Abstract is missing.
- Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability ExploitabilityAwad A. Younis, Yashwant K. Malaiya, Indrajit Ray. 1-8 [doi]
- Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication SystemsZahid Syed, Sean Banerjee, Bojan Cukic. 9-16 [doi]
- A Model-Based Intrusion Detection System for Smart MetersFarid Molazem Tabrizi, Karthik Pattabiraman. 17-24 [doi]
- Evaluating Distortion in Fault Injection ExperimentsErik van der Kouwe, Cristiano Giuffrida, Andrew S. Tanenbaum. 25-32 [doi]
- A Practitioner's Guide to Software-Based Soft-Error Mitigation Using AN-CodesMartin Hoffmann, Peter Ulbrich, Christian Dietrich, Horst Schirmeier, Daniel Lohmann, Wolfgang Schröder-Preikschat. 33-40 [doi]
- ArCMAPE: A Software Product Line Infrastructure to Support Fault-Tolerant Composite ServicesAmanda Sávio Nascimento, Cecília M. F. Rubira, Fernando Castor. 41-48 [doi]
- Fail-Safe Test Generation in Safety Critical SystemsAnneliese Amschler Andrews, Salwa Elakeili, Salah Boukhris. 49-56 [doi]
- Making an ALARP Decision of Sufficient TestingMahnaz Malekzadeh, Iain Bate. 57-64 [doi]
- Combinatorial Test Generation for Software Product Lines Using Minimum Invalid TuplesLinbin Yu, Feng Duan, Yu Lei, Raghu Kacker, D. Richard Kuhn. 65-72 [doi]
- Modeling and Verification of Humanoid Robot Task CoordinationYujian Fu, Steven Drager. 73-80 [doi]
- Temporal Verification of Simulink DiagramsJiri Barnat, Petr Bauch, Vojtech Havel. 81-88 [doi]
- Proving the Fidelity of Simulations of Event-B ModelsFaqing Yang, Jean-Pierre Jacquot, Jeanine Souquières. 89-96 [doi]
- A Novel Framework of Software Reliability Evaluation with Software Reliability Growth Models and Software MetricsHiroyuki Okamura, Tadashi Dohi. 97-104 [doi]
- Towards Comprehensive Modeling of Reliability for Smart Grids: Requirements and ChallengesKoosha Marashi, Sahra Sedigh Sarvestani. 105-112 [doi]
- An Empirical Failure-Analysis of a Large-Scale Cloud Computing EnvironmentPeter Garraghan, Paul Townend, Jie Xu. 113-120 [doi]
- Assuring Safety for Component Based Software EngineeringPhilippa Conmy, Iain Bate. 121-128 [doi]
- Analysis of Critical Systems CertificationPanayiotis Steele, John Knight. 129-136 [doi]
- Using Program Transformation, Annotation, and Reflection to Certify a Java Type Resolution FunctionVictor L. Winter, Carl Reinke, Jonathan Guerrero. 137-145 [doi]
- Policy-Driven High Assurance Cyber Infrastructure-Based SystemsAbdulrahman Almutairi, Tawfeeq A. Shawly, Saleh Basalamah, Arif Ghafoor. 146-153 [doi]
- Autonomous Decentralized High-Assurance Surveillance System for Air Traffic ControlTadashi Koga, Xiaodong Lu, Kinji Mori. 154-157 [doi]
- Mobile Testing-as-a-Service (MTaaS) - Infrastructures, Issues, Solutions and NeedsJerry Gao, Wei-Tek Tsai, Raymond A. Paul, Xiaoying Bai, Tadahiro Uehara. 158-167 [doi]
- UML-Based Modeling of Robustness TestingRegina Moraes, Hélène Waeselynck, Jérémie Guiochet. 168-175 [doi]
- Testing of Memory Leak in Android ApplicationsHossain Shahriar, Sarah North, Edward Mawangi. 176-183 [doi]
- Trade-Off Analysis for Selective versus Brute-Force Regression Testing in FSMWebAnneliese Amschler Andrews, Hyunsook Do. 184-192 [doi]
- Hardware Implementation of Secure Shamir's Secret Sharing SchemePei Luo, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky. 193-200 [doi]
- Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of ViewTakao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya. 201-205 [doi]
- Clicksafe: Providing Security against Clickjacking AttacksJawwad A. Shamsi, Sufian Hameed, Waleed Rahman, Farooq Zuberi, Kaiser Altaf, Ammar Amjad. 206-210 [doi]
- Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex SystemJesse Musgrove, Bojan Cukic, Vittorio Cortellessa. 211-215 [doi]
- On the Need for Training Failure Prediction Algorithms in Evolving Software SystemsIvano Irrera, João Durães, Marco Vieira. 216-223 [doi]
- Adaptive Testing of Nondeterministic Systems with FSMAlexandre Petrenko, Nina Yevtushenko. 224-228 [doi]
- Verifying the Precedence Property Pattern Using the B MethodAmel Mammar, Marc Frappier. 229-233 [doi]
- Using Flash to Tolerate Track Failures in RAIDZheng Chen, Allen McBride. 234-235 [doi]
- PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare ServicesFarzana Rahman, Drew Williams, Sheikh Iqbal Ahamed, Ji-Jiang Yang, Qing Wang. 236-242 [doi]
- Recommender Systems for Privacy Management: A FrameworkCurtis Rasmussen, Rozita Dara. 243-244 [doi]
- On the Nature and Content of Safety ContractsPatrick J. Graydon, Iain Bate. 245-246 [doi]
- Functional Alarms for Systems of Interoperable Medical DevicesKrishna K. Venkatasubramanian, Eugene Y. Vasserman, Oleg Sokolsky, Insup Lee. 247-248 [doi]
- Inferring Approximated Models for Systems EngineeringAlexandre Petrenko, Keqin Li 0002, Roland Groz, Karim Hossen, Catherine Oriat. 249-253 [doi]
- Zero-Knowledge Evaluation of Service Performance Based on SimulationClaudio Agostino Ardagna, Ernesto Damiani, Kouessi A. R. Sagbo, Fulvio Frati. 254-258 [doi]
- Ordering Upgrade Changes for Highly Available Component Based SystemsAli Davoudian, Ferhat Khendek, Maria Toeroe. 259-260 [doi]
- Modeling the Interaction of Power Line and SCADA NetworksYuki Matsui, Hideharu Kojima, Tatsuhiro Tsuchiya. 261-262 [doi]