Abstract is missing.
- Robustness Inside Out TestingDeborah S. Katz, Milda Zizyte, Casidhe Hutchison, David Guttendorf, Patrick E. Lanigan, Eric Sample, Philip Koopman, Michael D. Wagner, Claire Le Goues. 1-4 [doi]
- Towards Host Intrusion Detection for Embedded Industrial SystemsMarine Kadar, Sergey Tverdyshev, Gerhard Fohler. 5-8 [doi]
- The Monitor as Key Architecture Element for Safe Self-Driving CarsAyhan Mehmed, Moritz Antlanger, Wilfried Steiner. 9-12 [doi]
- Predicting Remediations for Hardware Failures in Large-Scale DatacentersFan Fred Lin, Antonio Davoli, Imran Akbar, Sukumar Kalmanje, Leandro Silva, John Stamford, Yanai Golany, Jim Piazza, Sriram Sankar. 13-16 [doi]
- ZTE-Predictor: Disk Failure Prediction System Based on LSTMHongzhang Yang, Zongzhao Li, Huiyuan Qiang, Zhongliang Li, Yaofeng Tu, Yahui Yang. 17-20 [doi]
- Neuraltran: Optimal Data Transformation for Privacy-Preserving Machine Learning by Leveraging Neural NetworksChangchang Liu, Wei-Han Lee, Seraphin Calo. 21-24 [doi]
- Simulating Reliability of IoT Networks with RelIoTKazim Ergun, Xiaofan Yu, Nitish Nagesh, Ludmila Cherkasova, Pietro Mercati, Raid Ayoub, Tajana Rosing. 25-28 [doi]
- Performance-Aware Wi-Fi Problem Diagnosis and Mitigation through Peer-to-Peer Data SharingNathan D. Mickulicz, Priya Narasimhan. 29-32 [doi]
- Fundamental Challenges of Cyber-Physical Systems Security ModelingGeorgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody Fleming. 33-36 [doi]
- Ontology Configuration Management for Knowledge-Centric Systems Engineering in IndustryBorja López, Jose Maria Álvarez Rodriguez, Eugenio Parra, Jose Luis de la Vara. 37-40 [doi]
- Secure Consensus Generation with Distributed DoHPhilipp Jeitner, Haya Shulman, Michael Waidner. 41-42 [doi]
- Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target DefenseDong Seong Kim, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson. 43-44 [doi]
- Tomographic Measuring Sensors System for Analysis and Visualization of Technological ProcessesMariusz Mazurek, Tomasz Rymarczyk, Grzegorz Klosowski, Michal Maj, Przemyslaw Adamkiewicz. 45-46 [doi]
- MPC for Securing Internet InfrastructureKris Shrishak, Haya Shulman. 47-48 [doi]
- Pitfalls of Provably Secure Systems in Internet the Case of Chronos-NTPPhilipp Jeitner, Haya Shulman, Michael Waidner. 49-50 [doi]
- SIMBA: An Efficient Simulator for Blockchain ApplicationsSeyed Mehdi Fattahi, Adetokunbo Makanju, Amin Milani Fard. 51-52 [doi]
- Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSATMartín Barrère, Chris Hankin. 53-54 [doi]
- Impact of Coding Styles on Behaviours of Static Analysis Tools for Web ApplicationsIbéria Medeiros, Nuno Neves 0001. 55-56 [doi]
- A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of ThingsDong Seong Kim, Kok Onn Chee, Mengmeng Ge. 57-58 [doi]
- The Effect of Motion on PPG Heart Rate SensorsDaniel Hu, Calvin Henry, Saurabh Bagchi. 59-60 [doi]
- Reliability Analysis of Edge Scenarios Using Pedestrian MobilityKshitiz Goel, Abhishek Bhaumick, Deepika Kaushal, Saurabh Bagchi. 61-62 [doi]
- Improving the Dependability of the ECG Signal for Classification of Heart DiseasesBartosz Przysucha, Tomasz Rymarczyk, Dariusz Wójcik, Michal Wos, Andrés Véjar. 63-64 [doi]
- Safeguarding Data Consistency at the EdgeCláudio Correia. 65-66 [doi]
- Depending on HTTP/2 for Privacy? Good Luck!Gargi Mitra. 67-68 [doi]
- Towards Practical Privacy-Preserving Collaborative Machine Learning at a ScaleRania Talbi. 69-70 [doi]
- What Exactly Determines the Type? Inferring Types with ContextLigeng Chen. 71-72 [doi]
- Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum - Practical Experience Report and Ongoing PhD WorkPaulo Silva. 73-74 [doi]
- CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR EnvironmentJiyeon Lee. 75-76 [doi]
- A Framework for Risk Assessment in Augmented Reality-Equipped Socio-Technical SystemsSoheila Sheikh Bahaei. 77-78 [doi]
- Cross-Layer Soft-Error Resilience Analysis of Computing SystemsAlberto Bosio, Ramon Canal, Stefano Di Carlo, Dimitris Gizopoulos, Alessandro Savino. 79 [doi]
- The InterPlanetary File System and the Filecoin NetworkYiannis Psaras, David Dias. 80 [doi]
- Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion DetectionTommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli. 81 [doi]
- Software-Only Triple Diverse Redundancy on GPUs for Autonomous Driving PlatformsSergi Alcaide Portet, Leonidas Kosmidis, Carles Hernández, Jaume Abella. 82-88 [doi]
- A Machine Learning-Based Error Model of Voltage-Scaled CircuitsDongning Ma, Xun Jiao. 89-91 [doi]
- An Overview of the Risk Posed by Thermal Neutrons to the Reliability of Computing DevicesDaniel A. G. de Oliveira, Sean Blanchard, Nathan DeBardeleben, Fermando Santos, Gabriel Piscoya Dávila, Philippe Olivier Alexandre Navaux, Stephen Wender, Carlo Cazzaniga, Christopher Frost 0002, Robert C. Baumann, Paolo Rech. 92-97 [doi]