IEEE Fellow 2010, "For leadership in the development of trustworthy software, including improved metrics and process optimization".
2024
Global Initiatives on "Safer" and More "Responsible" Artificial Intelligence.
Computer, November, 2024
3D Printing the "Tools" of War.
Computer, November, 2024
Revisiting Software Reliability Modeling and Testing.
Computer, October, 2024
Mockery, Fake Reviews, and Fake Reviewers.
Computer, October, 2024
Computer, September, 2024
Adapting to Generative Artificial Intelligence: Approaches in Higher Education Institutions.
Computer, September, 2024
"Cyberpanics" and Global Disinformation Campaigns.
Computer, August, 2024
Thoughts on Dependability.
Computer, April, 2024
Internet of Things-Flavored Chips.
Computer, April, 2024
Reliability Engineering in a Time of Rapidly Converging Technologies.
IEEE Trans. Reliab., March, 2024
Niceties, Necessities, Antiquities, and Ubiquities.
Computer, January, 2024
Data Centers in Your Backyard?
Computer, January, 2024
2023
"Propagating" Disinformation.
Computer, December, 2023
Emerging Disruptive Technologies.
Computer, December, 2023
Hiding in the Shadows: Do Shadows Still Exist?
Computer, November, 2023
Lower Energy Large Language Models (LLMs).
Computer, October, 2023
Metaverse's Rise and Decline.
Computer, October, 2023
Social Media's Mental Health Quagmire.
Computer, October, 2023
Are We Writing for Bots or Humans?
Computer, September, 2023
"Frameworking" Carbon-Aware Computing Research.
Computer, May, 2023
Nations Play Their Chips.
Computer, April, 2023
Thoughts on Automotive IoT.
Computer, March, 2023
Is It Live, or Is It Deepfake?
Computer, 2023
Machining a Sixth Sense: Intuition.
Computer, 2023
Summary of Combinatorial methods for testing Internet of Things smart home systems.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2023, 2023
2022
Combinatorial methods for testing Internet of Things smart home systems.
Softw. Test. Verification Reliab., 2022
Ransomware as a Business (RaaB).
IT Prof., 2022
Outlook: Forward Thinking for 2022.
Computer, 2022
Carbon "Footprinting" IT.
Computer, 2022
Zero-Trust Artificial Intelligence?
Computer, 2022
Blockchain's Carbon and Environmental Footprints.
Computer, 2022
Algorithms: Society's Invisible Puppeteers.
Computer, 2022
"Smarter" Seeking "Wiser".
Computer, 2022
Revisiting Software Metrology.
Computer, 2022
2021
Scarcity and Global Insecurity: The Semiconductor Shortage.
IT Prof., 2021
Piracy's Impact on "the Silver Screen".
IT Prof., 2021
Confronting Your Digital Accuser.
Computer, 2021
Homework [EIC'S Message].
Computer, 2021
Online Eats "Food Courts".
Computer, 2021
Computing and Socioeconomic Transformations.
Computer, 2021
Major Computing Technologies of the Past 75 Years.
Computer, 2021
Reproducibility, Fabrication, and Falsification.
Computer, 2021
Rearchitecting the Malls: The Shifting U.S. Retail Landscape.
Computer, 2021
2020
Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet?
Computer, 2020
Rethinking Home, Office, School.
Computer, 2020
The "Patching" Mentality.
Computer, 2020
Thoughts on Complexity, Trust, and Truth.
Computer, 2020
Outlooks on Diverse Technologies.
Computer, 2020
Algorithms, Algorithms, Algorithms.
Computer, 2020
Security or Privacy: Can You Have Both?
Computer, 2020
Thoughts on General Data Protection Regulation and Online Human Surveillance.
Computer, 2020
Aggregating Atomic Clocks for Time-Stamping.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020
2019
Innovations Using Blockchain-Part 2.
IT Prof., 2019
Innovations Using Blockchain-Part 1.
IT Prof., 2019
Predictions on Predictions.
Computer, 2019
Rethinking Distributed Ledger Technology.
Computer, 2019
Taking Score on the Success of Blockchain, So Far.
Computer, 2019
Thoughts on Cyberbullying.
Computer, 2019
Trusting Pirated Software.
Computer, 2019
Online Advertising Fraud.
Computer, 2019
2018
Blockchain-Enabled E-Voting.
IEEE Softw., 2018
Stakeholder Identification and Use Case Representation for Internet-of-Things Applications in Healthcare.
IEEE Syst. J., 2018
Building Caring Healthcare Systems in the Internet of Things.
IEEE Syst. J., 2018
Computer Science Education in 2018.
IT Prof., 2018
A Closer Look at IoTs Things.
IT Prof., 2018
Blockchain in Developing Countries.
IT Prof., 2018
How Do You Create an Internet of Things Workforce?
IT Prof., 2018
IoT's Certification Quagmire.
Computer, 2018
Educating Next-Gen Computer Scientists.
Computer, 2018
Cybertrust in the IoT Age.
Computer, 2018
Cyberthreats under the Bed.
Computer, 2018
Hackings Brand-Equity Nexus.
Computer, 2018
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
The Economics of "Fake News".
IT Prof., 2017
Do Crypto-Currencies Fuel Ransomware?
IT Prof., 2017
Trusting the Internet of Things.
IT Prof., 2017
Curriculum Considerations for the Internet of Things.
Computer, 2017
What Happened to Software Metrics?
Computer, 2017
Hacking Power Grids: A Current Problem.
Computer, 2017
DDoS in the IoT: Mirai and Other Botnets.
Computer, 2017
"Alexa, Can I Trust You?".
Computer, 2017
2016
Caring: An Undiscovered "Super -ility" of Smart Healthcare.
IEEE Softw., 2016
Software is Driving Software Engineering?
IEEE Softw., 2016
Cybersecurity or Privacy [Guest editors' introduction].
IT Prof., 2016
Learning Internet-of-Things Security "Hands-On".
IEEE Secur. Priv., 2016
Insights on Formal Methods in Cybersecurity.
Computer, 2016
Demystifying the Internet of Things.
Computer, 2016
What Happened to Formal Methods for Security?
Computer, 2016
Communications and Privacy under Surveillance.
Computer, 2016
Standards for the Internet of Things: A Case Study in Disaster Response.
Computer, 2016
Metamorphic Testing for Cybersecurity.
Computer, 2016
Building Blocks of the Internet of Things.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016
Decoding the Mystery of the Internet of Things.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
So Where Are We? A Guest Opinion Editorial.
IEEE Trans. Reliab., 2015
The Internet of Anything and Sustainability.
IT Prof., 2015
Third-Party Software's Trust Quagmire.
Computer, 2015
Vetting Mobile App Vendors.
Computer, 2015
Securely Making "Things" Right.
Computer, 2015
Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem.
Computer, 2015
2014
NIST: Building a Solid Foundation.
IT Prof., 2014
Big Data, Networked Worlds.
Computer, 2014
Imagineering an Internet of Anything.
Computer, 2014
2013
STEM's Grand Challenge: Reviving Applied Mathematics.
IT Prof., 2013
Beyond the Cloud: Cyberphysical Systems.
IT Prof., 2013
Does Security Trump Reliability?
Computer, 2013
2012
The Mobile Software App Takeover.
IEEE Softw., 2012
Software Testing: What Goes Around Comes Around.
IT Prof., 2012
BYOD: Security and Privacy Considerations.
IT Prof., 2012
Who Owns What? The Social Media Quagmire.
IT Prof., 2012
The Internet of Things: A Reality Check.
IT Prof., 2012
NASA Contributions to IT.
IT Prof., 2012
Building Security into Off-the-Shelf Smartphones.
Computer, 2012
Mobile Application and Device Power Usage Measurements.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
2011
Thoughts on Higher Education and Scientific Research.
IT Prof., 2011
Mobile-App Addiction: Threat to Security?
IT Prof., 2011
Storytelling: From Cave Art to Digital Media.
IT Prof., 2011
The Evolution of Ubiquitously Intelligent Computing.
IT Prof., 2011
Timing Matters: Tackling Intractable Problems.
IT Prof., 2011
Certainty through Uncertainty?
Computer, 2011
2010
Effectively Defining "Shall Not" Requirements.
IT Prof., 2010
Free and Open Source Software.
IT Prof., 2010
Mobile Applications: The Fifth Cycle.
IT Prof., 2010
Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems.
IEEE Secur. Priv., 2010
A Nonlinear Perspective on Higher Education.
Computer, 2010
2009
Cloud Computing: New Wine or Just a New Bottle?
IT Prof., 2009
The Metaphysics of Software Trust.
IT Prof., 2009
Privacy and/or Security: Take Your Pick.
IT Prof., 2009
An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008.
IT Prof., 2009
Trustworthiness in Software Environments.
IT Prof., 2009
Cyberpandemics: History, Inevitability, Response.
IEEE Secur. Priv., 2009
Standards interoperability: Applying software safety assurance standards to the evolution of legacy software.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
2008
Software Product Certification.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations.
IT Prof., 2008
Information Integrity and IT Professionals' Integrity, Intertwined.
IT Prof., 2008
IT as a Profession: Is Competent Creation the Primary Goal?
IT Prof., 2008
Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are?
IT Prof., 2008
What's in a Name? Distinguishing between SaaS and SOA.
IT Prof., 2008
Standards Confusion and Harmonization.
Computer, 2008
Thirteen rules for trust.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
2007
The Services Paradigm: Who Can You Trust?
IT Prof., 2007
A Baker's Dozen: 13 Software Engineering Challenges.
IT Prof., 2007
One in a Baker's Dozen: Debugging Debugging.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
2006
Improving the Predictable Assembly of Service-Oriented Architectures.
IEEE Softw., 2006
Software Certification Services: Encouraging Trust and Reasonable Expectations.
IT Prof., 2006
Software test cases: is one ever enough?
IT Prof., 2006
Reliability and Fault Tolerance in Trust.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
COMPSAC Panel Session on Trustworthy Computing.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
2005
The Role of Policy in Balancing Outsourcing and Homeland Security.
IT Prof., 2005
2004
Software's Secret Sauce: The "-ilities".
IEEE Softw., 2004
Software Engineering's Role in Business.
IEEE Softw., 2004
Persistent Software Attributes.
IEEE Softw., 2004
Software Quality from a Behavioral Perspective.
IT Prof., 2004
Programming with Assertions: A Prospectus.
IT Prof., 2004
A Uniform Meta-Model for Mediating Formal Electronic Conferences.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2003
Trusted Software's Holy Grail.
Softw. Qual. J., 2003
Guest Editor's Introduction: Assuring Software Quality Assurance.
IEEE Softw., 2003
Adaptive Software Quality.
Proceedings of the ICEIS 2003, 2003
Challenges and Recent Advances in Developing Trustworthy Software-Based Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
2001
Guest Editor's Introduction: Software Fault Tolerance-Making Software Behave.
IEEE Softw., 2001
Composing Software Component "ilities".
IEEE Softw., 2001
Quality Time - Faster, Better, and Cheaper.
IEEE Softw., 2001
Why testing software under expected operational profiles is not sufficient.
Softw. Focus, 2001
Discovering Unanticipated Software Output Modes.
Ann. Softw. Eng., 2001
Why Is It So Hard to Predict Software System Trustworthiness from Software Component Trustworthiness?.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001
Why Testing under Expected Operational Scenarios is Not Sufficient.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001
Software Dependability in Distributed and Mobile Computing Environments.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001
2000
Malicious IT - Guest Editors' Introduction.
IEEE Softw., 2000
Quality Time - A New Generation of Software Quality Conferences.
IEEE Softw., 2000
Quality Time - Will the Real Operational Profile Please Stand Up?
IEEE Softw., 2000
Quality Time - Can Chaotic Methods Improve Software Quality Predictions?
IEEE Softw., 2000
Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software?
IEEE Softw., 2000
Dependability certification of software components.
J. Syst. Softw., 2000
Toward a More Reliable Theory of Software Reliability.
Computer, 2000
Developing a Usage-Based Software Certification Process.
Computer, 2000
Defective software: An overview of legal remedies and technical measures available to consumers.
Adv. Comput., 2000
Limited Software Warranties.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000
Disposable COTS-Intensive Software Systems (A Position Statement).
Proceedings of the 4th European Conference on Software Maintenance and Reengineering, 2000
1999
Software Quality's Eight Greatest Myths.
IEEE Softw., 1999
Certifying Software for High-Assurance Environments.
IEEE Softw., 1999
Guest Editor's Introduction: Certification-Reducing the Hidden Costs of Poor Quality.
IEEE Softw., 1999
Quality Time - A US Government-Regulated Software Industry.
IEEE Softw., 1999
Quality Time - Does Untested Software Threaten Infrastructures?
IEEE Softw., 1999
Quality Time - Protecting Against What? The Achilles Heel of Information Assurance.
IEEE Softw., 1999
Disposable information systems: the future of software maintenance?
J. Softw. Maintenance Res. Pract., 1999
The Future of Computer Assurance.
Computer, 1999
Inoculating Software for Survivability.
Commun. ACM, 1999
A World Without Risks: Let Me Out!
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999
COTS and High Assurance: An Oxymoron?
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999
User Participation-based Software Certification.
Proceedings of the Validation and Verification of Knowledge Based Systems, 1999
Can Generic Software Be Assured?
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999
1998
Maintaining Component-Based Systems.
IEEE Softw., 1998
COTS Software: The Economical Choice?
IEEE Softw., 1998
Certifying Off-the-Shelf Software Components.
Computer, 1998
The Challenges of Using COTS Software in Component-Based Development (Guest Editor's Introduction).
Computer, 1998
Does software reliability engineering (SRE) offer any benefits to mobile code's security woes?
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998
Maintaining COTS-Based Systems: Is it Possible? (Panel).
Proceedings of the 1998 International Conference on Software Maintenance, 1998
Are COTS Products and Component Packaging Killing Software Malleability?
Proceedings of the 1998 International Conference on Software Maintenance, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Certifying High Assurance Software.
Proceedings of the COMPSAC '98, 1998
1997
Software testability measurement for intelligent assertion placement.
Softw. Qual. J., 1997
Predicting How Badly "Good" Software Can Behave.
IEEE Softw., 1997
Quality Time: Can Clean Pipes Produce Dirty Water?
IEEE Softw., 1997
Quality Time: How Assertions Can Increase Test Effectiveness.
IEEE Softw., 1997
A 'Crystal Ball' for Software Liability.
Computer, 1997
Fault Injection for the Masses.
Computer, 1997
The Ability of Directed Tests to Predict Software Quality.
Ann. Softw. Eng., 1997
Panel: Qualifying The Reliability Of COTS Software Components.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997
Reducing uncertainty about common-mode failures.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997
Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997
1996
Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them?
Proceedings of the 15th International Conference on Computer Safety, 1996
Investigating rare-event failure tolerance: reductions in future uncertainty.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996
The Avalanche Paradigm: An Experimental Software Programming Technique for Improving Fault-tolerance.
Proceedings of the IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), 1996
1995
Software Testability: The New Verification.
IEEE Softw., 1995
Software Testability: An Experiment in Measuring Simulation Reusability.
Proceedings of the ACM SIGSOFT Symposium on Software Reusability, 1995
An Automated Code-Based Fault-Tree Mitigation Technique.
Proceedings of the 14th International Conference on Computer Safety, 1995
Predicting software's minimum-time-to-hazard and mean-time-to-hazard for rare input events.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995
Detecting program modules with low testability.
Proceedings of the International Conference on Software Maintenance, 1995
Software Testability Measurement for Assertion Placement and Fault Localization.
Proceedings of the Second International Workshop on Automated Debugging, 1995
1994
Views on Software Testability (Panel Abstract).
Proceedings of the 1994 International Symposium on Software Testing and Analysis, 1994
Putting assertions in their place.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994
1993
Semantic metrics for software testability.
J. Syst. Softw., 1993
Designing programs that are less likely to hide faults.
J. Syst. Softw., 1993
A framework for defining semantic metrics.
J. Syst. Softw., 1993
A model for detecting the existence of software corruption in real time.
Comput. Secur., 1993
Confidently Assessing a Zero Probability of Software Failure.
Proceedings of the 12th International Conference on Computer Safety, 1993
Faults on Its Sleeve: Amplifying Software Reliability Testing.
Proceedings of the 1993 International Symposium on Software Testing and Analysis, 1993
A software analysis technique for quantifying reliability in high-risk medical devices.
Proceedings of the Sixth Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'93), 1993
1992
PIE: A Dynamic Failure-Based Technique.
IEEE Trans. Software Eng., 1992
Estimating the Probability of Failure When Testing Reveals No Failures.
IEEE Trans. Software Eng., 1992
The Revealing Power of a Test Case.
Softw. Test. Verification Reliab., 1992
Improving the software development process using testability research.
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992
1991
Predicting Where Faults Can Hide from Testing.
IEEE Softw., 1991
On the inadequacies of data state space sampling as a measure of the trustworthiness of programs.
ACM SIGSOFT Softw. Eng. Notes, 1991
A Dynamic Failure Model for Predicting the Impact that a Program Location has on the Program.
Proceedings of the ESEC '91, 1991