Abstract is missing.
- BARLEY: Modelling program behavior with resource usageKevin Leach. 1-4 [doi]
- Fault-tolerant broadcast algorithms for the virtual hypercube topologyLuiz A. Rodrigues. 1-4 [doi]
- Investigating DNS traffic anomalies for malicious activitiesFyodor Yarochkin, Vladimir Kropotov, Yennun Huang, Guo-Kai Ni, Sy-Yen Kuo, Ing-Yi Chen. 1-7 [doi]
- Predicting job completion times using system logs in supercomputing clustersXin Chen, Charng-da Lu, Karthik Pattabiraman. 1-8 [doi]
- Storage-efficient data replica number computation for multi-level priority data in distributed storage systemsChris X. Cai, Cristina L. Abad, Roy H. Campbell. 1-7 [doi]
- Automatic collection of failure data from the iOS platformMarcello Cinque, Domenico Cotroneo, Carlos Rodríguez-Domínguez, José Luis Garrido. 1-8 [doi]
- SCoRe: An across-the-board metric for computer systems resilience benchmarkingRaquel Almeida, Afonso Araújo Neto, Marco Vieira. 1-8 [doi]
- Towards evaluating the impact of data quality on service applicationsNaghmeh Ivaki, Nuno Laranjeiro, Marco Vieira. 1-7 [doi]
- Golden-run alignment for analysis of robustness testing results: dealing with diagnostics issuesGizelle Sandrini Lemos, Eliane Martins. 1-8 [doi]
- Autonomous Emergency Braking: A System-of-Systems perspectiveHermann Kopetz, Stefan Poledna. 1-7 [doi]
- Scalable security analysis in hierarchical attack representation model using centrality measuresJin B. Hong, Dong Seong Kim. 1-8 [doi]
- An intrusion-tolerant firewall design for protecting SIEM systemsMiguel Garcia, Nuno Ferreira Neves, Alysson Bessani. 1-7 [doi]
- Reliable mission deployment in vulnerable distributed systemsMassimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri. 1-8 [doi]
- Practical Experiences with real-world systems: Security in the world of reliable and safe systemsNuno Silva, Rui Lopes. 1-5 [doi]
- IOCheck: A framework to enhance the security of I/O devices at runtimeFengwei Zhang. 1-4 [doi]
- The KARYON project: Predictable and safe coordination in cooperative vehicular systemsAntonio Casimiro, Jörg Kaiser, Elad Schiller, Pedro Costa, José Parizi, Rolf Johansson, Renato Librino. 1-12 [doi]
- Interoperability in fingerprint recognition: A large-scale empirical studyLuca Lugini, Emanuela Marasco, Bojan Cukic, Ilir Gashi. 1-6 [doi]
- Keynote: Toward vehicle automation ADAS, the new challengesSerge Boverie. 1 [doi]
- Driver performance in the presence of adaptive cruise control related failures: Implications for safety analysis and fault toleranceJosef Nilsson, Niklas Strand, Paolo Falcone, Jonny Vinter. 1-10 [doi]
- Cyber security problem based on Multi-Objective Distributed Constraint Optimization techniqueTenda Okimoto, Naoto Ikegai, Katsumi Inoue, Hitoshi Okada, Tony Ribeiro, Hiroshi Maruyama. 1-7 [doi]
- Community-based resilient electricity sharing: Optimal spatial clusteringYoshiki Yamagata, Hajime Seya. 1-8 [doi]
- nd workshop on open resilient human-aware cyber-physical systemsMohamed Kaâniche, Michael Harrison, Hermann Kopetz, Daniel P. Siewiorek. 1-2 [doi]
- Model-based evaluation of system resilienceJohn F. Meyer. 1-7 [doi]
- A framework for runtime V&V in business-critical Service Oriented ArchitecturesCristiana Areias. 1-4 [doi]
- SAFE: Shoulder-surfing attack filibustered with easeNarayan Gowraj, Srinivas Avireddy, Prasanna Venkatesh Ravi, Raghav Babu Subramanian, Sruthi Prabhu. 1-7 [doi]
- Towards Systems ResilienceHiroshi Maruyama. 1-4 [doi]
- Keynote: Detecting cognitive state for operators of cyber-physical systems: Design of experimentsRoy A. Maxion. 1 [doi]
- Behavioral aspects for agent-based models of resilient urban systemsThomas Brudermann, Yoshiki Yamagata. 1-7 [doi]
- Workshop on reliability and security data analysis RSDA 2013Catello Di Martino, Antonio Pecchia, Jon Stearley. 1-2 [doi]
- Detecting and tolerating data corruptions due to device driver defectsFrancesco Fucci. 1-4 [doi]
- Survey on security threats and protection mechanisms in embedded automotive networksIvan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi. 1-12 [doi]
- Data fusion-base anomay detection in networked critical infrastructuresBéla Genge, Christos Siaterlis, Georgios Karopoulos. 1-8 [doi]
- Resilience modeling by means of a set of recursive functionsMaria Teresa Signes Pont, Juan Manuel García Chamizo, Higinio Mora Mora, Jerónimo Mora Pascual. 1-7 [doi]
- On reliability analysis of leader election protocols for virtual traffic lightsNegin Fathollahnejad, Emília Villani, Risat Pathan, Raul Barbosa, Johan Karlsson. 1-12 [doi]
- Key issues in service systems resilienceKazuo Furuta, Taro Kanno. 1-4 [doi]
- Improving the dependability of FPGA-based real-time embedded systems with partial dynamic reconfigurationJose Luis Nunes. 1-4 [doi]
- FORISK: Formalizing information security risk and compliance managementStefan Fenz, Thomas Neubauer, Rafael Accorsi, Thomas G. Koslowski. 1-4 [doi]
- Reducing service failures by failure and workload aware load balancing in SaaS cloudsArpan Roy, Rajeshwari Ganesan, Dinesh Dash, Santonu Sarkar. 1-6 [doi]