Abstract is missing.
- A Lightweight Framework for Regular Expression VerificationXiao Liu, Yufei Jiang, Dinghao Wu. 1-8 [doi]
- Towards an Efficient Cyber-Physical System for First-Mile Taxi Transit in Urban ComplexJunjie Wang, Peng Xu, Jinyang Li, Xiaoshan Sun, Wenchong Tian, Jie Ling, Wei Zheng, Hengchang Liu. 9-16 [doi]
- Quantitative Validation of Formal Domain ModelsAlexei Iliasov, Alexander B. Romanovsky, Linas Laibinis. 17-24 [doi]
- Semantically Enhanced Time Series Databases in IoT-Edge-Cloud InfrastructureShuai Zhang 0012, Wenxi Zeng, I-Ling Yen, Farokh B. Bastani. 25-32 [doi]
- Real-Time Anomaly Detection Method for Space Imager Streaming Data Based on HTM AlgorithmLei Song, Haoran Liang, Taisheng Zheng. 33-38 [doi]
- Mining Accompanying Passing-Vehicles to Discover Suspected GangsWei Zhihao, Jianyuan Li, Wanqing Li. 39-41 [doi]
- Air-Ground System Wide Information Management to Achieve Safe Flight OperationXiaodong Lu, Kazuyuki Morioka, Tadashi Koga, Yasuto Sumiya. 42-49 [doi]
- Parallel Verification of Software Architecture DesignNacha Chondamrongkul, Jing Sun 0002, Bingyang Wei, Ian Warren. 50-57 [doi]
- Multi-Layered Safety Architecture of Autonomous Systems: Formalising Coordination PerspectiveInna Vistbakka, Elena Troubitsyna, Amin Majd. 58-65 [doi]
- Isochronous Execution Models for High-Assurance Real-Time SystemsBader Alahmad, Sathish Gopalakrishnan. 66-73 [doi]
- Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social ApproachMohamad Gharib, Paolo Lollini, Andrea Ceccarelli, Andrea Bondavalli. 74-81 [doi]
- A Framework for Model-Based Dependability Analysis of Cyber-Physical SystemsMorayo Adedjouma, Nataliya Yakymets. 82-89 [doi]
- A Refinement Based Method for Developing Distributed ProtocolsPaulius Stankaitis, Alexei Iliasov, Yamine Aït Ameur, Tsutomu Kobayashi, Fuyuki Ishikawa, Alexander B. Romanovsky. 90-97 [doi]
- Identification of Multi-Core InterferenceFrédéric Boniol, Claire Pagetti, Nathanaël Sensfelder. 98-106 [doi]
- Formalizing Cyber-Physical System Model Transformation Via Abstract InterpretationNatasha Jarus, Sahra Sedigh Sarvestani, Ali R. Hurson. 107-114 [doi]
- A Framework for Preprocessing Multivariate, Topology-Aware Time Series and Event Data in a Multi-System EnvironmentAndreas Schörgenhumer, Mario Kahlhofer, Peter Chalupar, Paul Grünbacher, Hanspeter Mössenböck. 115-122 [doi]
- Timing Modeling and Analysis for AUTOSAR Schedule TablesRongkun Yan, Jian Guo. 123-130 [doi]
- Interface Injection with AspectC++ in Embedded SystemsUlrich Thomas Gabor, Christoph-Cordt von Egidy, Olaf Spinczyk. 131-138 [doi]
- Facilitating Failure Analysis with Software InstrumentationBrad J. Ziegler, Sahra Sedigh Sarvestani, Ali R. Hurson. 139-145 [doi]
- The Rotate Stress of Steam Turbine Prediction Method Based on Stacking Ensemble LearningHaoran Liang, Lei Song, XuZhi Li. 146-149 [doi]
- Study of Trust at Device Level of the Internet of Things ArchitectureTunde Akeem Yekini, Fehmi Jaafar, Pavol Zavarsky. 150-155 [doi]
- Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch ManagementJunjun Zheng, Hiroyuki Okamura, Tadashi Dohi. 156-163 [doi]
- Private Blockchain Network for IoT Device Firmware Integrity Verification and UpdateSamip Dhakal, Fehmi Jaafar, Pavol Zavarsky. 164-170 [doi]
- MidSecThings: Assurance Solution for Security Smart Homes in IoTRichardson Andrade, Nelson Rosa. 171-178 [doi]
- Research on Cloud Performance Testing ModelHonghui Li, Xiuru Li, Huan Wang, Jie Zhang, Zhouxian Jiang. 179-183 [doi]
- RangeLocker: Adaptive Range-Sensitive Lockset Analysis for Precise Dynamic Race DetectionYoshitaka Arahori. 184-191 [doi]
- Modeling and Verifying Storm Using CSPHongyan Zhao, Huibiao Zhu, Yucheng Fang, Lili Xiao. 192-199 [doi]
- Development of a Generic Model for Large-Scale Healthcare OrganizationsFaisal A. Alkhaldi, Ali T. Alouani. 200-207 [doi]
- Modeling and Verifying Spark on YARN Using Process AlgebraJiaqi Yin, Huibiao Zhu, Yuan-fei, Yucheng Fang. 208-215 [doi]
- Simulation on Grounding Fault Location of Distribution Network Based on Regional ParametersBo Zhang, Haoming Liu, Jiajia Song, Jinbo Zhang. 216-221 [doi]
- Designing Safe and Secure Mixed Traffic SystemsGiedre Sabaliauskaite, Lin Shen Liew, Fengjun Zhou, Jin Cui. 222-227 [doi]
- Modelica-Supported Attack Impact Evaluation in Cyber Physical Energy SystemKaikai Pan, Digvijay Gusain, Peter Palensky. 228-233 [doi]
- Asymmetric Key-Based Secure ECU Replacement Without PKIRyo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita. 234-240 [doi]
- Vulnerability Analysis of an Automotive Infotainment System's WIFI CapabilityEdwin Franco Myloth Josephlal, Sridhar Adepu. 241-246 [doi]
- Attack Defense Trees with Sequential ConjunctionJeremy W. Bryans, Hoang Nga Nguyen, Siraj A. Shaikh. 247-252 [doi]