D. Richard Kuhn

Orcid: 0000-0003-0050-1596

According to our database1, D. Richard Kuhn authored at least 184 papers between 1989 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2018, "For contributions to access control and combinatorial test methods".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
"Over Spooked".
Computer, December, 2024

AI Failures.
Computer, November, 2024

Assured Autonomy Through Combinatorial Methods.
Computer, May, 2024

Dependable Computing.
Computer, April, 2024

Challenges of Assured Autonomy.
IEEE Trans. Reliab., March, 2024

Assured Autonomy, Artificial Intelligence, and Machine Learning: A Roundtable Discussion.
Computer, March, 2024

Explaining the impact of parameter combinations in agent-based models.
J. Comput. Sci., 2024

On Combinatorial Security Testing for the Tor Anonymity Network Client.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2024, 2024

Assessing the Degree of Feature Interactions that Determine a Model Prediction.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2024, 2024

A Combinatorial Approach to Hyperparameter Optimization.
Proceedings of the IEEE/ACM 3rd International Conference on AI Engineering, 2024

Proxima: A Proxy Model-Based Approach to Influence Analysis.
Proceedings of the IEEE International Conference on Artificial Intelligence Testing, 2024

2023
Emerging Disruptive Technologies.
Computer, December, 2023

Data Block Matrix and Hyperledger Implementation: Extending Distributed Ledger Technology for Privacy Requirements.
Distributed Ledger Technol. Res. Pract., June, 2023

Ordered t-way Combinations for Testing State-based Systems.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2023, 2023

Synthetic Data Generation Using Combinatorial Testing and Variational Autoencoder.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2023, 2023

Summary of Combinatorial methods for testing Internet of Things smart home systems.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2023, 2023

MagicMirror: Towards High-Coverage Fuzzing of Smart Contracts.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

Predicting ABM Results with Covering Arrays and Random Forests.
Proceedings of the Computational Science - ICCS 2023, 2023

SmartExecutor: Coverage-Driven Symbolic Execution Guided by a Function Dependency Graph.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023

2022
Combinatorial Test Generation for Multiple Input Models With Shared Parameters.
IEEE Trans. Software Eng., 2022

Combinatorial methods for testing Internet of Things smart home systems.
Softw. Test. Verification Reliab., 2022

Measuring the Adequacy of a Test Suite With Respect to a Modeled Test Space.
IEEE Softw., 2022

CT-IoT: a combinatorial testing-based path selection framework for effective IoT testing.
Empir. Softw. Eng., 2022

The Path to a Consensus on Artificial Intelligence Assurance.
Computer, 2022

A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences.
Comput. Secur., 2022

An exploration of combinatorial testing-based approaches to fault localization for explainable AI.
Ann. Math. Artif. Intell., 2022

Message from the WAAM 2022 Chairs.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Combinatorial Coverage for Assured Autonomy.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Developing multithreaded techniques and improved constraint handling for the tool CAgen.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

A Combinatorial Approach to Fairness Testing of Machine Learning Models.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022

Enabling AI Adoption through Assurance.
Proceedings of the Thirty-Fifth International Florida Artificial Intelligence Research Society Conference, 2022

DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations.
Proceedings of the IEEE International Conference On Artificial Intelligence Testing, 2022

2021
A New Approach to Data Sharing and Distributed Ledger Technology: A Clinical Trial Use Case.
IEEE Netw., 2021

Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing.
Math. Comput. Sci., 2021

Factorials Experiments, Covering Arrays, and Combinatorial Testing.
Math. Comput. Sci., 2021

Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems.
Computer, 2021

Explainable Artificial Intelligence and Machine Learning.
Computer, 2021

A Trusted Federated System to Share Granular Data Among Disparate Database Resources.
Computer, 2021

Combinatorial Testing Metrics for Machine Learning.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

Combinatorially XSSing Web Application Firewalls.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

A Combinatorial Approach to Testing Deep Neural Network-based Autonomous Driving Systems.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

A Combinatorial Approach to Explaining Image Classifiers.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

Evaluation of T-Way Testing of DNNs in Autonomous Driving Systems.
Proceedings of the 2021 IEEE International Conference on Artificial Intelligence Testing, 2021

2020
A Combinatorial Testing-Based Approach to Fault Localization.
IEEE Trans. Software Eng., 2020

How does combinatorial testing perform in the real world: an empirical study.
Empir. Softw. Eng., 2020

Security or Privacy: Can You Have Both?
Computer, 2020

Cyberthreats in 2025.
Computer, 2020

Narrow Spectrum Software Testing Addressing Complexity and Trust.
Computer, 2020

Input Space Coverage Matters.
Computer, 2020

Aggregating Atomic Clocks for Time-Stamping.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

How do Ordinary Coding Errors Contribute to Security Vulnerabilities?
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Systematic Software Testing of Critical Embedded Digital Devices in Nuclear Power Applications.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

CAGEN: A fast combinatorial test generation tool with support for constraints and higher-index arrays.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Combinatorial Methods for Explainable AI.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

Effectiveness of dataset reduction in testing machine learning algorithms.
Proceedings of the IEEE International Conference On Artificial Intelligence Testing, 2020

2019
Leading-Edge Technologies.
IT Prof., 2019

Rethinking Distributed Ledger Technology.
Computer, 2019

Taking Score on the Success of Blockchain, So Far.
Computer, 2019

Detecting Vulnerabilities in Android Applications using Event Sequences.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Applying Combinatorial Testing to Large-Scale Data Processing at Adobe.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Measuring Combinatorial Coverage at Adobe.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Using Parameter Mapping to Avoid Forbidden Tuples in a Covering Array.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

An Approach to T-Way Test Sequence Generation With Constraints.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

Systematic testing of post-quantum cryptographic implementations using metamorphic testing.
Proceedings of the 4th International Workshop on Metamorphic Testing, 2019

Browser fingerprinting using combinatorial sequence testing.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing.
Proceedings of the Evaluation and Assessment on Software Engineering, 2019

Knowledge Extraction for Cryptographic Algorithm Validation Test Vectors by Means of Combinatorial Coverage Measurement.
Proceedings of the Machine Learning and Knowledge Extraction, 2019

2018
Finding Bugs in Cryptographic Hash Function Implementations.
IEEE Trans. Reliab., 2018

Computer Science Education in 2018.
IT Prof., 2018

IoT Metrology.
IT Prof., 2018

Cyberthreats and Security.
IT Prof., 2018

Educating Next-Gen Computer Scientists.
Computer, 2018

Cybertrust in the IoT Age.
Computer, 2018

Can Reducing Faults Prevent Vulnerabilities?
Computer, 2018

Access Control for Emerging Distributed Systems.
Computer, 2018

Testing IoT Systems.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Pseudo-Exhaustive Verification of Rule Based Systems.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Combinatorial security testing course.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC Coverage.
Proceedings of the 5th International Conference on Dependable Systems and Their Applications, 2018

A Method-Level Test Generation Framework for Debugging Big Data Applications.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
It Doesn't Have to Be Like This: Cybersecurity Vulnerability Trends.
IT Prof., 2017

What Happened to Software Metrics?
Computer, 2017

Combinatorial and MC/DC Coverage Levels of Random Testing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Combinatorial Testing of Full Text Search in Web Applications.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Improving MC/DC and Fault Detection Strength Using Combinatorial Testing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

An Analysis of Vulnerability Trends, 2008-2016.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Model for T-Way Fault Profile Evolution during Testing.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Applying Combinatorial Testing to Data Mining Algorithms.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

2016
Using combinatorial testing to build navigation graphs for dynamic web applications.
Softw. Test. Verification Reliab., 2016

Measuring and specifying combinatorial coverage of test input configurations.
Innov. Syst. Softw. Eng., 2016

Learning Internet-of-Things Security "Hands-On".
IEEE Secur. Priv., 2016

Combinatorial Methods in Security Testing.
Computer, 2016

Access Control Policy Verification.
Computer, 2016

TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

The Relationship between Software Bug Type and Number of Factors Involved in Failures.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

General Methods for Access Control Policy Verification (Application Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Pseudo-Exhaustive Testing of Attribute Based Access Control Rules.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

Evaluating the Effectiveness of BEN in Localizing Different Types of Software Fault.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

Estimating t-Way Fault Profile Evolution During Testing.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC).
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2015
IT Security [Guest editors' introduction].
IT Prof., 2015

Attribute-Based Access Control.
Computer, 2015

Introducing Combinatorial Testing in a Large Organization.
Computer, 2015

Combinatorial Testing: Theory and Practice.
Adv. Comput., 2015

Combinatorial Methods in Software Testing.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

Implementing and Managing Policy Rules in Attribute Based Access Control.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Constraint handling in combinatorial test generation using forbidden tuples.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Equivalence class verification and oracle-free testing using two-layer covering arrays.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

BEN: A combinatorial testing-based fault localization tool.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Improving IPOG's vertical growth based on a graph coloring scheme.
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

2014
IT Risks.
IT Prof., 2014

Software Testing.
Computer, 2014

Estimating Fault Detection Effectiveness.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

An Empirical Comparison of Combinatorial and Random Testing.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Combinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

An Access Control scheme for Big Data processing.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

2013
A general conformance testing framework for IEEE 11073 PHD's communication model.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Fault localization based on failure-inducing combinations.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

ACTS: A Combinatorial Test Generation Tool.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Combinatorial Coverage Measurement Concepts and Applications.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Applying Combinatorial Testing to the Siemens Suite.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

An Input Space Modeling Methodology for Combinatorial Testing.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

CCM: A Tool for Measuring Combinatorial Coverage of System State Space.
Proceedings of the 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2013

2012
Protecting Wireless Local Area Networks.
IT Prof., 2012

Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Combinatorial Methods for Event Sequence Testing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Identifying Failure-Inducing Combinations in a Combinatorial Test Set.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Combinatorial Testing of ACTS: A Case Study.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Efficient Algorithms for T-way Test Sequence Generation.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

2011
Managing Security: The Security Content Automation Protocol.
IT Prof., 2011

Vetting Mobile Apps.
IT Prof., 2011

Role Engineering: Methods and Standards.
IT Prof., 2011

Model Checking for Verification of Mandatory Access Control Models and Properties.
Int. J. Softw. Eng. Knowl. Eng., 2011

A Survey of Binary Covering Arrays.
Electron. J. Comb., 2011

Vulnerability Hierarchies in Access Control Configurations.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Practical combinatorial (t-way) methods for detecting complex faults in regression testing.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

Finding Interaction Faults Adaptively Using Distance-Based Strategies.
Proceedings of the 18th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, 2011

A combinatorial approach to detecting buffer overflow vulnerabilities.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Data Loss Prevention.
IT Prof., 2010

Vulnerability Trends: Measuring Progress.
IT Prof., 2010

Introduction: Cybersecurity.
IT Prof., 2010

Adding Attributes to Role-Based Access Control.
Computer, 2010

2009
Understanding Insecure IT: Practical Risk Assessment.
IT Prof., 2009

Surviving Insecure IT: Effective Patch Management.
IT Prof., 2009

Introducing "Insecure IT".
IT Prof., 2009

Practical Interdomain Routing Security.
IT Prof., 2009

Role-Based Access Controls
CoRR, 2009

Combinatorial Software Testing.
Computer, 2009

A combinatorial approach to building navigation graphs for dynamic web applications.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

2008
IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing.
Softw. Test. Verification Reliab., 2008

Practical Combinatorial Testing: Beyond Pairwise.
IT Prof., 2008

Property Verification for Generic Access Control Models.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control".
IEEE Secur. Priv., 2007

IPOG: A General Strategy for T-Way Software Testing.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

2006
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance.
IEEE J. Sel. Areas Commun., 2006

The Computational Complexity of Enforceability Validation for Generic Access Control Rules.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Pseudo-Exhaustive Testing for Software.
Proceedings of the 30th Annual IEEE / NASA Software Engineering Workshop (SEW-30 2006), 2006

2005
A quantum cryptographic protocol with detection of compromised server.
Quantum Inf. Comput., 2005

Challenges in Securing Voice over IP.
IEEE Secur. Priv., 2005

Security Standards for the RFID Market.
IEEE Secur. Priv., 2005

Composing and combining policies under the policy machine.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

2004
Software Fault Interactions and Implications for Software Testing.
IEEE Trans. Software Eng., 2004

2002
Quantum computing and communication.
Adv. Comput., 2002

2001
Proposed NIST standard for role-based access control.
ACM Trans. Inf. Syst. Secur., 2001

Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

2000
The NIST model for role-based access control: towards a unified standard.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

1999
Fault classes and error detection capability of specification-based testing.
ACM Trans. Softw. Eng. Methodol., 1999

A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet.
ACM Trans. Inf. Syst. Secur., 1999

Toward Credible IT Testing and Certification.
IEEE Softw., 1999

Lessons from 342 Medical Device Failures.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

1998
Role Based Access Control on MLS Systems without Kernel Changes.
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998

1997
Sources of Failure in the Public Switched Telephone Network.
Computer, 1997

Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

1995
Future directions in role-based access control.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

1993
Improving Public Switched Network Security in an Open Environment.
Computer, 1993

1992
A Technique for Analyzing the Effects of Changes in Formal Specifications.
Comput. J., 1992

1990
On the Effective Use of Software Standards in Systems Integration.
Proceedings of the First International Conference on Systems Integration, 1990

Formal specification and verification of control software for cryptographic equipment.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Generating extended state transitions from structured specifications for process control systems.
Softw. Eng. J., 1989


  Loading...