Abstract is missing.
- Using UML(VR) for Supporting the Automated Test Data GenerationDariusz Dymek, Leszek Kotulski. 3-8 [doi]
- Estimation of System Workload Time Characteristic Using UML Timing DiagramsDariusz Dymek, Leszek Kotulski. 9-14 [doi]
- Vulnerability Modelling for the Analysis of Network AttacksPaolo Maggi, Davide Pozza, Riccardo Sisto. 15-22 [doi]
- Fuzzy strategies in modeling effects of technological implementationsHenryk Piech. 23-30 [doi]
- Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol ModelsAlfredo Pironti, Riccardo Sisto. 31-38 [doi]
- XML Schema Based Faultset Definition to Improve Faults Injection Tools InteroperabilityAntonio da Silva, José-Fernán MartÃnez, Lourdes López, Ana Belén GarcÃa, Vicente Hernández. 39-46 [doi]
- A Language for Failure Patterns and Application in Safety AnalysisIan Wolforth, Martin Walker, Yiannis Papadopoulos. 47-54 [doi]
- Decision Diagrams for Reliability Analysis of Multi-State SystemElena N. Zaitseva, Vitaly G. Levashenko. 55-62 [doi]
- Method of Matrix Writing Constructing of Topological Structure of Computer NetworkLeonid Abrosimov, Sergey Kalashnikov, Matip Essounga Lazare. 65-72 [doi]
- Dependability Aspects of e-Learning SystemsAli Al-Dahoud, Tomasz Walkowiak, Marek Woda. 73-79 [doi]
- A Hardware-in-the-Loop Simulation Environment for Real-Time Systems Development and Architecture EvaluationVasily V. Balashov, Anatoly G. Bakhmurov, Maxim V. Chistolinov, Ruslan L. Smeliansky, Dmitry Yu. Volkanov, Nikita V. Youshchenko. 80-86 [doi]
- Fault Tolerant Algorithm for Functional and Data Flow Parallel Programs Performance on ClustersS. E. Bazhanov, S. V. Bogdanets, V. P. Kutepov. 87-94 [doi]
- Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards ApplicationLukasz Cyra, Janusz Górski. 95-102 [doi]
- An Approach to Evaluation of Arguments in Trust CasesLukasz Cyra, Janusz Górski. 103-110 [doi]
- A True Random Number Generator with Built-in Attack DetectionBernhard Fechner, Andre Osterloh. 111-118 [doi]
- Conjugated Graph Grammars as a Mean to Assure Consistency of Systems of Conjugated GraphsLeszek Kotulski, Lukasz Fryz. 119-126 [doi]
- Semi-Markov Availability Modeling of a Redundant System with Partial and Full Rejuvenation ActionsVasilis P. Koutras, Agapios N. Platis. 127-134 [doi]
- Dependable SoPC-Based On-board Ice Protection System: From Research Project to ImplementationYuliya Prokhorova, Vyacheslav S. Kharchenko, Sergey Ostroumov, Stanislav Yatsenko, Mykola Sidorenko, Boris Ostroumov. 135-142 [doi]
- Verification and Implementation of Dependable ControllersKrzysztof Sacha. 143-151 [doi]
- Safety Strategies of Scheduling and Resource Co-allocation in Distributed ComputingVictor V. Toporkov, Alexey Tselishchev. 152-159 [doi]
- Detection of Roles of Actors in Social Networks Using the Properties of Actors Neighborhood StructureRadoslaw Brendel, Henryk Krawczyk. 163-170 [doi]
- Automatic Temporal Evaluation of the Accessibility of the World Wide Web and Its Standards ConformanceHugo Dworak. 171-178 [doi]
- Complex Network Cluster Reliability EvolutionVyacheslav Klimanov, Artem Yermakov. 189-194 [doi]
- Protection System against Overload and Distributed Denial of Service AttacksErvin Tóth, Zoltán Hornák, Gergely Tóth. 195-202 [doi]
- Misuse-Based Intrusion Detection Using Bayesian NetworksWojciech Tylman. 203-210 [doi]
- Anomaly-Based Intrusion Detection Using Bayesian NetworksWojciech Tylman. 211-218 [doi]
- A Performance Management System for Telecommunication Network Using AI TechniquesShaoyan Zhang, Rui Zhang, Jianmin Jiang. 219-226 [doi]
- Designing Fault Tolerant Networks Topologies Based on Greedy AlgorithmDeng Zili, Yu Nenghai, Li Zheng. 227-234 [doi]
- Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing ResultsLukasz Bagrij, Katarzyna Michalska, Marek Woda. 237-244 [doi]
- Software Architecture Behavior Meta-model for Real-Time SystemsAmmar Bessam, Mohamed Tahar Kimour. 245-252 [doi]
- Aspects in the Maintenance of Compiled ProgramsIlona Bluemke, Konrad Billewicz. 253-260 [doi]
- Tool-Supported Advanced Mutation Approach for Verification of C# ProgramsAnna Derezinska, Anna Szustek. 261-268 [doi]
- Constraint & Test Verification in Parallel Database SystemsFeras Hanandeh. 269-276 [doi]
- Evaluation of SOA Security Metrics Using Attack GraphsJan Magott, Marek Woda. 277-284 [doi]
- Comprehensive Planning Platform Framework for Managing Service-Oriented Information SystemsMarek Woda, Lukasz Bagrij. 285-292 [doi]
- Performance Analysis of Component-Based SystemsWlodek M. Zuberek, Ilona Bluemke. 293-300 [doi]
- Dependability Analysis of SOA SystemsMichal Zyla, Dariusz Caban. 301-306 [doi]
- Applying F(I)MEA-technique for SCADA-Based Industrial Control Systems Dependability Assessment and EnsuringEugene Babeshko, Vyacheslav S. Kharchenko, Anatoliy Gorbenko. 309-315 [doi]
- The Complexity of Fault-Tolerant Adder StructuresJanusz Biernat. 316-323 [doi]
- SeReCon: A Trusted Environment for SoPC DesignKrzysztof Kepa, Fearghal Morgan, Krzysztof Kosciuszkiewicz, Tomasz Surmacz. 332-338 [doi]
- Scalable Diversity-Oriented Decisions and Technologies for Dependable SoPC-Based Safety-Critical Computer Systems and InfrastructuresVyacheslav S. Kharchenko, Siora Alexandr, Vladimir V. Sklyar, Viktor Tokarev. 339-346 [doi]
- Organization of AES Cryptographic Unit for Low Cost FPGA ImplementationLukasz Krukowski, Jaroslaw Sugier. 347-354 [doi]
- ElGamal Signature Scheme Immune to Fault AnalysisMaciej Nikodem. 355-362 [doi]
- A Resilient SIL 2 Driver Machine Interface for Train Control SystemsAndrea Ceccarelli, István Majzik, Danilo Iovino, Fausto Caneschi, Gergely Pintér, Andrea Bondavalli. 365-374 [doi]
- Methodology of the Wireless Networks Planning in Mesh TopologyGrzegorz Debita, Kamil Staniec. 375-382 [doi]
- An Approach to Consistent Displaying of Virtual Reality Moving ObjectsVasily Y. Kharitonov. 390-397 [doi]
- Data Exploration Methods for Transport System Dependability AnalysisHenryk Maciejewski, Tomasz Lipnicki. 398-405 [doi]
- Autonomy and Cooperation as Factors of Dependability in Wireless Sensor NetworkJan Nikodem. 406-413 [doi]
- On Opportunity of Application of Modular Arithmetic for Accuracy Improvement in Positioning of Virtual Reality Moving ObjectsDmitry Orlov. 414-421 [doi]
- Quality of Telematic Services in TransportMiroslaw Siergiejczyk. 422-429 [doi]
- Availability of Discrete Transport System Simulated by SSF ToolTomasz Walkowiak, Jacek Mazurkiewicz. 430-437 [doi]