{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T20:38:33Z","timestamp":1712003913063},"reference-count":142,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Math.Comput.Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11786-021-00502-7","type":"journal-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T04:02:40Z","timestamp":1618200160000},"page":"715-739","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Factorials Experiments, Covering Arrays, and Combinatorial Testing"],"prefix":"10.1007","volume":"15","author":[{"given":"Raghu N.","family":"Kacker","sequence":"first","affiliation":[]},{"given":"D. Richard","family":"Kuhn","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Dimitris E.","family":"Simos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,12]]},"reference":[{"key":"502_CR1","unstructured":"ACM Forum on Risks (Website) (http:\/\/catless.ncl.ac.uk\/Risks\/)"},{"key":"502_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSPEC.2008.4505310","volume":"45","author":"S Adee","year":"2008","unstructured":"Adee, S.: The hunt for the kill switch. IEEE Spectrum 45, 34\u201339 (2008). https:\/\/doi.org\/10.1109\/MSPEC.2008.4505310","journal-title":"IEEE Spectrum"},{"key":"502_CR3","doi-asserted-by":"publisher","unstructured":"Altinger, H., Wotawa, F., Schurius, M.: Testing methods used in the automotive industry: results from a survey. In: Proceedings of the 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing (JAMAICA 2014), San Jose, CA, USA, July 21, 2014, pp. 1-6 (2014). https:\/\/doi.org\/10.1145\/2631890.2631891","DOI":"10.1145\/2631890.2631891"},{"key":"502_CR4","volume-title":"Introduction to Software Testing","author":"P Ammann","year":"2017","unstructured":"Ammann, P., Offutt, J.: Introduction to Software Testing. Cambridge University Press, Cambridge (2017)"},{"key":"502_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2005.23","volume":"3","author":"B Arkin","year":"2005","unstructured":"Arkin, B., Stender, S., McGraw, G.: Software penetration testing. IEEE Secur. Privacy 3, 84\u201387 (2005). https:\/\/doi.org\/10.1109\/MSP.2005.23","journal-title":"IEEE Secur. Privacy"},{"key":"502_CR6","doi-asserted-by":"publisher","unstructured":"Baah, G., Podgurski, A., Harrold, M.: Causal inference for statistical fault localization. In; Proceedings of the 2010 ACM International Symposium on Software Testing and Analysis (ISSTA), Trento, Italy, July 12-16, 2010, pp. 73\u201384 (2010). https:\/\/doi.org\/10.1145\/1831708.1831717","DOI":"10.1145\/1831708.1831717"},{"key":"502_CR7","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TSE.2014.2372785","volume":"41","author":"ET Barr","year":"2015","unstructured":"Barr, E.T., Harman, M., McMinn, P., Shahbaz, M., Yoo, S.: The oracle problem in software testing: a survey. IEEE Trans. Softw. Eng. 41, 507\u2013525 (2015). https:\/\/doi.org\/10.1109\/TSE.2014.2372785","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR8","doi-asserted-by":"publisher","unstructured":"Bell, K.Z., Vouk, M.A.: On effectiveness of pairwise methodology for testing network-centric software, Proceedings of the 2005 International Conference on Information & Communication Technology, Cairo, Egypt, December 5-6, 2005, pp. 221-235 (2005). https:\/\/doi.org\/10.1109\/ITICT.2005.1609626","DOI":"10.1109\/ITICT.2005.1609626"},{"key":"502_CR9","doi-asserted-by":"publisher","unstructured":"Bertolino, A.: Software testing research: achievements, challenges, dreams. In: Proceedings of Future of Software Engineering (FOSE), Minneapolis, MN, USA, May 23\u201325 (2007). https:\/\/doi.org\/10.1109\/FOSE.2007.25","DOI":"10.1109\/FOSE.2007.25"},{"key":"502_CR10","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit. 84, 317\u2013331 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2018.07.023","journal-title":"Pattern Recognit."},{"key":"502_CR11","doi-asserted-by":"publisher","unstructured":"Bonn, J., F\u00f6gen, K., Lichter, H.: A framework for automated combinatorial test generation, execution, and fault characterization. In: Proceedings of the 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Xian, China, April 23, 2019, pp. 224\u2013233 (2019). https:\/\/doi.org\/10.1109\/ICSTW.2019.00057","DOI":"10.1109\/ICSTW.2019.00057"},{"key":"502_CR12","volume-title":"Statistics for Experimenters","author":"GEP Box","year":"1978","unstructured":"Box, G.E.P., Hunter, W.G., Hunter, J.S.: Statistics for Experimenters. Wiley, New York (1978)"},{"key":"502_CR13","volume-title":"Empirical Model Building and Response Surfaces","author":"GEP Box","year":"1987","unstructured":"Box, G.E.P., Draper, N.R.: Empirical Model Building and Response Surfaces. Wiley, New York (1987)"},{"key":"502_CR14","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1002\/j.1538-7305.1992.tb00164.x","volume":"71","author":"R Brownlie","year":"1992","unstructured":"Brownlie, R., Prowse, J., Phadke, M.S.: Robust testing of AT&T PMX\/Starmail using OATS. AT&T Tech. J. 71, 41\u201347 (1992). https:\/\/doi.org\/10.1002\/j.1538-7305.1992.tb00164.x","journal-title":"AT&T Tech. J."},{"key":"502_CR15","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1214\/aoms\/1177729387","volume":"23","author":"KA Bush","year":"1952","unstructured":"Bush, K.A.: Orthogonal arrays of index unity. Ann. Math. Stat. 23, 426\u2013434 (1952)","journal-title":"Ann. Math. Stat."},{"key":"502_CR16","doi-asserted-by":"publisher","unstructured":"Chandrasekaran, J., Feng, H., Lei, Y., Kuhn, D.R., Kacker, R.N.: Applying combinatorial testing to data mining algorithms. In: Proceedings of the 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Tokyo, Japan, March 13\u201317, 2017, pp. 253\u2013261 (2017). https:\/\/doi.org\/10.1109\/ICSTW.2017.46","DOI":"10.1109\/ICSTW.2017.46"},{"key":"502_CR17","doi-asserted-by":"publisher","unstructured":"Chetouane, N., Klampfl, L., Wotawa, F.: Investigating the effectiveness of mutation testing tools in the context of deep neural networks, In: Rojas, I., Joya, G., Catala, A. (eds.), Advances in Computational Intelligence. IWANN 2019. Lecture Notes in Computer Science, 11506, pp. 766\u2013777. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20521-8_63","DOI":"10.1007\/978-3-030-20521-8_63"},{"key":"502_CR18","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1049\/sej.1994.0025","volume":"9","author":"JJ Chilenski","year":"1994","unstructured":"Chilenski, J.J., Miller, S.P.: Applicability of modified condition\/decision coverage to software testing. Softw. Eng. J. 9, 193\u2013200 (1994). https:\/\/doi.org\/10.1049\/sej.1994.0025","journal-title":"Softw. Eng. J."},{"key":"502_CR19","volume-title":"Experimental Designs","author":"WG Cochran","year":"1957","unstructured":"Cochran, W.G., Cox, G.M.: Experimental Designs, 2nd edn. Wiley, New York (1957)","edition":"2"},{"key":"502_CR20","doi-asserted-by":"publisher","unstructured":"Cohen, D.M., Dalal, S.R., Kajla, A., Patton, G.C.: The automatic efficient test generator (AETG) system. In: Proceedings of the 1994 IEEE International Symposium on Software, Reliability Engineering, Monterey, CA, USA, November 6\u20139, 1994, pp. 303\u2013309 (1994). https:\/\/doi.org\/10.1109\/ISSRE.1994.341392","DOI":"10.1109\/ISSRE.1994.341392"},{"key":"502_CR21","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/52.536462","volume":"13","author":"DM Cohen","year":"1996","unstructured":"Cohen, D.M., Dalal, S.R., Parelius, J., Patton, G.C.: The combinatorial design approach to automatic test generation. IEEE Softw. 13, 83\u201389 (1996). https:\/\/doi.org\/10.1109\/52.536462","journal-title":"IEEE Softw."},{"key":"502_CR22","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1109\/32.605761","volume":"23","author":"DM Cohen","year":"1997","unstructured":"Cohen, D.M., Dalal, S.R., Fredman, M.L., Patton, G.C.: The AETG system: an approach to testing based on combinatorial design. IEEE Trans. Softw. Eng. 23, 437\u2013444 (1997). https:\/\/doi.org\/10.1109\/32.605761","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR23","doi-asserted-by":"publisher","unstructured":"Cohen, M.B., Gibbons, P.B., Mugridge, W.B., Colbourn, C.J.: Constructing test suites for interaction testing. In: Proceedings of the 2003 International Conference on Software Engineering (ICSE), May 3\u201310, 2003, Portland, OR, USA, pp. 38\u201348 (2003). https:\/\/doi.org\/10.1109\/ICSE.2003.1201186","DOI":"10.1109\/ICSE.2003.1201186"},{"key":"502_CR24","unstructured":"Colbourn (Website) http:\/\/www.public.asu.edu\/_ccolbou\/src\/tabby\/catable.html"},{"key":"502_CR25","first-page":"121","volume":"59","author":"CJ Colbourn","year":"2004","unstructured":"Colbourn, C.J.: Combinatorial aspects of covering arrays. Le Matematiche 59, 121\u2013167 (2004)","journal-title":"Le Matematiche"},{"key":"502_CR26","doi-asserted-by":"publisher","DOI":"10.1201\/9781003040897","volume-title":"The CRC Handbook of Combinatorial Designs","author":"CJ Colbourn","year":"2010","unstructured":"Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Designs, 2nd edn. CRC Press, Boca Raton (2010)","edition":"2"},{"key":"502_CR27","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10878-007-9082-4","volume":"15","author":"CJ Colbourn","year":"2008","unstructured":"Colbourn, C.J., McClary, D.W.: Locating and detecting arrays for interaction faults. J. Comb. Optim. 15, 17\u201348 (2008). https:\/\/doi.org\/10.1007\/s10878-007-9082-4","journal-title":"J. Comb. Optim."},{"key":"502_CR28","doi-asserted-by":"publisher","unstructured":"Colbourn, C.J., Syrotiuk, V.R.: Coverage, location, detection, and measurement. In: Proceedings of the 2016 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Chicago, IL, USA, April 11\u201315, 2016, pp. 19\u201325 (2016). https:\/\/doi.org\/10.1109\/ICSTW.2016.38","DOI":"10.1109\/ICSTW.2016.38"},{"key":"502_CR29","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.compeleceng.2017.06.004","volume":"61","author":"K Cui","year":"2017","unstructured":"Cui, K., Zhou, K., Qiu, T., Li, M., Yan, L.: A hierarchical combinatorial testing method for smart phone software in wearable IoT systems. Comput. Electr. Eng. 61, 250\u2013265 (2017). https:\/\/doi.org\/10.1016\/j.compeleceng.2017.06.004","journal-title":"Comput. Electr. Eng."},{"key":"502_CR30","unstructured":"Czerwonka (Website) http:\/\/www.pairwise.org"},{"key":"502_CR31","doi-asserted-by":"publisher","unstructured":"Dominka, S., Mandl, M., Dubner, M., Ertl, D.: Using combinatorial testing for distributed automotive features: applying combinatorial testing for automated feature-interaction-testing. In: Proceedings of the 2018 IEEE eighth Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, January 8\u201310, 2018, pp. 490\u2013495 (2018). https:\/\/doi.org\/10.1109\/CCWC.2018.8301632","DOI":"10.1109\/CCWC.2018.8301632"},{"key":"502_CR32","doi-asserted-by":"publisher","unstructured":"Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., Paxson, V.: The matter of Heartbleed. In: Proceedings of the 2014 ACM Internet Measurement Conference (IMC), Vancouver, Canada, November 5\u20137, 2014, pp. 475\u2013488 (2014). https:\/\/doi.org\/10.1145\/2663716.2663755","DOI":"10.1145\/2663716.2663755"},{"key":"502_CR33","doi-asserted-by":"publisher","unstructured":"Fifo, M., Enoiu, E., Afzal, W.: On measuring combinatorial coverage of manually created test cases for industrial software. In: Proceedings of the 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Xian, China, April 22\u201323, 2019, pp. 264\u2013267 (2019). https:\/\/doi.org\/10.1109\/ICSTW.2019.00062","DOI":"10.1109\/ICSTW.2019.00062"},{"key":"502_CR34","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/0951-8320(91)_90052-9","volume":"32","author":"GB Finelli","year":"1991","unstructured":"Finelli, G.B.: NASA software failure characterization experiments. Reliab. Eng. Syst. Saf. 32, 155\u2013169 (1991). https:\/\/doi.org\/10.1016\/0951-8320(91)_90052-9","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"502_CR35","volume-title":"The Design of Experiments","author":"RA Fisher","year":"1935","unstructured":"Fisher, R.A.: The Design of Experiments. Oliver and Boyd, London (1935)"},{"key":"502_CR36","doi-asserted-by":"publisher","first-page":"287","DOI":"10.6028\/jres.113.022","volume":"113","author":"M Forbes","year":"2008","unstructured":"Forbes, M., Lawrence, J.F., Lei, Y., Kacker, R.N., Kuhn, D.R.: Refining the in-parameter-order strategy for constructing covering arrays. J. Res. Natl. Inst. Stand. Technol. 113, 287\u2013297 (2008)","journal-title":"J. Res. Natl. Inst. Stand. Technol."},{"key":"502_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139165495","volume-title":"Statistical Models: Theory and Practice","author":"DA Freedman","year":"2005","unstructured":"Freedman, D.A.: Statistical Models: Theory and Practice. Cambridge University Press, Cambridge (2005)"},{"key":"502_CR38","doi-asserted-by":"publisher","unstructured":"Garn, B., Simos, D.E.: Eris: A tool for combinatorial testing of the Linux system call interface. In: Proceeding of the 2014 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Cleveland, OH, USA, March 31\u2013April 4, 2014, pp. 58\u201367 (2014). https:\/\/doi.org\/10.1109\/ICSTW.2014.7","DOI":"10.1109\/ICSTW.2014.7"},{"key":"502_CR39","doi-asserted-by":"publisher","unstructured":"Garn, B., Kapsalis, I. Simos, D.E., Winkler, S.: On the applicability of combinatorial testing to web application security testing: a case study. In: Proceedings of the 2014 ACM Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing (JAMAICA 2014), San Jose, CA, USA, July 21, 2014, pp. 16\u201321 (2014). https:\/\/doi.org\/10.1145\/2631890.2631894","DOI":"10.1145\/2631890.2631894"},{"key":"502_CR40","doi-asserted-by":"publisher","unstructured":"Garn, B., Simos, D.E., Zauner, S., Kuhn, D.R., Kacker, R.N.: Browser fingerprinting using combinatorial sequence testing. In: Proceedings of the 6-th Annual Symposium on Hot Topics in the Science of Security (HotSoS 2019), Nashville, TN, USA, April 1\u20133, 2019, Article 7 (2019). https:\/\/doi.org\/10.1145\/3314058.3314062","DOI":"10.1145\/3314058.3314062"},{"key":"502_CR41","doi-asserted-by":"publisher","unstructured":"Garn, B., W\u00fcrfl, F., Simos, D.E.: KERIS: a CT tool of the linux kernel with dynamic memory analysis capabilities. In: Strichman, O., Tzoref-Brill, R. (eds.), Hardware and Software: Verification and Testing. HVC 2017. Lecture Notes in Computer Science, 10629, pp. 225\u2013228. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70389-3_17","DOI":"10.1007\/978-3-319-70389-3_17"},{"key":"502_CR42","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/TSE.2018.2865935","volume":"46","author":"L Ghandehari","year":"2019","unstructured":"Ghandehari, L., Lei, Y., Kacker, R.N., Kuhn, D.R., Kung, D., Xie, T.: A combinatorial testing-based approach to fault localization. IEEE Trans. Softw. Eng. (TSE) 46, 616\u2013645 (2019). https:\/\/doi.org\/10.1109\/TSE.2018.2865935","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"502_CR43","volume-title":"Theory and Application of the Linear Statistical Model","author":"FA Graybill","year":"1976","unstructured":"Graybill, F.A.: Theory and Application of the Linear Statistical Model. Duxbury Press, North Scituate (1976)"},{"key":"502_CR44","unstructured":"Grindal, M., Offutt, J.: Input parameter modeling for combination strategies. In; Proceedings of the 2007 Conference on IASTED International Multi-Conference: Software Engineering, Innsbruck, Austria, February 13\u201315, 2007, pp. 255\u2013260 (2007). https:\/\/dlnext.acm.org\/doi\/abs\/10.5555\/1332044.1332085"},{"key":"502_CR45","doi-asserted-by":"publisher","unstructured":"Grindal, M., Offutt, J., Mellin, J.: Managing conflicts when using combination strategies to test software. In: Proceedings of the Australian Software Engineering Conference (ASWEC), Melbourne, Vic., Australia, April 10\u201313, 2007, pp. 255\u2013264 (2007). https:\/\/doi.org\/10.1109\/ASWEC.2007.27","DOI":"10.1109\/ASWEC.2007.27"},{"key":"502_CR46","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1002\/stvr.4370030203","volume":"3","author":"M Grochtmann","year":"1993","unstructured":"Grochtmann, M., Grimm, K.: Classification trees for partition testing. Softw. Test. Verif. Reliab. 3, 63\u201382 (1993). https:\/\/doi.org\/10.1002\/stvr.4370030203","journal-title":"Softw. Test. Verif. Reliab."},{"key":"502_CR47","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.disc.2003.11.029","volume":"284","author":"A Hartman","year":"2004","unstructured":"Hartman, A., Raskin, L.: Problems and algorithms for covering arrays. Discrete Math. 284, 149\u2013156 (2004). https:\/\/doi.org\/10.1016\/j.disc.2003.11.029","journal-title":"Discrete Math."},{"key":"502_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1478-6","volume-title":"Orthogonal Arrays: Theory and Applications","author":"AS Hedayat","year":"1999","unstructured":"Hedayat, A.S., Sloane, N.J.A., Stufken, J.: Orthogonal Arrays: Theory and Applications. Springer, New York (1999)"},{"key":"502_CR49","volume-title":"Design and Analysis of Experiments","author":"K Hinkelmann","year":"1994","unstructured":"Hinkelmann, K., Kempthorne, O.: Design and Analysis of Experiments, vol. 1. Wiley, New York (1994)"},{"key":"502_CR50","doi-asserted-by":"publisher","unstructured":"Jin, W., Orso, A.: F3: fault localization for field failures. Proceedings of the 2013 ACM International Symposium on Software Testing and Analysis (ISSTA), Lugano, Switzerland, July 15\u201320, 2013, pp. 213\u2013223 (2013). https:\/\/doi.org\/10.1145\/2483760.2483763","DOI":"10.1145\/2483760.2483763"},{"key":"502_CR51","doi-asserted-by":"publisher","unstructured":"Jones, J.A., Harrold, M.J.: Empirical evaluation of the tarantula automatic fault-localization technique. In: Proceeding of the 20-th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Long Beach, CA, USA, November 07\u201311, 200, pp. 273\u2013282 (2005). https:\/\/doi.org\/10.1145\/1101908.1101949","DOI":"10.1145\/1101908.1101949"},{"key":"502_CR52","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1080\/00224065.1985.11978964","volume":"17","author":"RN Kackar","year":"1985","unstructured":"Kackar, R.N.: Off-line quality control, parameter design, and the Taguchi method (with comments and response). Journal of Quality Technology 17, 176\u2013209 (1985). https:\/\/doi.org\/10.1080\/00224065.1985.11978964","journal-title":"Journal of Quality Technology"},{"key":"502_CR53","doi-asserted-by":"publisher","first-page":"577","DOI":"10.6028\/jres.096.034","volume":"96","author":"RN Kacker","year":"1991","unstructured":"Kacker, R.N., Lagergren, E.S., Filliben, J.J.: Taguchi\u2019s orthogonal arrays are classical designs of experiments. J. Res. Natl. Inst. Stand. Technol. 96, 577\u2013591 (1991)","journal-title":"J. Res. Natl. Inst. Stand. Technol."},{"key":"502_CR54","doi-asserted-by":"publisher","unstructured":"Kampel, L., Simos, D.E.: Set-Based Algorithms for Combinatorial Test Set Generation. In: Wotawa, F., Nica, M., Kushik, N. (eds.), Testing Software and Systems. ICTSS 2016. Lecture Notes in Computer Science, 9976, pp. 231\u2013240. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47443-4_16","DOI":"10.1007\/978-3-319-47443-4_16"},{"key":"502_CR55","doi-asserted-by":"publisher","DOI":"10.1097\/00010694-195205000-00012","volume-title":"The Design and Analysis of Experiments","author":"O Kempthorne","year":"1952","unstructured":"Kempthorne, O.: The Design and Analysis of Experiments. Wiley, New York (1952)"},{"key":"502_CR56","doi-asserted-by":"publisher","unstructured":"Khalsa, S., Labiche, Y.: An orchestrated survey of available algorithms and tools for combinatorial testing. In: Proceedings of the 2014 IEEE International Symposium on Software Reliability Engineering (ISSRE), Naples, Italy, November 3\u20136, 2014, pp. 323\u2013334 (2014). https:\/\/doi.org\/10.1109\/ISSRE.2014.15","DOI":"10.1109\/ISSRE.2014.15"},{"key":"502_CR57","doi-asserted-by":"publisher","unstructured":"Kitsos, P., Simos, D.E., Torres-Jimenez, J., Voyiatzis, A.G.: Exciting FPGA cryptographic Trojans using combinatorial testing. In; Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering (ISSRE), Gaithersburg, MD, USA, November 2\u20135, 2015, pp. 69\u201376 (2015). https:\/\/doi.org\/10.1109\/ISSRE.2015.7381800","DOI":"10.1109\/ISSRE.2015.7381800"},{"key":"502_CR58","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11786-017-0326-0","volume":"12","author":"K Kleine","year":"2018","unstructured":"Kleine, K., Simos, D.E.: An efficient design and implementation of the in-parameter-order algorithm. Math. Comput. Sci. 12, 51\u201367 (2018). https:\/\/doi.org\/10.1007\/s11786-017-0326-0","journal-title":"Math. Comput. Sci."},{"key":"502_CR59","volume-title":"Introduction to Combinatorial Testing","author":"DR Kuhn","year":"2013","unstructured":"Kuhn, D.R., Kacker, R.N., Lei, Y.: Introduction to Combinatorial Testing. CRC Press, Boca Raton (2013)"},{"key":"502_CR60","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2019.2951980","volume":"53","author":"DR Kuhn","year":"2020","unstructured":"Kuhn, D.R., Kacker, R.N., Lei, Y., Simos, D.E.: Input space coverage matters. IEEE Comput. 53, 37\u201344 (2020). https:\/\/doi.org\/10.1109\/MC.2019.2951980","journal-title":"IEEE Comput."},{"key":"502_CR61","doi-asserted-by":"publisher","unstructured":"Kuhn, D.R., Raunak, M.S., Kacker, R.N.: It doesn\u2019t have to be like this: cybersecurity vulnerability trends, IT professional,19 (November\/December 2017), pp. 66\u201370 (2017). https:\/\/doi.org\/10.1109\/MITP.2017.4241462","DOI":"10.1109\/MITP.2017.4241462"},{"key":"502_CR62","doi-asserted-by":"publisher","unstructured":"Kuhn, D.R., Reilly, M.J.: An investigation of the applicability of design of experiments to software testing. In: Proceedings of the 27-th NASA\/IEEE Software Engineering Workshop, Goddard Space Flight Center, Greenbelt, MD, USA, December 5\u20136, 2002, pp. 91\u201395 (2002). https:\/\/doi.org\/10.1109\/SEW.2002.1199454","DOI":"10.1109\/SEW.2002.1199454"},{"key":"502_CR63","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TSE.2004.24","volume":"30","author":"DR Kuhn","year":"2004","unstructured":"Kuhn, D.R., Wallace, D.R., Gallo, A.M.: Software fault interactions and implications for software testing. IEEE Trans. Softw. Eng. 30, 418\u2013421 (2004). https:\/\/doi.org\/10.1109\/TSE.2004.24","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR64","doi-asserted-by":"crossref","unstructured":"Lawrence, J.F., Kacker, R.N., Lei, Y., Kuhn, D.R., Forbes, M.: A survey of binary covering arrays. Electron. J. Comb. 18, Article 84 (2011). https:\/\/www.combinatorics.org\/ojs\/index.php\/eljc\/article\/view\/v18i1p84","DOI":"10.37236\/571"},{"key":"502_CR65","doi-asserted-by":"publisher","unstructured":"Lei, Y., Tai, K.C.: In-parameter order: a test generation strategy for pairwise testing. In: Proceedings of the 3rd IEEE International High Assurance Systems Engineering Symposium (HASE), Washington, DC, USA, November 13\u201314, 1998, pp. 254\u2013261 (1998). https:\/\/doi.org\/10.1109\/HASE.1998.731623","DOI":"10.1109\/HASE.1998.731623"},{"key":"502_CR66","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1002\/stvr.381","volume":"18","author":"Y Lei","year":"2008","unstructured":"Lei, Y., Kacker, R., Kuhn, D., Okun, V., Lawrence, J.: IPOG\/IPOG-D: efficient test generation for multi-way combinatorial testing. Softw. Test. Verif. Reliab. 18, 125\u2013148 (2008). https:\/\/doi.org\/10.1002\/stvr.381","journal-title":"Softw. Test. Verif. Reliab."},{"key":"502_CR67","doi-asserted-by":"crossref","unstructured":"Lejay, L.V., Shasha, D.E., Palenchar, P.M., Kouranov, A.Y., Cruikshank, A.A., Chou, M.F., Coruzzi, G.M.: Adaptive combinatorial design to explore large experimental spaces: approach and validation, Systems Biology, 1, pp. 206\u2013212 (2004).https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/17051692","DOI":"10.1049\/sb:20045020"},{"key":"502_CR68","doi-asserted-by":"publisher","unstructured":"Li, D., Hu, L., Gao, R., Wong, W. E., Kuhn, D.R., Kacker, R.N.: Improving MC\/DC and fault detection strength using combinatorial testing. In; Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability, and Security (QRS 2017), Prague, Czech Republic, July 25\u201329, 2017, pp. 297\u2013303 (2017). https:\/\/doi.org\/10.1109\/QRS-C.2017.131","DOI":"10.1109\/QRS-C.2017.131"},{"key":"502_CR69","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TSE.2016.2597136","volume":"43","author":"N Li","year":"2017","unstructured":"Li, N., Offutt, J.: Test oracle strategies for model-based testing. IEEE Trans. Softw. Eng. (TSE) 43, 372\u2013395 (2017). https:\/\/doi.org\/10.1109\/TSE.2016.2597136","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"502_CR70","doi-asserted-by":"publisher","unstructured":"Li, Y., Tao, J., Wotawa, F.: Ontology-based test generation for automated and autonomous driving functions. Inf. Softw. Technol. 117, Article 106200 (2020). https:\/\/doi.org\/10.1016\/j.infsof.2019.106200","DOI":"10.1016\/j.infsof.2019.106200"},{"key":"502_CR71","doi-asserted-by":"publisher","unstructured":"Li, X., Gao, R., Wong, W.E., Yang, C., Li, D.: Applying combinatorial testing in industrial settings. In: Proceedings of the 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS), Vienna, Austria, August 1\u20133, 2016, Article 16378499 (2016). https:\/\/doi.org\/10.1109\/QRS.2016.16","DOI":"10.1109\/QRS.2016.16"},{"key":"502_CR72","first-page":"423","volume":"34","author":"DKJ Lin","year":"1992","unstructured":"Lin, D.K.J., Draper, N.R.: Projection properties of Plackett and Burman designs. Technometrics 34, 423\u2013428 (1992)","journal-title":"Technometrics"},{"key":"502_CR73","doi-asserted-by":"publisher","unstructured":"Lin, K.M., Kackar, R.N.: Optimizing the wave soldering process. Electronic Packaging & Production, February 1986, pp. 108\u2013115 (1986). Reprinted in Dehnad, K. (eds) Quality Control, Robust Design, and the Taguchi Method, pp. 143\u2013157. Springer, Boston, MA, 1989. https:\/\/doi.org\/10.1007\/978-1-4684-1472-1_7","DOI":"10.1007\/978-1-4684-1472-1_7"},{"key":"502_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083281","volume":"30","author":"C Lott","year":"2005","unstructured":"Lott, C., Jain, A., Dalal, S.: Modeling requirements for combinatorial software testing. ACM SIGSOFT Softw. Eng. Notes 30, 1\u20137 (2005). https:\/\/doi.org\/10.1145\/1082983.1083281","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"502_CR75","doi-asserted-by":"publisher","unstructured":"Ma, L., Juefei-Xu, F., Xue, M., Li, B., Li, L., Liu, Y., Zhao, J.: DeepCT: tomographic combinatorial testing for deep learning systems. In: Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), Hangzhou, China, February 24\u201327, 2019, pp. 614\u2013618 (2019). https:\/\/doi.org\/10.1109\/SANER.2019.8668044","DOI":"10.1109\/SANER.2019.8668044"},{"key":"502_CR76","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1145\/4372.4375","volume":"28","author":"R Mandl","year":"1985","unstructured":"Mandl, R.: Orthogonal Latin squares: an application of experiment design to compiler testing. Commun. ACM 28, 1054\u20131058 (1985). https:\/\/doi.org\/10.1145\/4372.4375","journal-title":"Commun. ACM"},{"key":"502_CR77","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s11219-017-9383-5","volume":"25","author":"L Mariani","year":"2017","unstructured":"Mariani, L., Hao, D., Subramanyan, R., Zhu, H.: The central role of test automation in software quality assurance. Softw. Qual. J. 25, 797\u2013802 (2017). https:\/\/doi.org\/10.1007\/s11219-017-9383-5","journal-title":"Softw. Qual. J."},{"key":"502_CR78","unstructured":"Masuyama, M.: On difference sets for constructing orthogonal arrays of index two and strength two, Reports of Statistical Application Research, 5, pp. 27\u201334. Union of Japanese Scientists and Engineers (JUSE), Tokyo, Japan (1957)"},{"key":"502_CR79","volume-title":"Generalized, Linear, and Mixed Models","author":"CE McCulloch","year":"2001","unstructured":"McCulloch, C.E., Searle, S.R.: Generalized, Linear, and Mixed Models. Wiley, New York (2001)"},{"key":"502_CR80","doi-asserted-by":"publisher","unstructured":"Memon, A., Banerjee, I., Nagarajan, A.: What test oracle should i use for effective GUI testing? In; Proceedings of the 18-th IEEE International Conference on Automated Software Engineering (ASE 2003), Montreal, Canada, October 6\u201310, 2003, pp. 164\u2013173 (2003). https:\/\/doi.org\/10.1109\/ASE.2003.1240304","DOI":"10.1109\/ASE.2003.1240304"},{"key":"502_CR81","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3010317","author":"H Mercan","year":"2020","unstructured":"Mercan, H., Javeed, A., Yilmaz, C.: Flexible combinatorial interaction testing. IEEE Trans. Softw. Eng. (2020). https:\/\/doi.org\/10.1109\/TSE.2020.3010317","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR82","volume-title":"Beyond ANOVA, Basic and Applied Statistics","author":"RG Miller","year":"1986","unstructured":"Miller, R.G.: Beyond ANOVA, Basic and Applied Statistics. Wiley, New York (1986)"},{"key":"502_CR83","volume-title":"Design and Analysis of Experiments","author":"DC Montgomery","year":"1991","unstructured":"Montgomery, D.C.: Design and Analysis of Experiments, 3rd edn. Wiley, New York (1991)","edition":"3"},{"key":"502_CR84","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1109\/TR.2018.2847247","volume":"67","author":"N Mouha","year":"2018","unstructured":"Mouha, N., Raunak, M.S., Kuhn, D.R., Kacker, R.N.: Finding bugs in cryptographic hash function implementations. IEEE Trans. Reliab. 67, 870\u2013884 (2018). https:\/\/doi.org\/10.1109\/TR.2018.2847247","journal-title":"IEEE Trans. Reliab."},{"key":"502_CR85","doi-asserted-by":"publisher","unstructured":"Nie, C., Leung, H.: A survey of combinatorial testing. ACM Computing Surveys (CSUR), 43, Article 11 (2011). https:\/\/doi.org\/10.1145\/1883612.1883618","DOI":"10.1145\/1883612.1883618"},{"key":"502_CR86","doi-asserted-by":"publisher","unstructured":"Nie, C., Leung, H.: The minimal failure-causing schema of combinatorial testing. ACM Trans. Softw. Eng. Methodol. (TOSEM) 20, Article 15, (2011). https:\/\/doi.org\/10.1145\/2000799.2000801","DOI":"10.1145\/2000799.2000801"},{"key":"502_CR87","unstructured":"NIST Covering array tables (Website) https:\/\/math.nist.gov\/coveringarrays\/"},{"key":"502_CR88","unstructured":"NIST Combinatorial testing page (Website) https:\/\/csrc.nist.gov\/projects\/automated-combinatorial-testing-for-software"},{"key":"502_CR89","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/TSE.2018.2844259","volume":"46","author":"X Niu","year":"2020","unstructured":"Niu, X., Nie, C., Lei, Y., Leung, H., Wang, X.: Identifying failure-causing schemas in the presence of multiple faults. IEEE Trans. Softw. Eng. 46, 141\u2013162 (2020). https:\/\/doi.org\/10.1109\/TSE.2018.2844259","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR90","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/TSE.2018.2865772","volume":"46","author":"X Niu","year":"2020","unstructured":"Niu, X., Nie, C., Leung, H., Lei, Y., Wang, X., Xu, J., Wang, Y.: An interleaving approach to combinatorial testing and failure-inducing interaction identification. IEEE Trans. Softw. Eng. 46, 584\u2013615 (2020). https:\/\/doi.org\/10.1109\/TSE.2018.2865772","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR91","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1145\/62959.62964","volume":"31","author":"T Ostrand","year":"1988","unstructured":"Ostrand, T., Balcer, M.: The category-partition method for specifying and generating functional tests. Commun. ACM 31, 676\u2013686 (1988). https:\/\/doi.org\/10.1145\/62959.62964","journal-title":"Commun. ACM"},{"key":"502_CR92","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1002\/jcd.21747","volume":"28","author":"D Panario","year":"2020","unstructured":"Panario, D., Saaltink, M., Stevens, B., Wevrick, D.: An extension of a construction of covering arrays. J. Comb. Des. 28, 842\u2013861 (2020). https:\/\/doi.org\/10.1002\/jcd.21747","journal-title":"J. Comb. Des."},{"key":"502_CR93","unstructured":"Patil, A.H.: Design and implementation of combinatorial testing based test suites for operating systems used for internet of things, Lulu.com (2019)"},{"key":"502_CR94","doi-asserted-by":"publisher","unstructured":"Pearson, S., Campos, J., Just, R., Fraser, G., Abreu, R., Ernst, M.D., Pang, D., Keller, B.: Evaluating and improving fault localization. In: Proceedings of the 39th IEEE International Conference on Software Engineering (ICSE), Buenos Aires, Argentina, May 20\u201328, 2017, pp. 609\u2013620 (2017). https:\/\/doi.org\/10.1109\/ICSE.2017.62","DOI":"10.1109\/ICSE.2017.62"},{"key":"502_CR95","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/32.667877","volume":"24","author":"D Peters","year":"1998","unstructured":"Peters, D., Parnas, D.: Using test oracles generated from program documentation. IEEE Trans. Softw. Eng. 24, 161\u2013173 (1998). https:\/\/doi.org\/10.1109\/32.667877","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR96","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/B978-0-12-800160-8.00001-2","volume":"95","author":"M Pezze","year":"2014","unstructured":"Pezze, M., Zhang, C.: Chapter one\u2014Automated test oracles: a survey. Adv. Comput. 95, 1\u201348 (2014). https:\/\/doi.org\/10.1016\/B978-0-12-800160-8.00001-2","journal-title":"Adv. Comput."},{"key":"502_CR97","doi-asserted-by":"crossref","unstructured":"Plackett, R.L., Burman, J.P.: The design of optimum multifactorial experiments. Biometrika 33, 305\u2013325 (1946). https:\/\/www.jstor.org\/stable\/pdf\/2332195.pdf","DOI":"10.1093\/biomet\/33.4.305"},{"key":"502_CR98","volume-title":"Constructions and Combinatorial Problems in Design of Experiments","author":"D Raghavarao","year":"1971","unstructured":"Raghavarao, D.: Constructions and Combinatorial Problems in Design of Experiments. Wiley, New York (1971)"},{"key":"502_CR99","volume-title":"Factorial Designs","author":"BL Raktoe","year":"1981","unstructured":"Raktoe, B.L., Hedayat, A.S., Federer, W.T.: Factorial Designs. Wiley, New York (1981)"},{"key":"502_CR100","first-page":"67","volume":"38","author":"CR Rao","year":"1946","unstructured":"Rao, C.R.: Hypercubes of strength d leading to confounded designs of factorial experiments. Bull. Calc. A Math. Soc. 38, 67\u201368 (1946)","journal-title":"Bull. Calc. A Math. Soc."},{"key":"502_CR101","unstructured":"Sato, S., Shimokawa, H.: Methods for setting software test parameters using the design of experiments method (in Japanese), Proceedings of 4th Symposium on Quality Control in Software, Union of Japanese Scientists and Engineers (JUSE), 1984, pp. 1\u20138 (1984)"},{"key":"502_CR102","unstructured":"SBA-Research\/CAgen (Website) https:\/\/matris.sba-research.org\/tools\/cagen"},{"key":"502_CR103","volume-title":"Linear Models","author":"SR Searle","year":"1971","unstructured":"Searle, S.R.: Linear Models. Wiley, New York (1971)"},{"key":"502_CR104","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/TSE.2016.2532875","volume":"42","author":"S Segura","year":"2016","unstructured":"Segura, S., Fraser, G., Sanchez, A.B., Ruiz-Cort\u00e9s, A.: A survey on metamorphic testing. IEEE Trans. Softw. Eng. 42, 805\u2013824 (2016). https:\/\/doi.org\/10.1109\/TSE.2016.2532875","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR105","doi-asserted-by":"publisher","unstructured":"Seidel, S.A., Sarkar, K., Colbourn, C.J., Syrotiuk, V.R.: Separating interaction effects using locating and detecting arrays. In: Iliopoulos, C., Leong, H., Sung, W.K. (eds.) Combinatorial Algorithms. IWOCA 2018. Lecture Notes in Computer Science, 10979, pp. 349\u2013360. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94667-2_29","DOI":"10.1007\/978-3-319-94667-2_29"},{"key":"502_CR106","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1214\/aoms\/1177728855","volume":"25","author":"E Seiden","year":"1954","unstructured":"Seiden, E.: On the problem of construction of orthogonal arrays. Ann. Math. Stat. 25, 151\u2013156 (1954)","journal-title":"Ann. Math. Stat."},{"key":"502_CR107","doi-asserted-by":"crossref","unstructured":"Shasha, D.E., Kouranov, A.Y., Lejay, L.V., Chou, M.F., Coruzzi, G.M.: Using combinatorial design to study regulation by multiple input signals. A tool for parsimony in the post-genomics era, Plant Physiology 127, 1590\u20131594 (2001). http:\/\/www.plantphysiol.org\/content\/127\/4\/1590","DOI":"10.1104\/pp.010683"},{"key":"502_CR108","unstructured":"Sherwood, G.B.: Effective testing of factor combinations, Proceedings of 3rd International Conference on Software Testing, Analysis and Review (STAR-1994), Washington, DC, USA, May 8\u201312, 1994, pp. 151\u2013166 (1994). http:\/\/testcover.com\/pub\/background\/star1994_paper.pdf"},{"key":"502_CR109","unstructured":"Shimokawa, H.: Method of generating software test cases using the experimental design (in Japanese), Report on Software Engineering SIG, Information Processing Society of Japan, No.1984-SE-040 (1985)"},{"key":"502_CR110","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1007\/s11219-018-9412-z","volume":"27","author":"DE Simos","year":"2019","unstructured":"Simos, D.E., Bozic, J., Garn, B., Leithner, M., Duan, F., Kleine, K., Lei, Y., Wotawa, F.: Testing TLS using planning-based combinatorial methods and execution framework. Softw. Qual. J. 27, 703\u2013729 (2019). https:\/\/doi.org\/10.1007\/s11219-018-9412-z","journal-title":"Softw. Qual. J."},{"key":"502_CR111","doi-asserted-by":"publisher","unstructured":"Simos, D.E., Garn, B., Zivanovic, J., Leithner, M.: Practical combinatorial testing for XSS Detection using Locally Optimized Attack Models. In: Proceedings of the 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Xian, China, April 22\u201323, 2019, pp. 122\u2013130 (2019). https:\/\/doi.org\/10.1109\/ICSTW.2019.00040","DOI":"10.1109\/ICSTW.2019.00040"},{"key":"502_CR112","doi-asserted-by":"publisher","unstructured":"Simos, D.E., Zivanovic, J., Leithner, M.: Automated combinatorial testing for detecting SQL vulnerabilities in web applications. In: Proceedings of the 14th International Workshop on Automation of Software Test, collocated with 41st ACM\/IEEE International Conference on Software Engineering (ICSE), Montreal, Canada, May 27, 2019, pp 56\u201361 (2019). https:\/\/doi.org\/10.1109\/AST.2019.00014","DOI":"10.1109\/AST.2019.00014"},{"key":"502_CR113","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2016.314","volume":"49","author":"DE Simos","year":"2016","unstructured":"Simos, D.E., Kuhn, D.R., Voyiatzis, A., Kacker, R.N.: Combinatorial methods in security testing. IEEE Comput. 49, 80\u201383 (2016)","journal-title":"IEEE Comput."},{"key":"502_CR114","unstructured":"Sloane, N.J.A.: (Website) http:\/\/neilsloane.com\/oadir\/index.html"},{"key":"502_CR115","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1002\/jcd.3180010106","volume":"1","author":"NJA Sloane","year":"1973","unstructured":"Sloane, N.J.A.: Covering arrays and intersecting codes. J. Comb. Des. 1, 51\u201363 (1973). https:\/\/doi.org\/10.1002\/jcd.3180010106","journal-title":"J. Comb. Des."},{"key":"502_CR116","doi-asserted-by":"publisher","unstructured":"Smith, R., Jarman, D., Kuhn, D. R., Kacker, R. N., Simos, D., Kampel, L., Leithner, M., Gosney, G.: Applying combinatorial testing to large-scale data processing at Adobe. In: Proceedings of the 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Xian, China, April 22\u201323, 2019, pp.190\u2013193 (2019). https:\/\/doi.org\/10.1109\/ICSTW.2019.00051","DOI":"10.1109\/ICSTW.2019.00051"},{"key":"502_CR117","volume-title":"Statistical Methods","author":"GW Snedecor","year":"1980","unstructured":"Snedecor, G.W., Cochran, W.G.: Statistical Methods, 7th edn. Iowa State University Press, Ames (1980)","edition":"7"},{"key":"502_CR118","doi-asserted-by":"publisher","unstructured":"Su, T., Wu, K., Miao, W., Pu, G., He, J., Chen, Y., Su, Z.: A survey on data-flow testing. ACM Computing Surveys 50, Article 5 (2017). https:\/\/doi.org\/10.1145\/3020266","DOI":"10.1145\/3020266"},{"key":"502_CR119","unstructured":"Taguchi, G.: System of Experimental Design, Vol 1 and 2. Maruzen, Japan (in Japanese) (1977)"},{"key":"502_CR120","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/32.979992","volume":"28","author":"KC Tai","year":"2002","unstructured":"Tai, K.C., Lei, Y.: A test generation strategy for pairwise testing. IEEE Transactions on Software Engineering 28, 109\u2013111 (2002). https:\/\/doi.org\/10.1109\/32.979992","journal-title":"IEEE Transactions on Software Engineering"},{"key":"502_CR121","doi-asserted-by":"publisher","unstructured":"Tao, J., Li, Y., Wotawa, F., Felbinger, H., Nica, M.: On the industrial application of combinatorial testing for autonomous driving functions. In: Proceedings of the 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Xian, China, April 22\u201323, 2019, pp. 234-240 (2019). https:\/\/doi.org\/10.1109\/ICSTW.2019.00058","DOI":"10.1109\/ICSTW.2019.00058"},{"key":"502_CR122","unstructured":"Tatsumi, K.: Test-case design support system. In: Proceedings of the International Conference on Quality Control, Tokyo, Japan, pp. 615\u2013620 (1987)"},{"key":"502_CR123","unstructured":"Tatsumi, K., Watanabe, S., Takeuchi, Y., Shimokawa, H.: Conceptual support for test case design. In: Proceedings of 11th IEEE Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, October 1987, pp. 285\u2013290 (1987)"},{"key":"502_CR124","unstructured":"Torres-Jimenez (Website) https:\/\/www.tamps.cinvestav.mx\/~oc\/"},{"key":"502_CR125","doi-asserted-by":"publisher","unstructured":"Torres-Jimenez, Izquierdo-Marquez: Survey of covering arrays. In: Proceedings of 2013 IEEE International Symposium and Numeric Algorithms for Scientific Computing (SYNASC), Timisoara, Romania, September 23\u201326, 2013, pp. 20\u201327 (2013). https:\/\/doi.org\/10.1109\/SYNASC.2013.10","DOI":"10.1109\/SYNASC.2013.10"},{"key":"502_CR126","doi-asserted-by":"publisher","unstructured":"Voas, J., Kuhn, D.R., Laplante, P.: Testing IoT systems. In: Proceedings of the 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE), Bamberg, Germany, March 26\u201329, 2018, pp. 48\u201352 (2018). https:\/\/doi.org\/10.1109\/SOSE.2018.00015","DOI":"10.1109\/SOSE.2018.00015"},{"key":"502_CR127","doi-asserted-by":"publisher","unstructured":"Wagner, M., Kleine, K., Simos, D.E., Kuhn, D.R., Kacker, R.N.: CAGEN: a fast combinatorial test generation tool with support for constraints and higher-index arrays. In: 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Porto, Portugal, October 24\u201328, 2020, pp. 191\u2013200 (2020). https:\/\/doi.org\/10.1109\/ICSTW50294.2020.00041","DOI":"10.1109\/ICSTW50294.2020.00041"},{"key":"502_CR128","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1142\/S021853930100058X","volume":"8","author":"DR Wallace","year":"2001","unstructured":"Wallace, D.R., Kuhn, D.R.: Failure modes in medical device software: an analysis of 15 years of recall data. Int. J. Reliab. Qual. Saf Eng. 8, 351\u2013371 (2001). https:\/\/doi.org\/10.1142\/S021853930100058X","journal-title":"Int. J. Reliab. Qual. Saf Eng."},{"key":"502_CR129","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TSE.2016.2521368","volume":"42","author":"W Wong","year":"2016","unstructured":"Wong, W., Gao, R., Li, Y., Abreu, R., Wotawa, F.: A survey on software fault localization. IEEE Trans. Softw. Eng. 42, 707\u2013740 (2016). https:\/\/doi.org\/10.1109\/TSE.2016.2521368","journal-title":"IEEE Trans. Softw. Eng."},{"key":"502_CR130","doi-asserted-by":"publisher","unstructured":"Wotawa, F.: On the automation of security testing. In: Proceedings of the 2016 IEEE International Conference on Software Security and Assurance (ICSSA), St. Polten, Austria, August 24\u201325, 2016, pp. 11\u201316 (2016). https:\/\/doi.org\/10.1109\/ICSSA.2016.9","DOI":"10.1109\/ICSSA.2016.9"},{"key":"502_CR131","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/s00502-018-0630-7","volume":"135","author":"F Wotawa","year":"2018","unstructured":"Wotawa, F., Peischl, B., Klueck, F., Nica, M.: Quality assurance methodologies for automated driving. e & i Elektrotechnik und Informationstechnik 135, 322\u2013327 (2018). https:\/\/doi.org\/10.1007\/s00502-018-0630-7","journal-title":"e & i Elektrotechnik und Informationstechnik"},{"key":"502_CR132","volume-title":"Experiments: Planning, Analysis, and Optimization","author":"CF Wu","year":"2009","unstructured":"Wu, C.F., Hamada, M.S.: Experiments: Planning, Analysis, and Optimization, 2nd edn. Wiley, New York (2009)","edition":"2"},{"key":"502_CR133","doi-asserted-by":"publisher","unstructured":"Wu, H., Nie, C., Petke, J., Jia, Y., Harman, M.: Comparative analysis of constraint handling techniques for constrained combinatorial testing. IEEE Transactions on Software Engineering (Early Access) (2019). https:\/\/doi.org\/10.1109\/TSE.2019.2955687","DOI":"10.1109\/TSE.2019.2955687"},{"key":"502_CR134","doi-asserted-by":"publisher","unstructured":"Xie, Q., Memon, A.: Designing and comparing automated test oracles for GUI-based software applications. ACM Trans. Softw. Eng. Methodol. (TOSEM) 16. Article 4 (2007). https:\/\/doi.org\/10.1145\/1189748.1189752","DOI":"10.1145\/1189748.1189752"},{"key":"502_CR135","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1016\/j.jss.2008.02.034","volume":"81","author":"J Yan","year":"2008","unstructured":"Yan, J., Zhang, Jian: A backtracking search tool for constructing combinatorial test suites. J. Syst,. Softw. 81, 1681\u20131693 (2008). https:\/\/doi.org\/10.1016\/j.jss.2008.02.034","journal-title":"J. Syst,. Softw."},{"key":"502_CR136","doi-asserted-by":"publisher","unstructured":"Yang, J., Zhang, H., Fu, J.: A fuzzing framework based on symbolic execution and combinatorial testing. In: Proceedings of the 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Beijing, China, August 20\u201323, 2013, pp. 2076-2080 (2013). https:\/\/doi.org\/10.1109\/GreenCom-iThings-CPSCom.2013.389","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.389"},{"key":"502_CR137","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2006.8","volume":"32","author":"C Yilmaz","year":"2006","unstructured":"Yilmaz, C., Cohen, M., Porter, A.: Covering arrays for efficient fault characterization in complex configuration spaces. IEEE Trans. Softw. Eng. (TSE) 32, 20\u201334 (2006). https:\/\/doi.org\/10.1109\/TSE.2006.8","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"502_CR138","doi-asserted-by":"publisher","unstructured":"Yu, L., Lei, Y., Kacker, R.N., Kuhn, D.R.: ACTS: a combinatorial test generation tool. In: Proceedings of the 2013 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Luxembourg, March 18\u201322, 2013, pp. 370\u2013375 (2013). https:\/\/doi.org\/10.1109\/ICST.2013.52","DOI":"10.1109\/ICST.2013.52"},{"key":"502_CR139","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/32.988498","volume":"28","author":"A Zeller","year":"2002","unstructured":"Zeller, A., Hildebrandt, R.: Simplifying and isolating failure-inducing input. IEEE Trans. Softw. Eng.(TSE) 28, 183\u2013200 (2002). https:\/\/doi.org\/10.1109\/32.988498","journal-title":"IEEE Trans. Softw. Eng.(TSE)"},{"key":"502_CR140","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Liu, X., Zhang, J.: Combinatorial testing on ID3v2 tags of MP3 files. In: Proceedings of the 2012 IEEE International Conference on Software Testing, Verification and Validation, Workshops (ICSTW), Montreal, QC, Canada, April 17\u201321, 2012, pp. 587\u2013590 (2012). https:\/\/doi.org\/10.1109\/ICST.2012.145","DOI":"10.1109\/ICST.2012.145"},{"key":"502_CR141","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Zhang, J.: Characterizing failure-causing parameter interactions by adaptive testing. In; Proceedings of the 2011 ACM International Symposium on Software Testing and Analysis (ISSTA), Toronto, ON, Canada, July 17\u201321, 2011, pp. 331\u2013341 (2011). https:\/\/doi.org\/10.1145\/2001420.2001460","DOI":"10.1145\/2001420.2001460"},{"key":"502_CR142","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MSP.2009.56","volume":"7","author":"M Zhivich","year":"2009","unstructured":"Zhivich, M., Cunnigham, R.: The real cost of software errors. IEEE Privacy Secur. 7, 87\u201390 (2009). https:\/\/doi.org\/10.1109\/MSP.2009.56","journal-title":"IEEE Privacy Secur."}],"updated-by":[{"updated":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"DOI":"10.1007\/s11786-021-00516-1","type":"correction","label":"Correction"}],"container-title":["Mathematics in Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11786-021-00502-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11786-021-00502-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11786-021-00502-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T04:19:02Z","timestamp":1633753142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11786-021-00502-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,12]]},"references-count":142,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["502"],"URL":"https:\/\/doi.org\/10.1007\/s11786-021-00502-7","relation":{},"ISSN":["1661-8270","1661-8289"],"issn-type":[{"value":"1661-8270","type":"print"},{"value":"1661-8289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,12]]},"assertion":[{"value":"29 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2021","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Modified some of the text.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2021","order":8,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":9,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":10,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11786-021-00516-1","URL":"https:\/\/doi.org\/10.1007\/s11786-021-00516-1","order":11,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}