties. Int. J. Softw. Eng. Knowl. Eng. 21(1): 103-127 (2011) - [j29]Shirley Radack, Rick Kuhn:
Managing Security: The Security Content Automation Protocol. IT Prof. 13(1): 9-11 (2011) - [j28]Steve Quirolgico, Jeffrey M. Voas, Rick Kuhn:
Vetting Mobile Apps. IT Prof. 13(4): 9-11 (2011) - [j27]Edward J. Coyne, Timothy R. Weil, Rick Kuhn:
Role Engineering: Methods and Standards. IT Prof. 13(6): 54-57 (2011) - [c18]Wenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner
, Dazhi Zhang, Raghu Kacker, Rick Kuhn:
A combinatorial approach to detecting buffer overflow vulnerabilities. DSN 2011: 269-278 - [c17]Renée C. Bryce, Charles J. Colbourn, D. Richard Kuhn:
Finding Interaction Faults Adaptively Using Distance-Based Strategies. ECBS 2011: 4-13 - [c16]Rick Kuhn, Raghu Kacker:
Practical combinatorial (t-way) methods for detecting complex faults in regression testing. ICSM 2011: 599 - [c15]Rick Kuhn:
Vulnerability Hierarchies in Access Control Configurations. SafeConfig 2011 - 2010
- [j26]D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil:
Adding Attributes to Role-Based Access Control. Computer 43(6): 79-81 (2010) - [j25]Simon Liu, Rick Kuhn:
Data Loss Prevention. IT Prof. 12(2): 10-13 (2010) - [j24]Rick Kuhn:
Introduction: Cybersecurity. IT Prof. 12(4): 18-19 (2010) - [j23]Rick Kuhn, Chris Johnson:
Vulnerability Trends: Measuring Progress. IT Prof. 12(4): 51-53 (2010)
2000 – 2009
- 2009
- [j22]Rick Kuhn, Raghu Kacker, Yu Lei, Justin Hunter:
Combinatorial Software Testing. Computer 42(8): 94-96 (2009) - [j21]Rick Kuhn, Hart Rossman, Simon Liu:
Introducing "Insecure IT". IT Prof. 11(1): 24-26 (2009) - [j20]Simon Liu, Rick Kuhn, Hart Rossman:
Surviving Insecure IT: Effective Patch Management. IT Prof. 11(2): 49-51 (2009) - [j19]Simon Liu, Rick Kuhn, Hart Rossman:
Understanding Insecure IT: Practical Risk Assessment. IT Prof. 11(3): 57-59 (2009) - [j18]Rick Kuhn, Simon Liu, Hart Rossman:
Practical Interdomain Routing Security. IT Prof. 11(6): 54-56 (2009) - [c14]Wenhua Wang, Yu Lei, Sreedevi Sampath, Raghu Kacker, Rick Kuhn, James Lawrence:
A combinatorial approach to building navigation graphs for dynamic web applications. ICSM 2009: 211-220 - [i1]David F. Ferraiolo, D. Richard Kuhn:
Role-Based Access Controls. CoRR abs/0903.2171 (2009) - 2008
- [j17]Rick Kuhn, Yu Lei, Raghu Kacker:
Practical Combinatorial Testing: Beyond Pairwise. IT Prof. 10(3): 19-23 (2008) - [j16]Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun, James Lawrence:
IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing. Softw. Test. Verification Reliab. 18(3): 125-148 (2008) - [c13]Vincent C. Hu
, D. Richard Kuhn, Tao Xie:
Property Verification for Generic Access Control Models. EUC (2) 2008: 243-250 - 2007
- [j15]David F. Ferraiolo, D. Richard Kuhn, Ravi S. Sandhu:
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control". IEEE Secur. Priv. 5(6): 51-53 (2007) - [c12]Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun, James Lawrence:
IPOG: A General Strategy for T-Way Software Testing. ECBS 2007: 549-556 - 2006
- [j14]Kotikalapudi Sriram, Doug Montgomery
, Oliver Borchert, Okhee Kim, D. Richard Kuhn:
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance. IEEE J. Sel. Areas Commun. 24(10): 1901-1915 (2006) - [c11]D. Richard Kuhn, Vadim Okun:
Pseudo-Exhaustive Testing for Software. SEW 2006: 153-158 - [c10]Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
The Computational Complexity of Enforceability Validation for Generic Access Control Rules. SUTC (1) 2006: 260-267 - 2005
- [j13]Thomas J. Walsh, D. Richard Kuhn:
Challenges in Securing Voice over IP. IEEE Secur. Priv. 3(3): 44-49 (2005) - [j12]Ted S. Phillips, Tom Karygiannis, Rick Kuhn:
Security Standards for the RFID Market. IEEE Secur. Priv. 3(6): 85-89 (2005) - [j11]D. Richard Kuhn:
A quantum cryptographic protocol with detection of compromised server. Quantum Inf. Comput. 5(7): 551-560 (2005) - [c9]David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu
, D. Richard Kuhn:
Composing and combining policies under the policy machine. SACMAT 2005: 11-20 - 2004
- [j10]D. Richard Kuhn, Dolores R. Wallace, Albert M. Gallo:
Software Fault Interactions and Implications for Software Testing. IEEE Trans. Software Eng. 30(6): 418-421 (2004) - 2002
- [j9]Paul E. Black, D. Richard Kuhn, Carl J. Williams:
Quantum computing and communication. Adv. Comput. 56: 189-244 (2002) - 2001
- [j8]David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli
:
Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3): 224-274 (2001) - [c8]Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 - 2000
- [c7]Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn:
The NIST model for role-based access control: towards a unified standard. ACM Workshop on Role-Based Access Control 2000: 47-63
1990 – 1999
- 1999
- [j7]Shukri Wakid, D. Richard Kuhn, Dolores R. Wallace:
Toward Credible IT Testing and Certification. IEEE Softw. 16(4): 39-47 (1999) - [j6]David F. Ferraiolo, John F. Barkley, D. Richard Kuhn:
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Trans. Inf. Syst. Secur. 2(1): 34-64 (1999) - [j5]D. Richard Kuhn:
Fault classes and error detection capability of specification-based testing. ACM Trans. Softw. Eng. Methodol. 8(4): 411-424 (1999) - [c6]Dolores R. Wallace, D. Richard Kuhn:
Lessons from 342 Medical Device Failures. HASE 1999: 123-131 - 1998
- [c5]D. Richard Kuhn:
Role Based Access Control on MLS Systems without Kernel Changes. ACM Workshop on Role-Based Access Control 1998: 25-32 - 1997
- [j4]D. Richard Kuhn:
Sources of Failure in the Public Switched Telephone Network. Computer 30(4): 31-36 (1997) - [c4]D. Richard Kuhn:
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. ACM Workshop on Role-Based Access Control 1997: 23-30 - 1995
- [c3]David F. Ferraiolo, D. Richard Kuhn:
Future directions in role-based access control. ACM Workshop on Role-Based Access Control 1995 - 1993
- [j3]D. Richard Kuhn, Patricia Edfors, Victoria Howard, Chuck Caputo, Ted S. Phillips:
Improving Public Switched Network Security in an Open Environment. Computer 26(8): 32-35 (1993) - 1992
- [j2]D. Richard Kuhn:
A Technique for Analyzing the Effects of Changes in Formal Specifications. Comput. J. 35(6): 574-578 (1992) - 1990
- [c2]D. Richard Kuhn, James F. Dray:
Formal specification and verification of control software for cryptographic equipment. ACSAC 1990: 32-43 - [c1]D. Richard Kuhn:
On the Effective Use of Software Standards in Systems Integration. ICSI 1990: 455-461
1980 – 1989
- 1989
- [j1]D. Richard Kuhn:
Generating extended state transitions from structured specifications for process control systems. Softw. Eng. J. 4(5): 283-291 (1989)
Coauthor Index
aka: Laleh S. Ghandehari
aka: Raghu N. Kacker
aka: Jeff Yu Lei
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 00:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint