Abstract is missing.
- Applying Modified Code Entity-Based Regression Test Selection for Manual End-to-End Testing of Commercial Web ApplicationsTakao Nakagawa, Kazuki Munakata, Koji Yamamoto. 1-6 [doi]
- Concurrency Defect Localization in Embedded Systems using Static Code Analysis: An EvaluationBjarne Johansson, Alessandro Vittorio Papadopoulos, Thomas Nolte. 7-12 [doi]
- Adapting SQuaRE for Quality Assessment of Artificial Intelligence SystemsHiroshi Kuwajima, Fuyuki Ishikawa. 13-18 [doi]
- Towards Rust for Critical SystemsAndré Pinho, Luis Couto, José Oliveira. 19-24 [doi]
- Dependency Graph Based Failure Analysis for Private CloudsNathan Riopelle, Aniket Malatpure, Swapnil Ashtekar, V. Raman. 25-29 [doi]
- Engineering and Hardening of Functional Fail-Operational Architectures for Highly Automated DrivingRasmus Adler, Mohammed Naveed Akram, Patrik Feth, Takeshi Fukuda, Tasuku Ishigooka, Satoshi Otsuka, Daniel Schneider 0001, Kentaro Yoshimura. 30-35 [doi]
- Go-Sanitizer: Bug-Oriented Assertion Generation for GolangCong Wang, Hao Sun, Yiwen Xu, Yu Jiang 0001, Huafeng Zhang, Ming Gu 0001. 36-41 [doi]
- Learning from Time Series with Outlier Correction for Malicious Domain IdentificationGuolin Tan, Peng Zhang, Lei Zhang, Yu Zhang, Chuang Zhang, Qingyun Liu, Xinran Liu. 42-46 [doi]
- Detecting and Diagnosing Anomalous Behavior in Large Systems with Change Detection AlgorithmsVeena Mendiratta, Zhuoran Liu, Mrinmoy Bhattacharjee, Yu Zhou. 47-52 [doi]
- Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident ResponseUttam Thakore, HariGovind V. Ramasamy, William H. Sanders. 53-58 [doi]
- Triforce QNX Syscall FuzzerPallavi Pandey, Anupam Sarkar, Ansuman Banerjee. 59-60 [doi]
- DC-SRGM: Deep Cross-Project Software Reliability Growth ModelKyawt Kyawt San, Hironori Washizaki, Yoshiaki Fukazawa, Kiyoshi Honda, Masahiro Taga, Akira Matsuzaki. 61-66 [doi]
- Functionality and Safety Weaknesses in Integration of Physics-Based Models on Critical Embedded SystemsPhilipp Göttlich, Hans-Christian Reuss. 67-72 [doi]
- Building Resource Adaptations via Test-Based Software Minimization: Application, Challenges, and OpportunitiesArpit Christi, Alex Groce, Austin Wellman. 73-78 [doi]
- Advances in Artefact Quality Analysis for Safety-Critical SystemsEugenio Parra, Luis Alonso, Roy Mendieta, Jose Luis de la Vara. 79-84 [doi]
- A Framework for Resilient Data Management for Smart GridsTheresa Bettmann. 85-88 [doi]
- Recommendation of Refactorings for Improving Dependability AttributesWillian Nalepa Oizumi. 89-92 [doi]
- From Monolithic Architecture to Microservices ArchitectureLorenzo De Lauretis. 93-96 [doi]
- Multi-objective Optimization Research and Applied in Cloud ComputingGuang Peng. 97-99 [doi]
- Search-Based Testing using EFSMsAna Turlea. 100-103 [doi]
- Simulation-Based Testing to Improve Safety of Autonomous RobotsLuca Vittorio Sartori. 104-107 [doi]
- The Performance and Dependability of Control Plane in OpenFlow NetworksZhihao Shang. 108-111 [doi]
- Research Proposal: Reliability Evaluation of the Apache Kafka Streaming SystemHan Wu. 112-113 [doi]
- ISSRE Cares: How the Software Reliability Engineering Community Can Give Back to SocietyJane Huffman Hayes, Tingting Yu. 114-115 [doi]
- On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and IdeasKobra Khanmohammadi, Raphaël Khoury, Abdelwahab Hamou-Lhadj. 116-117 [doi]
- Quantification of the Impact of Random Hardware Faults on Safety-Critical AI Applications: CNN-Based Traffic Sign Recognition Case StudyMichael Beyer, Andrey Morozov, Kai Ding, Sheng Ding, Klaus Janschek. 118-119 [doi]
- A Clone Code Detection Method Based on Software Complex NetworkHaoran Guo, Jun Ai, Tao Shi. 120-121 [doi]
- Advancing Monitoring in Microservices SystemsMarcello Cinque, Raffaele Della Corte, Antonio Pecchia. 122-123 [doi]
- A State Space Suppression Method for Formal Verification of Secure Routing Protocols With SPINHideharu Kojima, Naoto Yanai. 124-125 [doi]
- A Proposal for Security Assessment of Trustzone-M Based SoftwareAntonio Ken Iannillo, Radu State. 126-127 [doi]
- Design for Testability of ERMTS ApplicationsAndrea Riboni, Luca Guglielmo, Matteo Orrù, Pietro Braione, Giovanni Denaro. 128-136 [doi]
- Toward In-Vivo Testing of Mobile ApplicationsMariano Ceccato, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Paolo Tonella. 137-143 [doi]
- Governing Regression Testing in Systems of SystemsAntonia Bertolino, Guglielmo De Angelis, Francesca Lonetti. 144-148 [doi]
- Introducing Trust in Service-Oriented Distributed Systems through BlockchainMarco Autili, Francesco Gallo, Paola Inverardi, Claudio Pompilio, Massimo Tivoli. 149-154 [doi]
- Big-Data Applications as Self-Adaptive Systems of SystemsLuciano Baresi, Giovanni Denaro, Giovanni Quattrocchi. 155-162 [doi]
- Automatic Performance Monitoring and Regression Testing During the Transition from Monolith to MicroservicesAndrea Janes, Barbara Russo. 163-168 [doi]
- Avoiding Faults due to Dangling Dependencies by Synchronization in Microservices ApplicationsAntonio De Iasio, Eugenio Zimeo. 169-176 [doi]
- Resilient Reactive Systems Based on Runtime Semantic ModelsEster Giallonardo, Francesco Poggi, Davide Rossi, Eugenio Zimeo. 177-184 [doi]
- A Hybrid Framework for Web Services Reliability and Performance AssessmentAntonio Guerriero, Raffaela Mirandola, Roberto Pietrantuono, Stefano Russo. 185-192 [doi]
- Anomaly Detection As-a-ServiceMarco Mobilio, Matteo Orrù, Oliviero Riganelli, Alessandro Tundo, Leonardo Mariani. 193-199 [doi]
- Towards Runtime Monitoring for Malicious Behaviors Detection in Smart EcosystemsEmilia Cioroaica, Felicita Di Giandomenico, Thomas Kuhn, Francesca Lonetti, Eda Marchetti, Jasmin Jahic, Frank Schnicke. 200-203 [doi]
- Analysis of Software Aging Impacts on Plant Anomaly Detection with Edge ComputingErmeson C. Andrade, Fumio Machida. 204-210 [doi]
- Stochastic Model for Availability Analysis of Service Function Chains using Rejuvenation and Live MigrationErico A. C. Guedes, Paulo R. M. Maciel. 211-217 [doi]
- Towards Testing the Software Aging Behavior of Hypervisor Hypercall InterfacesLukas Beierlieb, Lukas Iffländer, Aleksandar Milenkoski, Charles F. Gonçalves, Nuno Antunes, Samuel Kounev. 218-224 [doi]
- Rejuvenation and the Age of InformationDaniel S. Menasché, Kishor S. Trivedi, Eitan Altman. 225-231 [doi]
- Software Longevity in the Wild: Folklore and LawMateus Nogueira, Felipe Assis, Daniel Menasché, Geraldo Xexéo, Katinka Wolter. 232-238 [doi]
- A Configurable Software Aging Detection and Rejuvenation Agent for AndroidDomenico Cotroneo, Luigi De Simone, Roberto Natella, Roberto Pietrantuono, Stefano Russo. 239-245 [doi]
- MemDefender: An Allocation Monitoring and Memory Leak Injection Tool for JavaMohammadreza Ghanavati, Artur Andrzejak 0001, Felix Langner. 246-251 [doi]
- Auto-Encoding Robot State Against Sensor Spoofing AttacksSean Rivera, Sofiane Lagraa, Antonio Ken Iannillo, Radu State. 252-257 [doi]
- Mobile App to SGX Enclave Secure ChannelFernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, Radu State. 258-263 [doi]
- Lost in Disclosure: On the Inference of Password Composition PoliciesSaul A. Johnson, João Ferreira, Alexandra Mendes, Julien Cordry. 264-269 [doi]
- The Challenges of Labeling Vulnerability-Contributing CommitsKevin Hogan, Noel Warford, Robert Morrison, David Miller, Sean Malone, James Purtilo. 270-275 [doi]
- Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and DevelopmentJukka Ruohonen, Kalle Rindell. 276-281 [doi]
- To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability NotificationsSerigne Mouhamadane Diop, Jema David Ndibwile, Doudou Fall, Shigeru Kashihara, Youki Kadobayashi. 282-287 [doi]
- Synthetic Dataset Generation with Itemset-Based Generative ModelsChristian Lezcano, Marta Arias. 288-293 [doi]
- Software Framework for Data Fault Injection to Test Machine Learning SystemsJukka K. Nurminen, Tuomas Halvari, Juha Harviainen, Juha Mylläri, Antti Röyskö, Juuso Silvennoinen, Tommi Mikkonen. 294-299 [doi]
- Analyzing and Improving Customer-Side Cloud Security CertifiabilityShujie Zhao, Yiqun Chen, Stefan Winter 0001, Neeraj Suri. 300-307 [doi]
- Isolating Real-Time Safety-Critical Embedded Systems via SGX-Based Lightweight VirtualizationLuigi De Simone, Giovanni Mazzeo. 308-313 [doi]
- EN-50128 Certification-Oriented Design of a Safety-Critical Hard Real-Time KernelCiro Donnarumma, Pietro Fara, Gabriele Serra, Sandro Di Leonardi, Mauro Marinoni. 314-317 [doi]
- Continuous Deployment for Dependable Systems with Continuous Assurance CasesFredrik Warg, Hans Blom, Jonas Borg, Rolf Johansson. 318-325 [doi]
- Integration of Tool Support for Assurance and Certification and for Knowledge-Centric Systems EngineeringJose Luis de la Vara, Eugenio Parra, Luis Alonso, Roy Mendieta, Borja López, Jose María Álvarez Rodríguez. 326-329 [doi]
- ExplicitCase: Tool-Support for Creating and Maintaining Assurance Arguments Integrated with System ModelsCarmen Cârlan, Vivek Nigam, Sebastian Voss, Alexandros Tsalidis. 330-337 [doi]
- Modelling DO-178C Assurance Needs: A Design Assurance Level-Sensitive DSLNicolas Metayer, Andrés Paz, Ghizlane El-Boussaidi. 338-345 [doi]
- On Computer-Aided Techniques for Supporting Safety and Security Co-EngineeringAntoaneta Kondeva, Vivek Nigam, Harald Ruess, Carmen Cârlan. 346-353 [doi]
- Extending Automated FLTL Test Oracles with Diagnostic SupportIngo Pill, Franz Wotawa. 354-361 [doi]
- An Analysis of Factors Affecting Software Safety in the Aerospace IndustryWenlu Li, Qiuying Li. 362-369 [doi]
- Automated Repair of Cross-Site Scripting Vulnerabilities through Unit TestingMahmoud Mohammadi, Bill Chu, Heather Richter Lipford. 370-377 [doi]
- An Empirical Comparison of Two Different Strategies to Automated Fault Detection: Machine Learning Versus Dynamic AnalysisRafig Almaghairbe, Marc Roper. 378-385 [doi]
- Pinpoint Data Races via Testing and ClassificationMarc Hartung, Florian Schintke, Thorsten Schütt. 386-393 [doi]
- TRAK: A Testing Tool for Studying the Reliability of Data Delivery in Apache KafkaHan Wu, Zhihao Shang, Katinka Wolter. 394-397 [doi]
- Automatic Cause Detection of Performance Problems in Web ApplicationsQuentin Fournier, Naser Ezzati Jivan, Daniel Aloise, Michel R. Dagenais. 398-405 [doi]
- TRIADE A Three-Factor Trace Segmentation Method to Support Program ComprehensionRaphaël Khoury, Abdelwahab Hamou-Lhadj, Mohamed Ilyes Rahim, Sylvain Hallé, Fábio Petrillo. 406-413 [doi]
- Multiple Fault-Tolerance Mechanisms in Cloud Systems: A Systematic ReviewPhilippe Marcotte, Frédéric Grégoire, Fabio Petrillo. 414-421 [doi]
- Safe Compilation for Hidden Deterministic Hardware AliasingPeter T. Breuer, Jonathan P. Bowen. 422-427 [doi]
- Chaotic Compilation: A (Statistical) Cloak for a Secret ComputerPeter T. Breuer, Jonathan P. Bowen. 428-433 [doi]
- SHCoT: Secure (and Verified) Hybrid Chain of Trust to Protect from Malicious Software in LightWeight DevicesAbderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hély. 434-439 [doi]
- Flexible Soft Error Mitigation Strategy for Memories in Mixed-Critical SystemsAmer Kajmakovic, Konrad Diwold, Nermin Kajtazovic, Robert Zupanc, Georg Macher. 440-445 [doi]