Abstract is missing.
- Is My Software Consistent with the Real World?Jian Xiang, John C. Knight, Kevin J. Sullivan. 1-4 [doi]
- Architecting Holistic Fault ToleranceRem Gensh, Ashur Rafiev, Alexander Romanovsky, Alessandro F. Garcia, Fei Xia, Alex Yakovlev. 5-8 [doi]
- Majority is Not Always Supreme: Less Can Be More When Voting with Compromised NodesDanielle C. Tarraf, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. 9-12 [doi]
- Evaluating a Corpus of Root Causes and Measures to Guide RCA Processes in Critical SoftwareNuno Silva, Marco Vieira, João Carlos Cunha, Ram Chillarege. 17-24 [doi]
- Quantitative Security and Safety Analysis with Attack-Fault TreesRajesh Kumar, Mariëlle Stoelinga. 25-32 [doi]
- Cyber-Physical Security of a Chemical PlantPrakash Rao Dunaka, Bruce M. McMillin. 33-40 [doi]
- Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and SecurityGiedre Sabaliauskaite, Sridhar Adepu. 41-48 [doi]
- Cyber Security Resource Allocation: A Markov Decision Process ApproachLaurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou. 49-52 [doi]
- Arguing from Hazard Analysis in Safety Cases: A Modular Argument PatternMario Gleirscher, Carmen Cârlan. 53-60 [doi]
- Verification of Interlocking Systems Using Statistical Model CheckingQuentin Cappart, Christophe Limbrée, Pierre Schaus, Jean Quilbeuf, Louis-Marie Traonouez, Axel Legay. 61-68 [doi]
- Correlation Analysis among Java Nano-Patterns and Software VulnerabilitiesKazi Zakia Sultana, Ajay Deo, Byron J. Williams. 69-76 [doi]
- Enhancing OpenStack Fault Tolerance for Provisioning Computing EnvironmentsAli Kanso, Nicolas Deixionne, Abdelouahed Gherbi, Fereydoun Farrahi Moghaddam. 77-83 [doi]
- Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based ApproximationQi Cheng, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla. 84-87 [doi]
- Using Source Code Metrics and Multivariate Adaptive Regression Splines to Predict Maintainability of Service Oriented SoftwareLov Kumar, Santanu Kumar Rath, Ashish Sureka. 88-95 [doi]
- Detecting and Reducing Redundancy in Software Testing for Highly Configurable SystemsDusica Marijan, Sagar Sen. 96-99 [doi]
- Test Prioritization with Optimally Balanced Configuration CoverageDusica Marijan, Marius Liaaen. 100-103 [doi]
- High Assurance Code Generation for Cyber-Physical SystemsTze Meng Low, Franz Franchetti. 104-111 [doi]
- Defining Risk States in Autonomous Road VehiclesMario Gleirscher, Stefan Kugele. 112-115 [doi]
- Impact of Using a Static-Type System in Computer ProgrammingIsmail Rizky Harlin, Hironori Washizaki, Yoshiaki Fukazawa. 116-119 [doi]
- Verification of SGAC Access Control Policies Using Alloy and ProBNghi Huynh, Marc Frappier, Amel Mammar, Régine Laleau. 120-123 [doi]
- Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical SystemsKoyena Pal, Sridhar Adepu, Jonathan Goh. 124-127 [doi]
- Multi-Level Indoor Navigation Ontology for High Assurance Location-Based ServicesSanya Khruahong, Xiaoying Kong, Kumbesan Sandrasegaran, Li Liu 0005. 128-131 [doi]
- Acquisition of Virtual Machines for Tiered Applications with Availability ConstraintsPraneeth Sakhamuri, Olivia Das. 132-135 [doi]
- Multiple Security Domain Nondeducibility Air Traffic Surveillance SystemsAnusha Thudimilla, Bruce M. McMillin. 136-139 [doi]
- Anomaly Detection in Cyber Physical Systems Using Recurrent Neural NetworksJonathan Goh, Sridhar Adepu, Marcus Tan, Zi Shan Lee. 140-145 [doi]
- Overview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting DevicesQi Xiong, Yuan Xu, Baofeng Zhang, Feng Wang. 146-152 [doi]
- A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical SystemsRon Biton, Clint Feher, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur. 153-156 [doi]
- String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming AttacksAmir Alipour Fanid, Monireh Dabaghchian, Hengrun Zhang, Kai Zeng. 157-162 [doi]
- Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical SystemJay Prakash, Chuadhry Mujeeb Ahmed. 163-170 [doi]