Abstract is missing.
- Game Theory with Learning for Cyber Security MonitoringKey-whan Chung, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 1-8 [doi]
- Empirical Techniques to Detect and Mitigate the Effects of Irrevocably Evolving User Profiles in Touch-Based Authentication SystemsNikhil Palaskar, Zahid Syed, Sean Banerjee, Charlotte Tang. 9-16 [doi]
- Design Diversity for Mitigating Monoculture Induced ThreatsQi Cheng, Kevin A. Kwiat, Charles A. Kamhoua. 17-18 [doi]
- Securing a Connected Mobile System for HealthcareEric Reinsmidt, David Schwab, Li Yang. 19-22 [doi]
- Using Models to Validate Unanticipated, Fine-Grained Adaptations at RuntimeMohammed Al-Refai, Walter Cazzola, Sudipto Ghosh, Robert B. France. 23-30 [doi]
- Correct Instantiation of a System Reconfiguration Pattern: A Proof and Refinement-Based ApproachGuillaume Babin, Yamine Aït Ameur, Marc Pantel. 31-38 [doi]
- The Cost of Formal Verification in Adaptive CPS. An Example of a Virtualized Server NodeMarcello M. Bersani, Marisol García-Valls. 39-46 [doi]
- An Extension of Category Partition Testing for Highly Constrained SystemsSunint Kaur Khalsa, Yvan Labiche. 47-54 [doi]
- Software Defect Prediction Using Exception Handling Call Graphs: A Case StudyPuntitra Sawadpong, Edward B. Allen. 55-62 [doi]
- Task Characterization for an Effective Worker Targeting in CrowdsourcingTarek Awwad, Nadia Bennani, Lionel Brunie, David Coquil, Harald Kosch, Veronika Rehn-Sonigo. 63-64 [doi]
- World Model for Testing Autonomous Systems Using Petri NetsAnneliese Andrews, Mahmoud Abdelgawad, Ahmed Gario. 65-69 [doi]
- Formal Analysis of Railway Signalling DataAlexei Iliasov, Alexander Romanovsky. 70-77 [doi]
- Safe Multi-objective Planning with a Posteriori PreferencesRalph Eastwood, Robert Alexander, Tim Kelly. 78-85 [doi]
- Representation of Confidence in Assurance Cases Using the Beta DistributionLian Duan, Sanjai Rayadurgam, Mats Per Erik Heimdahl, Oleg Sokolsky, Insup Lee. 86-93 [doi]
- Engineering Adaptive Fault-Tolerance Mechanisms for Resilient Computing on ROSMichaël Lauer, Matthieu Amy, Jean-Charles Fabre, Matthieu Roy, William Excoffon, Miruna Stoicescu. 94-101 [doi]
- Runtime Adjustment of Configuration Models for Consistency PreservationAzadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe. 102-109 [doi]
- CSRS: Cyber Survive and Recover SimulatorSwastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua. 110-113 [doi]
- Synthesis of Logic InterpretationsJian Xiang, John C. Knight, Kevin J. Sullivan. 114-121 [doi]
- Feature-Based Software Customization: Preliminary Analysis, Formalization, and MethodsYufei Jiang, Can Zhang, Dinghao Wu, Peng Liu 0005. 122-131 [doi]
- Comparative Modeling and Verification of Pthreads and DthreadsYuan-fei, Huibiao Zhu, Xi Wu, Huixing Fang. 132-140 [doi]
- An Investigation into the Response of a Water Treatment System to Cyber AttacksSridhar Adepu, Aditya Mathur. 141-148 [doi]
- Characterization of Cyberattacks Aimed at Integrated Industrial Control and Enterprise Systems: A Case StudyRaymond C. Borges-Hink, Katerina Goseva-Popstojanova. 149-156 [doi]
- FCFraud: Fighting Click-Fraud from the User SideMd. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu. 157-164 [doi]
- Formalisation-Driven Development of Safety-Critical SystemsAlexei Iliasov, Alexander Romanovsky, Elena Troubitsyna, Linas Laibinis. 165-172 [doi]
- Formal Development of a Secure Access Control FilterAmel Mammar, Thi Mai Nguyen, Régine Laleau. 173-180 [doi]
- Incremental Formal Methods Based Design Approach Demonstrated on a Coupled Tanks Control SystemKerianne H. Gross, Aaron W. Fifarek, Jonathan A. Hoffman. 181-188 [doi]
- Proving Critical Properties of Simulink ModelsAshlie B. Hocking, M. Anthony Aiello, John C. Knight, Nikos Arechiga. 189-196 [doi]
- Statistical Model Checking for SystemC ModelsVan Chan Ngo, Axel Legay, Jean Quilbeuf. 197-204 [doi]
- Compositional Architecture Design for Fuel Tank Thermal SystemsSean J. S. Regisford, Brian K. Hulbert, Aaron W. Fifarek. 205-212 [doi]
- Using Network Topology to Supplement High Assurance SystemsPaul Hyden, Ira S. Moskowitz, Stephen Russell. 213-219 [doi]
- Integrating a Calculus with Mobility and Quality for Wireless Sensor NetworksXi Wu, Yongxin Zhao, Huibiao Zhu. 220-227 [doi]
- Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling StrategyTommaso Zoppi, Andrea Ceccarelli, Paolo Lollini, Andrea Bondavalli, Francesco Lo Piccolo, Gabriele Giunta, Vito Morreale. 228-235 [doi]
- Modeling Negative User Stories is Risky BusinessPankaj Kamthan, Nazlie Shahmir. 236-237 [doi]
- High-Integrity Multitasking in SPARK: Static Detection of Data Races and Locking CyclesS. Tucker Taft, Florian Schanda, Yannick Moy. 238-239 [doi]
- Towards a MARTE Extension to Address Adaptation MechanismsMohamed Naija, Jean-Michel Bruel, Samir Ben Ahmed. 240-243 [doi]
- Model Checking for the Fault Tolerance of Collaborative AUVsHong Liu, Tianyu Yang, Jing Wang. 244-245 [doi]
- An Analysis Platform for Execution-Based Model GenerationJaime C. Acosta, Salamah Salamah. 246-247 [doi]
- Empirical Assessment of Methods to Detect Cyber Attacks on a RobotGiedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur. 248-251 [doi]
- D^2PS: A Dependable Data Provisioning Service in Multi-tenant Cloud EnvironmentRenyu Yang, Tianyu Wo, Chunming Hu, Jie Xu, Mingming Zhang. 252-259 [doi]
- Generating Threat Profiles for Cloud Service Certification SystemsPhilipp Stephanow, Christian Banse, Julian Schütte. 260-267 [doi]
- CLOUBEX: A Cloud-Based Security Analysis Framework for Browser ExtensionsSaikat Das, Mohammad Zulkernine. 268-275 [doi]
- A Holistic Viewpoint-Based SysML Profile to Design Systems-of-SystemsMarco Mori, Andrea Ceccarelli, Paolo Lollini, Andrea Bondavalli, Bernhard Frömel. 276-283 [doi]
- Quantification of the Effectiveness of Medium Voltage Control Policies in Smart GridsSilvano Chiaradonna, Felicita Di Giandomenico, Jun Xiao. 284-291 [doi]
- Preventing and unifying threats in cyberphysical systemsEduardo B. Fernández. 292-293 [doi]
- High Assurance Smart MeteringSara Cleemput, Mustafa A. Mustafa, Bart Preneel. 294-297 [doi]