researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
2011
2012
2013
2014
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
analysis
architecture
classification
composition
coverage
design
graph-rewriting
meta-model
modeling
open-source
reliability
rewriting
rule-based
security
software architecture
source-to-source
systematic-approach
testing
Filter by Author
[+]
OR
AND
NOT
1
Angelos Stavrou
Bin Gu
Dianxiang Xu
Donghui Guo
Fevzi Belli
Hasan Sözer
Hsiao-Ying Lin
JingZheng Wu
Jongmoon Baik
Liping Ding
Mohammad Zulkernine
Shiuhpyng Shieh
Vidroha Debroy
W. Eric Wong
Wei Dong
Xuandong Li
Yanjun Wu
Yixiang Chen
Yongji Wang
Yu-Lun Huang
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
approach
automatic
case
data
embedded
fault
generation
method
model
modeling
reliability
security
software
system
systems
test
testing
using
verification
SSIRI (ssiri)
Editions
Publications
Viewing Publication 1 - 100 from 433
2014
Eighth International Conference on Software Security and Reliability, SERE 2014, San Francisco, California, USA, June 30 - July 2, 2014
IEEE,
2014.
[doi]
IEEE Eighth International Conference on Software Security and Reliability, SERE 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume
IEEE,
2014.
[doi]
Software Reliability Virtual Testing for Reliability Assessment
Jun Ai
,
Hanyu Pei
,
Liang Yan
.
ssiri 2014
:
71-77
[doi]
Classification of Partially Labeled Malicious Web Traffic in the Presence of Concept Drift
Goce Anastasovski
,
Katerina Goseva-Popstojanova
.
ssiri 2014
:
130-139
[doi]
Estimating the Accuracy of Dynamic Change-Impact Analysis Using Sensitivity Analysis
Haipeng Cai
,
RaĂºl A. Santelices
,
Tianyu Xu
.
ssiri 2014
:
48-57
[doi]
FRanC: A Ranking Framework for the Prioritization of Software Maintenance
Dhyanesh Chaudhari
,
Mohammad Zulkernine
,
Komminist Weldemariam
.
ssiri 2014
:
31-40
[doi]
A Diversity Model Based on Failure Distribution and Its Application in Safety Cases
Luping Chen
,
John May
.
ssiri 2014
:
1-10
[doi]
An Anomaly Detection Module for Firefox OS
Borting Chen
,
Ming-Wei Shih
,
Yu-Lun Huang
.
ssiri 2014
:
176-184
[doi]
A Hybrid Clock System Related to STeC Language
Yixinag Chen
,
Yuanrui Zhang
.
ssiri 2014
:
199-203
[doi]
A Parameters Tuning Algorithm in Wireless Networks
Hua-Ching Chen
,
Hsuan-Ming Feng
,
Ben Bin Chen
,
Dong-hui Guo
.
ssiri 2014
:
257-260
[doi]
Compiler Assisted Instruction Relocation for Performance Improvement of Cache Hit Rate and System Reliability
Benbin Chen
,
Lin Li
,
Yiyang Li
,
Hongyin Luo
,
Donghui Guo
.
ssiri 2014
:
243-246
[doi]
A Two-Stage Data Preprocessing Approach for Software Fault Prediction
Jiaqiang Chen
,
Shulong Liu
,
Wangshu Liu
,
Xiang Chen
,
Qing Gu
,
Daoxu Chen
.
ssiri 2014
:
20-29
[doi]
New Gen2v2-Based Mutual Authentication Schemes
Hung-Yu Chien
.
ssiri 2014
:
88-96
[doi]
Analysing Requirements to Detect Latent Security Vulnerabilities
Curtis C. R. Busby Earle
,
Robert B. France
,
Indrakshi Ray
.
ssiri 2014
:
168-175
[doi]
High Performance Java Card Operating System
Mohammad R. Eletriby
,
Mohamed Sobh
,
Ayman M. Bahaa Eldin
,
Hossam M. A. Fahmy
.
ssiri 2014
:
30-39
[doi]
BinClone: Detecting Code Clones in Malware
Mohammad Reza Farhadi
,
Benjamin C. M. Fung
,
Philippe Charland
,
Mourad Debbabi
.
ssiri 2014
:
78-87
[doi]
SeTGaM: Generalized Technique for Regression Testing Based on UML/OCL Models
Elizabeta Fourneret
,
JĂ©rĂ´me Cantenot
,
Fabrice Bouquet
,
Bruno Legeard
,
Julien Botella
.
ssiri 2014
:
147-156
[doi]
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems
Mariem Graa
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
,
Ana Cavalliy
.
ssiri 2014
:
149-157
[doi]
Virtual Machine Migration as a Fault Tolerance Technique for Embedded Real-Time Systems
Stefan Groesbrink
.
ssiri 2014
:
7-12
[doi]
A Qualitative Safety Analysis Method for AADL Model
Bin Gu
,
Yunwei Dong
,
Xiaomin Wei
.
ssiri 2014
:
213-217
[doi]
Specification of Dynamic Fault Tree Concepts with Stochastic Petri Nets
Lena Herscheid
,
Peter Tröger
.
ssiri 2014
:
177-186
[doi]
Effective Regression Testing Using Requirements and Risks
Charitha Hettiarachchi
,
Hyunsook Do
,
Byoungju Choi
.
ssiri 2014
:
157-166
[doi]
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust
Gerry Howser
,
Bruce McMillin
.
ssiri 2014
:
225-234
[doi]
MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment
Yen-Chun Hsu
,
Yu-Sung Wu
,
Tsung-Han Tsai
,
Yi Pin Chiu
,
Chih-Hung Lin
,
Zhi-Wei Chen
.
ssiri 2014
:
97-106
[doi]
Providing Hardware Redundancy for Highly Available Services in Virtualized Environments
Azadeh Jahanbanifar
,
Ferhat Khendek
,
Maria Toeroe
.
ssiri 2014
:
40-47
[doi]
How Accurate Is Dynamic Program Slicing? An Empirical Approach to Compute Accuracy Bounds
Siyuan Jiang
,
RaĂºl A. Santelices
,
Haipeng Cai
,
Mark Grechanik
.
ssiri 2014
:
3-4
[doi]
An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval
Kuo-Fong Kao
,
Wen-Ching Chen
,
Jui-Chi Chang
,
Heng-Te Chu
.
ssiri 2014
:
1-2
[doi]
Collision Analysis of Safety Devices to Prevent Hazards in Safety Critical Systems
Jang Jin Kwon
,
Doohwan Kim
,
Jae Jin Park
,
Jang-Eui Hong
.
ssiri 2014
:
245-254
[doi]
Traceability-Based Formal Specification Inspection
Mo Li
,
Shaoying Liu
.
ssiri 2014
:
167-176
[doi]
Detecting DoS Attacks on Notification Services
J. Jenny Li
,
Tony Savor
.
ssiri 2014
:
192-198
[doi]
Analysis of System Reliability for Cache Coherence Scheme in Multi-processor
Sizhao Li
,
Shan Lin
,
Deming Chen
,
W. Eric Wong
,
Donghui Guo
.
ssiri 2014
:
247-251
[doi]
A Light-Weight Software Environment for Confining Android Malware
Xiaolei Li
,
Guangdong Bai
,
Benjamin Thian
,
Zhenkai Liang
,
Heng Yin
.
ssiri 2014
:
158-167
[doi]
Diagnosis-Guided Regression Test Refinement
J. Jenny Li
,
Patricia Morreale
,
John Douglas Palframan
.
ssiri 2014
:
64-70
[doi]
ADAutomation: An Activity Diagram Based Automated GUI Testing Framework for Smartphone Applications
Ang Li
,
Zishan Qin
,
Mingsong Chen
,
Jing Liu
.
ssiri 2014
:
68-77
[doi]
Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems
Chung-Yi Lin
,
Wen-Guey Tzeng
.
ssiri 2014
:
187-195
[doi]
Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage Systems
Hsiao-Ying Lin
,
Li-Ping Tung
,
Bao-Shuh Paul Lin
.
ssiri 2014
:
235-244
[doi]
Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison
Yen Ju Liu
,
Chong Kuan Chen
,
Michael Cheng Yi Cho
,
Shiuhpyng Shieh
.
ssiri 2014
:
196-205
[doi]
Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS
Niansheng Liu
,
Huaiyu Dai
,
Donghui Guo
.
ssiri 2014
:
237-242
[doi]
Robustness and Fragility of a New Local-World Dynamical Network Model
Peizhong Liu
,
Minghang Wang
,
Ping Li
.
ssiri 2014
:
261-265
[doi]
Using Network Tainting to Bound the Scope of Network Ingress Attacks
Peter Mell
,
Richard E. Harang
.
ssiri 2014
:
206-215
[doi]
Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
Farzana Rahman
,
Md. Osman Gani
,
Golam Mushih Tanimul Ahsan
,
Sheikh Iqbal Ahamed
.
ssiri 2014
:
121-129
[doi]
On Coverage-Based Attack Profiles
Anthony Thyron Rivers
,
Mladen A. Vouk
,
Laurie A. Williams
.
ssiri 2014
:
5-6
[doi]
A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks
Amna Saeed
,
Asad Raza
,
Haider Abbas
.
ssiri 2014
:
185-191
[doi]
Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution
Ting Su
,
Geguang Pu
,
Bin Fang
,
Jifeng He
,
Jun Yan
,
Siyuan Jiang
,
Jianjun Zhao
.
ssiri 2014
:
98-107
[doi]
The Impact of Static and Dynamic Pairs on Pair Programming
Rajendran Swamidurai
,
David Umphress
.
ssiri 2014
:
57-63
[doi]
Probabilistic Cycle Detection for Schneie's Solitaire Keystream Algorithm
Wiem Tounsi
,
Benjamin Justus
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
,
JoaquĂn GarcĂa-Alfaro
.
ssiri 2014
:
113-120
[doi]
TaaS (Testing-as-a-Service) Design for Combinatorial Testing
Wei-Tek Tsai
,
Guanqiu Qi
,
Lian Yu
,
Jerry Gao
.
ssiri 2014
:
127-136
[doi]
A Load Scheduling Strategy for Electric Vehicles Charging System
Zheng Wang
,
Xiao Wu
,
Hongbin Zhao
.
ssiri 2014
:
218-222
[doi]
Automatic Numerical Analysis Based on Infinite-Precision Arithmetic
Shuai Wei
,
Enyi Tang
,
Tianyu Liu
,
Norbert Th. MĂ¼ller
,
Zhenyu Chen
.
ssiri 2014
:
216-224
[doi]
Evaluating Software Safety Standards: A Systematic Review and Comparison
W. Eric Wong
,
Tej Gidvani
,
Alfonso-Lopez
,
Ruizhi Gao
,
Matthew Horn
.
ssiri 2014
:
78-87
[doi]
The Influence of Developer Quality on Software Fault-Proneness Prediction
Yangsong Wu
,
Yibiao Yang
,
Yangyang Zhao
,
Hongmin Lu
,
Yuming Zhou
,
Baowen Xu
.
ssiri 2014
:
11-19
[doi]
Automatic Test Data Generation for Unit Testing to Achieve MC/DC Criterion
Tianyong Wu
,
Jun Yan
,
Jian Zhang 0001
.
ssiri 2014
:
118-126
[doi]
Specification and Analysis of Attribute-Based Access Control Policies: An Overview
Dianxiang Xu
,
Yunpeng Zhang
.
ssiri 2014
:
41-49
[doi]
Rule-Based Test Input Generation from Bytecode
Weifeng Xu
,
Tao Ding
,
Dianxiang Xu
.
ssiri 2014
:
108-117
[doi]
A-R Exploit: An Automatic ROP Exploit Based on Long Sequence
Chao Yang
,
Tao Zheng
,
Zhitian Lin
.
ssiri 2014
:
50-56
[doi]
A Proof System in Process Algebra for Demand and Supply
Xinghua Yao
,
Yixiang Chen
.
ssiri 2014
:
228-236
[doi]
CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution
Chao-Chun Yeh
,
Han-Lin Lu
,
Chun-Yen Chen
,
Kee Kiat Khor
,
Shih-Kun Huang
.
ssiri 2014
:
140-148
[doi]
System Call Anomaly Detection Using Multi-HMMs
Esra N. Yolacan
,
Jennifer G. Dy
,
David R. Kaeli
.
ssiri 2014
:
25-30
[doi]
Using Software Structure to Predict Vulnerability Exploitation Potential
Awad A. Younis
,
Yashwant K. Malaiya
.
ssiri 2014
:
13-18
[doi]
Generating Test Cases for Context-Aware Applications Using Bigraphs
Lian Yu
,
Wei-Tek Tsai
,
Yanbing Jiang
,
Jerry Gao
.
ssiri 2014
:
137-146
[doi]
A Predictive Runtime Verification Framework for Cyber-Physical Systems
Kang Yu
,
Zhenbang Chen
,
Wei Dong
.
ssiri 2014
:
223-227
[doi]
A Multi-function Error Detection Policy to Enhance Communication Integrity in Critical Embedded Systems
Amira Zammali
,
Agnan de Bonneval
,
Yves Crouzet
.
ssiri 2014
:
19-24
[doi]
Security Test Generation by Answer Set Programming
Philipp Zech
,
Michael Felderer
,
Basel Katt
,
Ruth Breu
.
ssiri 2014
:
88-97
[doi]
Post-condition-Directed Invariant Inference for Loops over Data Structures
Juan Zhai
,
Hanfei Wang
,
Jianhua Zhao
.
ssiri 2014
:
204-212
[doi]
Defending ROP Attacks Using Basic Block Level Randomization
Xun Zhan
,
Tao Zheng
,
Shixiang Gao
.
ssiri 2014
:
107-112
[doi]
AppMark: A Picture-Based Watermark for Android Apps
Yingjun Zhang
,
Kai Chen
.
ssiri 2014
:
58-67
[doi]
Multiphysics Modeling and Characterization of MicroCVD Chip for Growing Carbon Nanomaterials
Long Zheng
,
Yangbing Wu
,
Dan Zhang
,
Liwei Lin
,
Donghui Guo
.
ssiri 2014
:
252-256
[doi]
2013
IEEE 7th International Conference on Software Security and Reliability, SERE 2013, Gaithersburg, MD, USA, June 18-20, 2013
IEEE,
2013.
[doi]
Seventh International Conference on Software Security and Reliability, SERE 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion Volume
IEEE,
2013.
[doi]
PHP+MySQL Based Online Examination System with Power Failure Handling and Dropbox Capability
Afzaal Ahmad
,
Noor Ullah Khan
,
Arbab Waseem Abbas
.
ssiri 2013
:
21-25
[doi]
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques
Ahmed AlEroud
,
George Karabatis
.
ssiri 2013
:
159-168
[doi]
An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
Ali Can Atici
,
Cemal Yilmaz
,
Erkay Savas
.
ssiri 2013
:
74-83
[doi]
Dependability and Software Reuse - Coupling Them by an Industrial Standard
Fevzi Belli
.
ssiri 2013
:
145-154
[doi]
Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation
Amiangshu Bosu
,
Jeffrey C. Carver
.
ssiri 2013
:
229-230
[doi]
Multi-channel Change-Point Malware Detection
Raymond Canzanese
,
Moshe Kam
,
Spiros Mancoridis
.
ssiri 2013
:
70-79
[doi]
A Performance Mapping Model for Physical-to-Virtual Migration
Borting Chen
,
Chien-Yu Lai
,
Yu-Lun Huang
.
ssiri 2013
:
90-98
[doi]
Improving Service Diagnosis through Increased Monitoring Granularity
Cuiting Chen
,
Hans-Gerhard Gross
,
Andy Zaidman
.
ssiri 2013
:
129-138
[doi]
Vulnerability-Based Backdoors: Threats from Two-step Trojans
Kai Chen
,
Yingjun Zhang
,
Yifeng Lian
.
ssiri 2013
:
169-177
[doi]
Of Massive Static Analysis Data
Aurélien Delaitre
,
Vadim Okun
,
Elizabeth Fong
.
ssiri 2013
:
163-167
[doi]
HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data
Baozeng Ding
,
Yeping He
,
Yanjun Wu
,
Yuqi Lin
.
ssiri 2013
:
26-34
[doi]
hGuard: A Framework to Measure Hypervisor Critical Files
Baozeng Ding
,
Yeping He
,
Qiming Zhou
,
Yanjun Wu
,
JingZheng Wu
.
ssiri 2013
:
176-181
[doi]
Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware
Chia-Wei Hsu
,
Fan-Syun Shih
,
Chi-Wei Wang
,
Shiuhpyng Winston Shieh
.
ssiri 2013
:
80-89
[doi]
Context-Aware Policy Enforcement for Android
Christian Jung
,
Denis Feth
,
Christian Seise
.
ssiri 2013
:
40-49
[doi]
Software Reliability Modeling and Evaluation under Incomplete Knowledge on Fault Distribution
Toshio Kaneishi
,
Tadashi Dohi
.
ssiri 2013
:
3-12
[doi]
Automating Service Availability Analysis: An Application to a Highly Available Media-Streaming Service
Ali Kanso
,
Mario Toeroe
,
Ferhat Khendek
.
ssiri 2013
:
94-101
[doi]
Exploiting Neigborhood Similarity for Virtual Machine Migration over Wide-Area Network
Hsu-Fang Lai
,
Yu-Sung Wu
,
Yu-Jui Cheng
.
ssiri 2013
:
149-158
[doi]
A New Security Metric for SOA Implementations
Dave Larson
,
Jigang Liu
.
ssiri 2013
:
102-108
[doi]
An Empirical Study on Data Retrievability in Decentralized Erasure Code Based Distributed Storage Systems
Hsiao-Ying Lin
,
Li-Ping Tung
,
Bao-Shuh Paul Lin
.
ssiri 2013
:
30-39
[doi]
Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation
Yuqi Lin
,
Liping Ding
,
JingZheng Wu
,
Yalong Xie
,
Yongji Wang
.
ssiri 2013
:
45-52
[doi]
A Categorical Approach for Modeling and Verifying Dynamic Software Architecture
Xiang Ling
.
ssiri 2013
:
168-175
[doi]
Method for Evaluating k-Means Clustering for Increased Reliability in Cognitive Radio Networks
Ryan K. McLean
,
Mark D. Silvius
,
Kenneth M. Hopkinson
.
ssiri 2013
:
99-108
[doi]
Reliability Models Applied to Mobile Applications
Sonia Meskini
,
Ali Bou Nassif
,
Luiz Fernando Capretz
.
ssiri 2013
:
155-162
[doi]
Hierarchal Identity Based Socket for Datacenters
Tarun Sen
,
Sateesh K. Peddoju
.
ssiri 2013
:
63-67
[doi]
Light-Weight CSRF Protection by Labeling User-Created Contents
Yin-Chang Sung
,
Michael Cheng Yi Cho
,
Chi-Wei Wang
,
Chia-Wei Hsu
,
Shiuhpyng Winston Shieh
.
ssiri 2013
:
60-69
[doi]
Designing an Enterprise Security Strategy for Mobile Intranet Access
Matthias Trojahn
,
Frank Ortmeier
.
ssiri 2013
:
8-15
[doi]
Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability
Manghui Tu
,
Liangliang Xiao
,
Dianxiang Xu
.
ssiri 2013
:
178-187
[doi]
Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing
JingZheng Wu
,
Yanjun Wu
,
Zhifei Wu
,
Mutian Yang
,
Yongji Wang
.
ssiri 2013
:
225-226
[doi]
A Practical Model for Rating Software Security
Haiyun Xu
,
Jeroen Heijmans
,
Joost Visser
.
ssiri 2013
:
231-232
[doi]
Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience
Mutian Yang
,
JingZheng Wu
,
Yanjun Wu
,
Zhifei Wu
.
ssiri 2013
:
227-228
[doi]
Moving and Relocating: A Logical Framework of Service Migration for Software System Survivability
Yanjun Zuo
.
ssiri 2013
:
139-148
[doi]
Sign in
or
sign up
to see more results.