117 results on '"Kuhn, D."'
Search Results
2. MagicMirror: Towards High-Coverage Fuzzing of Smart Contracts
3. Synthetic Data Generation Using Combinatorial Testing and Variational Autoencoder
4. A Distributed Ledger Technology Design using Hyperledger Fabric and a Clinical Trial Use Case
5. DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations
6. A Combinatorial Approach to Fairness Testing of Machine Learning Models
7. Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions
8. Evaluation of T-Way Testing of DNNs in Autonomous Driving Systems
9. Combinatorial Testing Metrics for Machine Learning
10. Combinatorially XSSing Web Application Firewalls
11. A Combinatorial Approach to Explaining Image Classifiers
12. The Path to a Consensus on Artificial Intelligence Assurance.
13. Combinatorial Methods for Explainable AI
14. How do Ordinary Coding Errors Contribute to Security Vulnerabilities?
15. Detecting Vulnerabilities in Android Applications using Event Sequences
16. Systematic Testing of Post-Quantum Cryptographic Implementations Using Metamorphic Testing
17. An Approach to T-Way Test Sequence Generation With Constraints
18. Using Parameter Mapping to Avoid Forbidden Tuples in a Covering Array
19. A Method-Level Test Generation Framework for Debugging Big Data Applications
20. Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems.
21. MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC Coverage
22. Combinatorial and MC/DC Coverage Levels of Random Testing
23. Improving MC/DC and Fault Detection Strength Using Combinatorial Testing
24. Combinatorial Testing of Full Text Search in Web Applications
25. An Analysis of Vulnerability Trends, 2008-2016
26. A Model for T-Way Fault Profile Evolution during Testing
27. Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring
28. Applying Combinatorial Testing to Data Mining Algorithms
29. The Relationship between Software Bug Type and Number of Factors Involved in Failures
30. General Methods for Access Control Policy Verification (Application Paper)
31. Estimating t-Way Fault Profile Evolution During Testing
32. Pseudo-Exhaustive Testing of Attribute Based Access Control Rules
33. Evaluating the Effectiveness of BEN in Localizing Different Types of Software Fault
34. Access Control for Emerging Distributed Systems.
35. Finding Bugs in Cryptographic Hash Function Implementations.
36. Implementing and Managing Policy Rules in Attribute Based Access Control
37. Constraint handling in combinatorial test generation using forbidden tuples
38. BEN: A combinatorial testing-based fault localization tool
39. Equivalence class verification and oracle-free testing using two-layer covering arrays
40. Improving IPOG's vertical growth based on a graph coloring scheme
41. Combinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples
42. Implementing and Managing Policy Rules in Attribute Based Access Control.
43. CCM: A Tool for Measuring Combinatorial Coverage of System State Space
44. An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation
45. ACTS: A Combinatorial Test Generation Tool
46. Combinatorial Coverage Measurement Concepts and Applications
47. Applying Combinatorial Testing to the Siemens Suite
48. An Access Control scheme for Big Data processing.
49. Efficient Algorithms for T-way Test Sequence Generation
50. Combinatorial Methods for Event Sequence Testing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.