Abstract is missing.
- Long-Term Study of Honeypots in a Public CloudRakshit Agrawal, Jack W. Stokes, Lukas Rist, Ryan Littlefield, Xun Fan, Ken Hollis, Zane Coppedge, Noah Chesterman, Christian Seifert. 1-4 [doi]
- An industrial perspective on web scraping characteristics and open issuesElisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Mattias Mattsson, Vincent Rigal. 5-8 [doi]
- SimLane: A Risk-Orientated Benchmark for Lane DetectionXinyang Zhang, Zhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li 0001. 9-12 [doi]
- Revisiting Tendermint: Design Tradeoffs, Accountability, and Practical UseEthan Buchman, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic 0001, Dragos-Adrian Seredinschi, Josef Widder. 11-14 [doi]
- On the Scalability of HeapCheckRick Boivie, Gururaj Saileshwar, Tong Chen, Benjamin Segal, Alper Buyuktosunoglu. 15-18 [doi]
- Challenges/Opportunities to Enable Dependable Scale-out System with Groq Deterministic Tensor-Streaming ProcessorsDennis Abts, Ibrahim Ahmed 0007, Andrew Bitar, Matthew Boyd, John Kim, Garrin Kimmell, Andrew C. Ling. 19-22 [doi]
- Improving the Fault Resilience of Neural Network Applications Through Security MechanismsNikolaos Ioannis Deligiannis, Riccardo Cantoro, Matteo Sonza Reorda, Marcello Traiola, Emanuele Valea. 23-24 [doi]
- Reliability of Google's Tensor Processing Units for Convolutional Neural NetworksRubens Luiz Rech Junior, Paolo Rech. 25-27 [doi]
- Reliability assessment of FreeRTOS in Embedded SystemsAlberto Bosio, Maurizio Rebaudengo, Alessandro Savino. 28-30 [doi]
- Formal Foundations for SCONE AttestationMuhammad Usama Sardar, Christof Fetzer. 31-32 [doi]
- Effectiveness on C Flaws Checking and RemovalJoão Inácio, Ibéria Medeiros. 33-34 [doi]
- Towards Fuzzing Target LinesNuno Neves 0001. 35-36 [doi]
- A Policy Driven AI-Assisted PoW FrameworkTrisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young. 37-38 [doi]
- Modeling Composition of Cloud Services with Complex Dependencies for Availability AssessmentXingjian Zhang, Long Wang. 39-40 [doi]
- Real-Time Digital Filtering for IoT Data in Programmable Network SwitchesNathaniel Nauman, Ruochong Wu, Saurabh Bagchi. 41-42 [doi]
- Personalized Cryptography Algorithms - A Comparison Between Classic and Cognitive MethodsRadoslaw Bulat, Marek R. Ogiela. 43-44 [doi]
- Predictive Resilience ModelingPriscila Silva. 45-46 [doi]
- CSAI-4-CPS: A Cyber Security characterization model based on Artificial Intelligence For Cyber Physical SystemsHebert de Oliveira Silva. 47-48 [doi]
- Understanding Trust Assumptions for Attestation in Confidential ComputingMuhammad Usama Sardar. 49-50 [doi]
- Daric: A Storage Efficient Payment Channel With Penalization MechanismArash Mirzaei. 51-52 [doi]
- Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception ArchitectureRudra Prasad Baksi. 53-54 [doi]