Abstract is missing.
- An Experimental Study of Software Aging and Rejuvenation in DockerdMatheus Torquato 0002, Marco Vieira. 1-6 [doi]
- On-Line Error Detection and Mitigation for Time-Series Data of Cyber-Physical Systems using Deep Learning Based MethodsKai Ding, Sheng Ding, Andrey Morozov, Tagir Fabarisov, Klaus Janschek. 7-14 [doi]
- Quantitative Cross-Layer Evaluation of Transient-Fault Injection Techniques for Algorithm ComparisonHorst Schirmeier, Mark Breddemann. 15-22 [doi]
- Robustness-Aware Design Space Exploration Through Iterative Refinement of D-Optimal DesignsIlya Tuzov, David de Andrés, Juan Carlos Ruiz. 23-30 [doi]
- Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight DevicesAbderrahmane Sensaoui, David Hély, Oum-El-Kheir Aktouf. 31-38 [doi]
- A Fast and Efficient Fault Tree Analysis Using Approximate ComputingSalar Hashemi, Amir M. Hajisadeghi, Hamid R. Zarandi, Saadat Pour-Mozafari. 39-46 [doi]
- Towards Linux for the Development of Mixed-Criticality Embedded Systems Based on Multi-Core DevicesImanol Allende, Nicholas Mc Guire, Jon Pérez, Lisandro Gabriel Monsalve, Nerea Uriarte, Roman Obermaisser. 47-54 [doi]
- Towards Quantification of Assurance for Learning-Enabled ComponentsErfan Asaadi, Ewen Denney, Ganesh Pai. 55-62 [doi]
- Transforming Byzantine Faults using a Trusted Execution EnvironmentMads Frederik Madsen, Mikkel Gaub, Malthe Ettrup Kirkbro, Søren Debois. 63-70 [doi]
- A Survey on the Application of Safety, Security, and Privacy Standards for Dependable SystemsLijun Shan, Behrooz Sangchoolie, Peter Folkesson, Jonny Vinter, Erwin Schoitsch, Claire Loiseaux. 71-72 [doi]
- Secure Cross-Border Exchange of Health Related Data: The KONFIDO ApproachSotiris Diamantopoulos, Marco Nalin, Ilaria Baroni, Fabrizio Clemente, Giuliana Faiella, Charis Mesaritakis, Evangelos Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, Elisa Puigdomènech, Dimitris Karamitros, Erol Gelenbe, Jos Dumortier, Maja Voss-Knude Voronkov, Luigi Romano, Luigi Coppolino, Vassilis Koutkias, Kostas Votis, Oana Stan, Paolo Campegiani, David Mari Martinez. 73-74 [doi]
- A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious WebsitesJohn McGahagan IV, Darshan Bhansali, Margaret Gratian, Michel Cukier. 75-82 [doi]
- Facing Cyber-Physical Security Threats by PSIM-SIEM IntegrationFlavio Frattini, Ugo Giordano, Vincenzo Conti. 83-88 [doi]
- Protecting Secrets of Persistent Systems with VolatilityVasily A. Sartakov, Rüdiger Kapitza. 89-96 [doi]
- Fast Local VM Migration Against Hypervisor CorruptionFrederico Cerveira, Raul Barbosa, Henrique Madeira. 97-102 [doi]
- A Hierarchical Model for Virtualized Data Center Availability EvaluationMatheus Torquato 0002, Erico A. C. Guedes, Paulo Maciel, Marco Vieira. 103-110 [doi]
- Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony OptimisationJasmine Grosso, Arshad Jhumka, Matthew Bradbury. 111-118 [doi]
- Assessment of a Method for Detecting Process Anomalies Using Digital-TwinningGayathri Sugumar, Aditya Mathur. 119-126 [doi]
- Leveraging Physical Access Logs to Identify Tailgating: Limitations and SolutionsCarmen Cheh, Uttam Thakore, Binbin Chen, William G. Temple, William H. Sanders. 127-132 [doi]
- Studying the Applicability of Intrusion Detection to Multi-Tenant Container EnvironmentsJosé Flora, Nuno Antunes. 133-136 [doi]
- Discovering Hidden Errors from Application Log Traces with Process MiningMarcello Cinque, Raffaele Della Corte, Antonio Pecchia. 137-140 [doi]
- On the Evaluation Measures for Machine Learning Algorithms for Safety-Critical SystemsMohamad Gharib, Andrea Bondavalli. 141-144 [doi]
- FailViz: A Tool for Visualizing Fault Injection Experiments in Distributed SystemsDomenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella, Nematollah Bidokhti. 145-148 [doi]
- Exploiting MDE for Platform-Independent Testing of Service OrchestrationsLucas Leal, Leonardo Montecchi, Andrea Ceccarelli, Eliane Martins. 149-152 [doi]
- Approximation of the Time Alignment Error for Measurements in Electricity GridsImad Antonios, Hans-Peter Schwefel, Lester Lipsky. 153-158 [doi]
- On the Impact of Measurement Errors on Loss Calculations in Distribution GridsHans-Peter Schwefel, Jakob Gulddahl Rasmussen, Rasmus L. Olsen, Nuno Silva. 159-164 [doi]
- Extraction of CIM-Based Distribution Grid Topology Information for ObservabilityKamal Shahid, Enrico Schiavone, Domagoj Drenjanac, Rasmus Pedersen Bæklund, Rasmus L. Olsen, Hans-Peter Schwefel. 165-170 [doi]
- Model-Free Detection of Cyberattacks on Voltage Control in Distribution GridsMohammed S. Kemal, Wissam Aoudi, Rasmus L. Olsen, Magnus Almgren, Hans-Peter Schwefel. 171-176 [doi]
- Enabling Security-by-Design in Smart Grids: An Architecture-Based ApproachHelder Aranha, Massimiliano Masi, Tanja Pavleska, Giovanni Paolo Sellitto. 177-179 [doi]
- Resilient Access to Heterogeneous Measurement Data for Grid ObservabilityNicola Nostro, Kamal Shahid, Andrea Bondavalli, Hans-Peter Schwefel. 180-182 [doi]
- Toward a Model-Based Approach for Analyzing Information Quality Requirements for Smart GridMohamad Gharib, Paolo Lollini, Andrea Bondavalli. 183-185 [doi]