Abstract is missing.
- Generating Permission-Based Security PoliciesXin Li, Hua Vy Le Thanh, Yuxin Deng, Julian Dolby. 1-7 [doi]
- Method-Level Permission Analysis Based on Static Call Graph of Android AppsYan Hu, Weiqiang Kong, Deng Ding, Jun Yan 0009. 8-14 [doi]
- Analysis of Security in Blockchain: Case Study in 51%-Attack DetectingCongcong Ye, Guoqiang Li 0001, Hongming Cai, Yonggen Gu, Akira Fukuda. 15-24 [doi]
- A Multi-Chain Model for CBDCWei-Tek Tsai, Zihao Zhao, Chi Zhang, Lian Yu, Enyan Deng. 25-34 [doi]
- Failure Modes Detection of Nuclear Systems Using Machine LearningDavid Tian, Jiamei Deng, Enrico Zio, Francesco Di Maio, Fucheng Liao. 35-43 [doi]
- An Algebraic Binary Decision Diagram for Analysis of Dynamic Fault TreeWei Jiang, Siwei Zhou, Luyao Ye, Dongdong Zhao, Jing Tian, W. Eric Wong, Jianwen Xiang. 44-51 [doi]
- A GTS-Based Reliability Analysis Method for the Subsea Gas Boosting SystemJinyong Yao, Zhiping Pang. 52-57 [doi]
- Failure Diagnosis for UAV-Born Inertial Navigation Device Based on BP-Adaboost ModelYingjie Ren, Yanguang Hu. 58-64 [doi]
- Solving Team Making Problem for Crowdsourcing with Evolutionary StrategyHan Wang, Zhilei Ren, Xiaochen Li, He Jiang. 65-74 [doi]
- Comparative Study on Online Review of Different Types of HotelTianjiao Niu, Yusi Ding, Jianzheng Yang. 75-79 [doi]
- Indoor Positioning System Based on Zigbee and Inertial SystemChenghao Han, Zhongtao Wang, Longxu Wang. 80-85 [doi]
- Interval Estimation of Process Capability Indices Based on the Weibull Distributed Quality Data of Supplier ProductsYanhe Cui, Jun Yang. 86-90 [doi]
- Process Capability Evaluation of Product Development Based on Information EntropyLixiang Wang, Wei Dai 0005, Yubing Huang. 91-95 [doi]
- Nondeterministic Event Sequence Reduction for Android ApplicationsBo Jiang, Xiaoyan Wang, Huanqiang Xu, Hao Wang, Chaoyang Zhang. 96-101 [doi]
- MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC CoverageLinghuan Hu, W. Eric Wong, D. Richard Kuhn, Raghu Kacker. 102-112 [doi]
- A Theoretical Analysis on the Impacts of Misestimated Test CasesYanhong Xu, Beibei Yin, Xiaohui Wan, Chenglong Li, Zheng Zheng 0001. 113-118 [doi]
- A Monte Carlo Simulation-Based Algorithm for a Repairable System in GO MethodologyAng Li, Yi Ren 0003, Dezhen Yang, Zhifeng Li. 119-125 [doi]
- Analysis of Some Variants of the Anderson Array-Based Queuing Mutual Exclusion Protocol with Model Checking and Graphical AnimationsYati Phyo, Kazuhiro Ogata 0001. 126-135 [doi]
- Model Checking of the Suzuki-Kasami Distributed Mutual Exclusion Algorithm with SPINShouki Sakamoto, Kazuhiro Ogata 0001. 136-141 [doi]
- Verification Model Translation Method toward Behavior Model for CASTTakahiro Ando, Bo Wang, Kenji Hisazumi, Weiqiang Kong, Akira Fukuda, Yasutaka Michiura, Keita Sakemi, Michihiro Matsumoto. 142-147 [doi]