Abstract is missing.
- SSIV 2017 WelcomeJoão Carlos Cunha, Kalinka Branco, Antonio Casimiro, Urbano Nunes. 1 [doi]
- Safe Landing of Fixed Wing UAVsPranav Jetley, P. B. Sujit, Srikanth Saripalli. 2-9 [doi]
- Byzantine Agreement Service for Cooperative Wireless Embedded SystemsWenbo Xu, Martin Wegner, Lars C. Wolf, Rüdiger Kapitza. 10-15 [doi]
- Assuring Fully Autonomous Vehicles Safety by Design: The Autonomous Vehicle Control (AVC) Module StrategyCaroline Bianca Santos Tancredi Molina, Jorge Rady de Almeida Jr., Lucio Flavio Vismari, Rodrigo Ignacio R. Gonzalez, Jamil Kalil Naufal Jr., Joao Batista Camargo Jr.. 16-21 [doi]
- Deterministic Ethernet: Addressing the Challenges of Asynchronous Sensing in Sensor Fusion SystemsAyhan Mehmed, Sasikumar Punnekkat, Wilfried Steiner. 22-28 [doi]
- Towards Adaptive Fault Tolerance on ROS for Advanced Driver Assistance SystemsMatthieu Amy, Jean-Charles Fabre, Michaël Lauer. 29-35 [doi]
- Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical StudyMadeline Cheah, Jeremy Bryans, Daniel S. Fowler, Siraj Ahmed Shaikh. 36-43 [doi]
- RADIANCE WelcomeNuno Antunes, Ariadne M. B. R. Carvalho, Andrea Ceccarelli. 44 [doi]
- Discovering and Mitigating New Attack Paths Using Graphical Security ModelsJin Bum Hong, Dong Seong Kim. 45-52 [doi]
- Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security PatchesMengmeng Ge, Huy Kang Kim, Dong Seong Kim. 53-60 [doi]
- Quantitative Evaluation of QoS Prediction in IoTGary White, Andrei Palade, Christian Cabrera, Siobhán Clarke. 61-66 [doi]
- An Integrated Approach for Resilience in Industrial Control SystemsJohannes Iber, Tobias Rauter, Michael Krisper, Christian Kreiner. 67-74 [doi]
- Towards an Ontology-Based Definition of Data Anonymization Policy for Cloud Computing and Big DataRoberta Mayumi Matsunaga, Ivan Ricarte, Tânia Basso, Regina Moraes. 75-82 [doi]
- MARITACA: From Textual Use Case Descriptions to Behavior ModelsLeydi Erazo, Eliane Martins, Juliana Galvani Greghi. 83-90 [doi]
- RSVP: Soft Error Resilient Power Savings at Near-Threshold Voltage Using Register VulnerabilityLi Tan, Nathan DeBardeleben, Qiang Guan, Sean Blanchard, Michael Lang. 91-98 [doi]
- Software-Defined HoneyNet: Towards Mitigating Link Flooding AttacksJinwoo Kim, Seungwon Shin. 99-100 [doi]
- TDSC: Two-Stage DDoS Detection and Defense System Based on ClusteringShuang Wei, Yijing Ding, Xinhui Han. 101-102 [doi]
- The Many Conflicting Visions of 'Safety Case'Patrick J. Graydon. 103-104 [doi]
- RFID Tag Grouping Protocols Made PrivateYudai Komori, Kazuya Sakai, Satoshi Fukumoto. 105-106 [doi]
- Off-Path Caching for File Versioning in Named Data NetworkingMamoru Ohara, Satoshi Fukumoto. 107-108 [doi]
- Portable SDN Testbed PrototypeJoshua A. Alcorn, Scott Melton, C. Edward Chow. 109-110 [doi]
- A Framework for SDN Network EvaluationJosh Alcorn, Scott Melton, C. Edward Chow. 111-112 [doi]
- Document Faults: An Extension of the Taxonomy of Dependable and Secure ComputingAlgirdas Avizienis. 113-114 [doi]
- Opportunities and Challenges of Third-Party Sustainment of Critical Software in Dependable SystemsKate Gill, Rob Ashmore. 115-116 [doi]
- RT Level vs. Microarchitecture-Level Reliability Assessment: Case Study on ARM(R) Cortex(R)-A9 CPUAthanasios Chatzidimitriou, Manolis Kaliorakis, Dimitris Gizopoulos, Maurizio Iacaruso, Mauro Pipponzi, Riccardo Mariani, Stefano Di Carlo. 117-120 [doi]
- Faster Exact Reliability ComputationVincent Debieux, Yvonne Anne Pignolet, Thanikesavan Sivanthi. 121-124 [doi]
- Providing Resiliency to Orchestration and Automation Engines in Hybrid CloudLong Wang, HariGovind V. Ramasamy, Alexei Karve, Richard E. Harper. 125-128 [doi]
- Uptime-Optimized Cloud Architecture as a Brokered ServiceSreekrishnan Venkateswaran, Santonu Sarkar. 129-132 [doi]
- Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation LogYan Li, Binbin Chen, Vincent W. Zheng, William G. Temple, Zbigniew Kalbarczyk, Yue Wu. 133-136 [doi]
- Automating DRAM Fault Mitigation By Learning From ExperienceElisabeth Baseman, Nathan DeBardeleben, Kurt B. Ferreira, Vilas Sridharan, Taniya Siddiqua, Olena Tkachenko. 137-140 [doi]
- FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons LearnedKarim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik. 141-144 [doi]
- MAS: Mobile-Apps Assessment and Analysis SystemChia-Wei Tien, Tse-Yung Huang, Ting-Chun Huang, Wei-Ho Chung, Sy-Yen Kuo. 145-148 [doi]
- A Visit to the Jungle of TerminologyAlgirdas Avizienis. 149-152 [doi]
- Modeling Error Propagation in ProgramsGuanpeng Li. 153-155 [doi]
- Automated Program Diversity Using Program SynthesisAbraham Chan. 156-159 [doi]
- Student Research Paper: Evaluation of the Dependability of Critical Infrastructures Using Hybrid Petri Nets with Random Variables and Stochastic SimulationCarina Pilch. 160-163 [doi]
- Enabling Low Degraded Read Latency and Fast Recovery for Erasure Coded Cloud Storage SystemsPeng Li. 164-167 [doi]
- Special Session at DSN for the Best Papers from SELSE 2017Alan Wood. 168 [doi]
- Evaluation and Mitigation of Soft-Errors in Neural Network-Based Object Detection in Three GPU ArchitecturesFernando Fernandes dos Santos, Lucas Draghetti, Lucas Weigel, Luigi Carro, Philippe O. A. Navaux, Paolo Rech. 169-176 [doi]
- DRAM Scaling Error Evaluation Model Using Various Retention TimeSeong-Lyong Gong, Jungrae Kim, Mattan Erez. 177-183 [doi]
- Deep Healing: Ease the BTI and EM Wearout Crisis by Activating RecoveryXinfei Guo, Mircea R. Stan. 184-191 [doi]