Abstract is missing.
- Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and AnalysesAfsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li 0001, David A. Mohaisen. 1-2 [doi]
- Systemically Evaluating the Robustness of ML-based IoT Malware DetectorsAhmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David A. Mohaisen. 3-4 [doi]
- Detecting Operational Adversarial Examples for Reliable Deep LearningXingyu Zhao 0001, Wei Huang, Sven Schewe, Yi Dong, Xiaowei Huang 0001. 5-6 [doi]
- Iteratively Checking Program Properties Involving Non-Boolean ValuesLong Wang. 7-8 [doi]
- Negotiating PQC for DNSSECKris Shrishak, Haya Shulman. 9-10 [doi]
- Spatio-Temporal Split LearningJoongheon Kim, Seunghoon Park, Soyi Jung, Seehwan Yoo. 11-12 [doi]
- Mitigation of Automotive Control Modules Hardware Replacement-based Attacks Through Hardware SignatureFranco Oberti, Ernesto Sánchez 0001, Alessandro Savino, Filippo Parisi, Stefano Di Carlo. 13-14 [doi]
- Machine Learning Analysis of IP ID ApplicationsHaya Shulman, Shujie Zhao. 15-16 [doi]
- S-ADA: Software as an Autonomous, Dependable and Affordable SystemKai-Yuan Cai, Kishor S. Trivedi, Beibei Yin. 17-18 [doi]
- Finding Web Application Vulnerabilities with an Ensemble FuzzingJoão Caseirito, Ibéria Medeiros. 19-20 [doi]
- Towards Automated Software Testing with Generative Adversarial NetworksXiujing Guo. 21-22 [doi]
- A Useful Parametric Family to Characterize NHPP-based Software Reliability ModelsSiqiao Li. 23-24 [doi]
- Model-based design, analysis and assessment framework for safety-critical systemsKuen-Long Lu, Yung-Yuan Chen. 25-26 [doi]
- On The Local Sensitivity Analysis for Phase ExpansionJiahao Zhang. 27-28 [doi]
- Designing Adversarial Attack and Defence for Robust Android Malware Detection ModelsHemant Rathore, Sanjay K. Sahay, Jasleen Dhillon, Mohit Sewak. 29-32 [doi]
- AMD EPYC™ 7002 Series - A Processor with Improved Soft Error ResilienceCristian Constantinescu. 33-36 [doi]
- Near-Realtime Server Reboot Monitoring and Root Cause Analysis in a Large-Scale SystemFan Fred Lin, Bhargav Bolla, Eric Pinkham, Neil Kodner, Daniel Moore, Amol Desai, Sriram Sankar. 37-40 [doi]
- The Importance of Safety Invariants in Robustness Testing Autonomy SystemsMilda Zizyte, Casidhe Hutchison, Raewyn Duvall, Claire Le Goues, Philip Koopman. 41-44 [doi]
- BACGraph: Automatic Extraction of Object Relationships in the BACnet ProtocolHerson Esquivel-Vargas, Marco Caselli, Andreas Peter. 45-48 [doi]
- A Matter of Trust: Verification of Security and Performance for Network Platform as a ServiceTim Alberdingk Thijm, Gary Atkinson, Lalita Jagadeesan, Marina Thottan. 49-52 [doi]
- SymPLe: Complexity-Aware Design for Safety Critical I&C SystemsRichard Hite, Abhi Rajagopala, Smitha Gautham, Christopher J. Deloglos, Athira V. Jayakumar, Aidan G. Collins, Carl R. Elks, Matt Gibson. 53-56 [doi]
- Hardware Support for Low-Cost Memory SafetyRick Boivie, Gururaj Saileshwar, Tong Chen, Benjamin Segal, Alper Buyuktosunoglu. 57-60 [doi]
- SERMiner : A Framework for Early-stage Reliability Estimation for IBM ProcessorsKarthik Swaminathan, Ramon Bertran, Hans M. Jacobson, Pradip Bose, Matthias Pflanz, Doug Balazich. 61-64 [doi]
- TQEA: Temporal Quantum Error AnalysisBetis Baheri, Daniel Chen, Bo Fang, Samuel A. Stein, Vipin Chaudhary, Ying Mao, Shuai Xu, Ang Li, Qiang Guan. 65-67 [doi]
- Overdrive Fault Attacks on GPUsMajid Sabbagh, Yunsi Fei, David R. Kaeli. 68-69 [doi]
- Simulation-based Fault Injection in Advanced Driver Assistance Systems Modelled in SUMOMehdi Maleki, Behrooz Sangchoolie. 70-71 [doi]