Abstract is missing.
- Virtual Machine Replay Update: Improved Implementation for Modern Hardware ArchitectureJiageng Yu, Peng Zhou, Yanjun Wu, Chen Zhao. 1-6 [doi]
- Integrating Network Cryptography into the Operating SystemAnthony Gabrielson, Haim Levkowitz. 7-11 [doi]
- A Novel Security Scheme for Online Banking Based on Virtual MachineBei Guan, Yanjun Wu, Yongji Wang. 12-17 [doi]
- A Survey of Software Testing in the CloudKoray Inçki, Ismail Ari, Hasan Sözer. 18-23 [doi]
- A Novel Method for Modeling Complex Network of Software System SecurityHailin Li, Yadi Wang, Jihong Han. 24-26 [doi]
- Thinking Towards a Pattern Language for Predicate Based Encryption Crypto-SystemsJan de Muijnck-Hughes, Ishbel Duncan. 27-32 [doi]
- Hybrid Bayesian Network Models for Predicting Software ReliabilityMark R. Blackburn, Benjamin Huddell. 33-34 [doi]
- A Framework for Automated Security Testing of Android Applications on the CloudSam Malek, Naeem Esfahani, Thabet Kacem, Riyadh Mahmood, Nariman Mirzaei, Angelos Stavrou. 35-36 [doi]
- Path-oriented Test Data Generation Driven by Component Linear Fitting FunctionsWenxu Ding, Xin Chen, Peng Jiang, Nan Ye, Lei Bu, Xuandong Li. 37-38 [doi]
- Intelligent Biological Security Testing AgentsIshbel MacDonald Duncan. 41-42 [doi]
- Attestation & Authentication for USB CommunicationsZhaohui Wang, Angelos Stavrou. 43-44 [doi]
- Analysis of Android Applications' PermissionsRyan Johnson, Zhaohui Wang, Corey Gagnon, Angelos Stavrou. 45-46 [doi]
- Towards a Model Based Security Testing Approach of Cloud Computing EnvironmentsPhilipp Zech, Michael Felderer, Ruth Breu. 47-56 [doi]
- Designing System Security with UML Misuse Deployment DiagramsSusan J. Lincke, Timothy H. Knautz, Misty D. Lowery. 57-61 [doi]
- A Proposal to Prevent Click-Fraud Using Clickable CAPTCHAsRodrigo Alves Costa, Ruy J. G. B. de Queiroz, Elmano Ramalho Cavalcanti. 62-67 [doi]
- Comparing Static Security Analysis Tools Using Open Source SoftwareRyan K. McLean. 68-74 [doi]
- Undesirable Aspect Interactions: A Prevention Policy for Three Aspect Fault TypesArsène Sabas, Subash Shankar, Virginie Wiels, Michel Boyer. 75-84 [doi]
- Revising a Security Tactics Hierarchy through Decomposition, Reclassification, and DerivationJungwoo Ryoo, Phillip A. Laplante, Rick Kazman. 85-91 [doi]
- Enforcement of Role Based Access Control in Social Network EnvironmentsJunhua Ding, Lian Mo. 92-101 [doi]
- Mapping of Security Concerns in Design to Security Aspects in CodeChase Baker, Michael Shin. 102-110 [doi]
- Secure PC Platform Based on Dual-Bus ArchitectureHeshem A. El Zouka. 111-118 [doi]
- A Privacy Preserving Smart Metering System Supporting Multiple Time GranularitiesHsiao-Ying Lin, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin. 119-126 [doi]
- An Investigation of Classification-Based Algorithms for Modified Condition/Decision Coverage CriteriaJun-Ru Chang, Chin-Yu Huang, Po-Hsi Li. 127-136 [doi]
- Lattice-Valued Kripke Structures Based on Complete Residuated LatticeHaiyu Pan, Min Zhang, Yixiang Chen. 137-143 [doi]
- Invalid Pointer Dereferences Detection for CPS Software Based on Extended Pointer StructuresLongming Dong, Wei Dong, Liqian Chen. 144-151 [doi]
- Modeling and Simulating CAN-Based Cyber-Physical Systems in ModelicaLiping Chen, Xiaoping Wang, Xiong Gong, Hongchang Zhang, Fanli Zhou, Bin Gu, Lei Wang. 152-157 [doi]
- A New Approach of Partial Order Reduction Technique for Parallel Timed Automata Model CheckingXiaoyu Zhou, Qian Li, Jianhua Zhao. 158-167 [doi]
- Bodhi: Detecting Buffer Overflows with a GameJie Chen, Xiaoguang Mao. 168-173 [doi]
- Study of Safety Analysis and Assessment Methodology for AADL ModelDeming Song, Yunwei Dong, Fan Zhang, Hong Huo, Bin Gu. 174-183 [doi]
- Hazardous Chemicals Vehicles Rollover Pre-warning System Based on CPSXuesong Cai, Junwei Wu. 184-187 [doi]
- Cyber-physical Systems Modeling Method Based on ModelicaJunjie Tang, Jianjun Zhao, Jianwan Ding, Liping Chen, Gang Xie, Bin Gu, Mengfei Yang. 188-191 [doi]
- Software Testing of Business ApplicationsVijay Sampath, Vipul Shah. 192 [doi]
- Paradigm in Verification of Access ControlJeeHyun Hwang, Vincent C. Hu, Tao Xie. 193 [doi]
- Viewpoint-based Test Architecture DesignYasuharu Nishi. 194-197 [doi]
- Testing is an Event-Centric ActivityFevzi Belli, Mutlu Beyazit, Atif M. Memon. 198-206 [doi]
- Cost Reduction through Combining Test Sequences with Input DataBenedikt Kruger, Michael Linschulte. 207-216 [doi]