Abstract is missing.
- Semi-automated model extraction from observations for dependability analysisAndrás Földvári, András Pataricza. 1-6 [doi]
- Within-Project Software Aging Defect Prediction Based on Active LearningMengting Liang, Dimeng Li, Bin Xu, Dongdong Zhao 0001, Xiao Yu, Jianwen Xiang. 1-8 [doi]
- RusBox: Towards Efficient and Adaptive Sandboxing for RustWanrong Ouyang, Baojian Hua. 1-2 [doi]
- Sensitivity Analysis of Software Rejuvenation Model with Markov Regenerative ProcessJunjun Zheng, Hiroyuki Okamura, Tadashi Dohi. 9-16 [doi]
- Aging and Rejuvenation Models of Load Changing Attacks in Micro-GridsRicardo M. Czekster, Alberto Avritzer, Daniel Sadoc Menasché. 17-24 [doi]
- On the Necessity of Explicit Artifact Links in Safety Assurance Cases for Machine LearningLydia Gauerhof, Roman Gansch, Christian Heinzemann, Matthias Woehrle, Andreas Heyl. 23-28 [doi]
- Evaluation of software aging in component-based Web Applications subject to soft errors over timeJacopo Parri, Samuele Sampietro, Leonardo Scommegna, Enrico Vicario. 25-32 [doi]
- Memory Degradation Analysis in Private and Public Cloud EnvironmentsErmeson Carneiro de Andrade, Fumio Machida, Roberto Pietrantuono, Domenico Cotroneo. 33-39 [doi]
- My Services Got Old! Can Kubernetes Handle the Aging of Microservices?José Flora, Paulo Gonçalves, Miguel Teixeira, Nuno Antunes. 40-47 [doi]
- Software Testing Strategies for Detecting Hypercall Handlers' Aging-related BugsLukas Beierlieb, Alberto Avritzer, Lukas Iffländer, Nuno Antunes, Aleksandar Milenkoski, Samuel Kounev. 48-55 [doi]
- Recommendations for the Usage of Design Models in Aviation SoftwareAndré Sarkis, Johnny Cardoso Marques, Luiz Alberto Vieira Dias. 56-63 [doi]
- (WiP) LLTFI: Low-Level Tensor Fault InjectorAbraham Chan, Udit Kumar Agarwal, Karthik Pattabiraman. 64-68 [doi]
- From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services SectorVincent Tan, Carmen Cheh, Binbin Chen. 69-76 [doi]
- Software Requirement Criteria based on Human ErrorsFuqun Huang. 77-82 [doi]
- A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random TestingJinfu Chen 0001, Jingyi Chen, Saihua Cai, Haibo Chen 0005, Chi Zhang 0046, Chuangfei Huang. 83-90 [doi]
- An efficient dual ensemble software defect prediction method with neural networkJinfu Chen 0001, Jiaping Xu, Saihua Cai, Xiaoli Wang, Yuechao Gu, Shuhui Wang. 91-98 [doi]
- KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and SimilarityJinfu Chen 0001, Yuechao Gu, Saihua Cai, Haibo Chen 0005, Jingyi Chen. 105-110 [doi]
- Input/Output Check Bugs Taxonomy: Injection Errors in SpotlightIrena Bojanova, Carlos Eduardo Galhardo, Sara Moshtari. 111-120 [doi]
- Genetic Algorithm for Scheduling Communication Networks in Time-Triggered Systems-of-SystemsSetareh Majidi, Roman Obermaisser. 121-128 [doi]
- Automatic Extraction of Behavioral Features for Test Program Similarity AnalysisEmanuele De Angelis, Alessandro Pellegrini 0001, Maurizio Proietti. 129-136 [doi]
- IDEA: Runtime Collection of Android DataLuciano Baresi, Kostandin Caushi. 137-143 [doi]
- Migration of Monoliths through the Synthesis of Microservices using Combinatorial OptimizationGianluca Filippone, Marco Autili, Fabrizio Rossi, Massimo Tivoli. 144-147 [doi]
- Issue Categorization and Analysis of an Open-Source Driving Assistant SystemShuncheng Tang, Zhenya Zhang, Jia Tang, Lei Ma 0003, Yinxing Xue. 148-153 [doi]
- MC-FGSM: Black-box Adversarial Attack for Deep Learning SystemWenqiang Zheng, Yan-fu Li. 154-159 [doi]
- Semantic Learning and Understanding of multivehicle interaction patterns Using Primitive Driving Patterns With Bayesian Nonparametric ApproachesLulu Jia, Dezhen Yang, Yi Ren 0003, Cheng Qian 0003, Zhifeng Li. 160-165 [doi]
- Safe and Secure: Mutually Supporting Safety and Security Analyses with Model-Based SuggestionsBastian Kruck, Peter Munk, Daniel Angermeier. 172-181 [doi]
- A Combinatorial Reliability Analysis of Dynamic Fault Trees with Priority-AND GatesPiaoyi Liu, Siwei Zhou, Luyao Ye, Dongdong Zhao 0001, Jianwen Xiang. 182-188 [doi]
- $^{\prime}\mathbf{R}$: Towards Detecting and Understanding Code-Document Violations in RustWanrong Ouyang, Baojian Hua. 189-197 [doi]
- Computation Offloading and Task Scheduling with Fault-Tolerance for Minimizing Redundancy in Edge ComputingXinying Liu, Jianhui Jiang, Long Li. 198-209 [doi]
- Reliability Analysis of Systems Subject to Imperfect Fault Coverage Considering Failure Propagation and Component RelevancyChuanli Wu, Zixiang Wang, Siwei Zhou, Dongdong Zhao 0001, Jing Tian, Jianwen Xiang. 210-217 [doi]
- Methods for deep learning model failure detection and model adaption: A surveyXiaoyu Wu, Zheng Hu, Ke Pei, Liyan Song, Zhi Cao, Shuyi Zhang. 218-223 [doi]
- Predicting gray fault based on context graph in container-based cloudSiyu Yu, Ningjiang Chen, Birui Liang. 224-234 [doi]
- MindFI: A Fault Injection Tool for Reliability Assessment of MindSpore ApplicacionsYang Zheng, Zhenye Feng, Zheng Hu, Ke Pei. 235-238 [doi]
- Important-unit Coverage for Recurrent Neural NetworkXu Liu, Honghui Li, Rui Wang, Zhouxian Jiang. 245-249 [doi]
- Multi-Scale Software Network Model for Software Safety of the Intended FunctionalityZhitao Wu, Xiaoming Yang, Ping Chen, Zongshun Qu, Jun Lin. 250-255 [doi]
- Network Intrusion Detection by an Approximate Logic Neural ModelJiajun Zhao, Qiuzhen Lin, Junkai Ji. 256-261 [doi]
- Meaningful color image encryption algorithm based on compressive sensing and chaotic mapMin Liu, Guodong Ye, Qiuzhen Lin. 262-265 [doi]
- Detection of IoT Devices That Mine CryptocurrencyWei Zheng, Liangbo Hou, Junming Yu, Fei Chen. 266-271 [doi]
- Rustpi: A Rust-powered Reliable Micro-kernel Operating SystemYuanzhi Liang, Lei Wang, Siran Li, Bo Jiang. 272-273 [doi]
- Targeted Code Inspection based on Human ErrorsFuqun Huang, Henrique Madeira. 274-275 [doi]
- Assurance Carrying Code for Software Supply ChainYutaka Matsuno, Yoriyuki Yamagata, Hideaki Nishihara, Yuichiro Hosokawa. 276-277 [doi]
- A Static Analysis Framework for Detecting Bugs in Introductory ProgramsWenchu Xu, Yanran Ma. 278-279 [doi]
- Multi-Feature Fusion based Image Steganography using GANZhen Wang, Zhen Zhang, Jianhui Jiang. 280-281 [doi]
- Exception Handling Recommendation Based on Self-Attention NetworkKai Lin, Chuanqi Tao, Zhiqiu Huang. 282-283 [doi]
- When is Continuous Integration Useful? Empirical Study on Team Size and Reporters in DevelopmentNaoko Imai, Hironori Washizaki, Naohiko Tsuda, Yoshiaki Fukazawa. 284-285 [doi]
- Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality SystemsMarco Barletta, Marcello Cinque, Raffaele Della Corte. 286-287 [doi]
- SourceSnippet2Binary: A Method for Searching Vulnerable Source Code Snippets in BinariesQinqin Wu, Hao Huang, Yi Tang, Zhenwei Gu, Ang Jia. 288-289 [doi]
- Eye Tracking Sensors as a Contactless Interfaces in Wireless Security ProtocolsMarek R. Ogiela, Lidia Ogiela. 290-291 [doi]
- Information Hiding using Bucket SteganographyKatarzyna Koptyra, Marek R. Ogiela. 292-293 [doi]
- Dynamic Filtering and Prioritization of Static Code Analysis AlertsUlas Yüksel, Hasan Sözer. 294-295 [doi]
- ColocationSim: Simulate Colocation Datacenter with Microservices and Performance InterferenceKangjin Wang, Ying Li. 296-297 [doi]
- Software Security Readiness and DeploymentSaikath Bhattacharya, Munindar P. Singh, Laurie A. Williams. 298-299 [doi]
- A Runtime Monitoring Based Fuzzing Framework for Temporal PropertiesJinjian Luo, Meixi Liu, Yunlai Luo, Zhenbang Chen, Yufeng Zhang 0001. 300-301 [doi]
- Online Log Parsing: Preliminary Literature ReviewScott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa. 304-305 [doi]
- TSAI - Test Selection using Artificial Intelligence for the Support of Continuous IntegrationMaria Laura Brzezinski Meyer. 306-309 [doi]
- Mining Numerical Relations for Improving Software ReliabilityBo Zhang. 310-313 [doi]
- A next-generation platform for Cyber Range-as-a-ServiceVittorio Orbinato. 314-318 [doi]
- Failure Prediction for Cloud Applications through Ensemble LearningJomar Domingos. 319-322 [doi]
- Generation and Verification of Executable Assurance Case by Model-based EngineeringFang Yan. 323-326 [doi]
- System-specific risk rating of software vulnerabilities in industrial automation & control systemsMonika Maidl, Dirk Kröselberg, Tiange Zhao, Tobias Limmer. 327-332 [doi]
- Patternika: A Pattern-Mining-Based Tool For Automatic Library MigrationEkaterina Blech, Andrey Grishchenko, Ivan Kniazkov, Guangtai Liang, Oleg Serebrennikov, Andrei Tatarnikov, Polina Volkhontseva, Kuzma Yakimets. 333-338 [doi]
- Innovation evaluation framework using state transition probability of the productKumi Jinzenji, Akio Jin, Tatsuya Muramoto. 339-344 [doi]
- The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case StudyLuigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Irene Bonetti, Elena Spagnuolo. 345-352 [doi]
- Genetic Algorithm-based Testing of Industrial Elevators under Passenger UncertaintyJoritz Galarraga, Aitor Arrieta Marcos, Shaukat Ali 0001, Goiuria Sagardui, Maite Arratibel. 353-358 [doi]
- MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic LearningXu Duan, JingZheng Wu, Mengnan Du, Tianyue Luo, Mutian Yang, Yanjun Wu. 359-364 [doi]
- Diktat: Lightweight Static Analysis for KotlinAndrey Kuleshov, Petr Trifanov, Vladislav Frolov, Guangtai Liang. 365-370 [doi]
- Towards a Secure Software Lifecycle for Autonomous VehiclesLama J. Moukahal, Mohammad Zulkernine, Martin Soukup. 371-377 [doi]
- Continuous Testing and SLA Management of 5G Networks for Industrial AutomationCatello Di Martino, Anwar Walid. 378-386 [doi]
- Disclosing the Fragility Problem of Virtual Safety Testing for Autonomous Driving SystemsZhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li 0001. 387-392 [doi]
- SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance SystemsYuta Akiya, Kyle Thomas Le, Megan Luong, Justin C. Wilson, Anas Salah Eddin, Valerio Formicola, Mohamed El-Hadedy. 393-398 [doi]
- ReSwitcher: Automatically Refactoring Java Programs for Switch ExpressionYang Zhang, Chaoshuai Li, Shuai Shao. 399-400 [doi]
- Evolution of the IEEE P7009 Standard: Towards Fail-Safe Design of Autonomous SystemsMarie Farrell, Matt Luckcuck, Laura Pullum, Michael Fisher 0001, Ali Hessami, Danit Gal, Zvikomborero Murahwi, Ken Wallace. 401-406 [doi]
- Kubernetes for Cloud Container Orchestration Versus Containers as a Service (CaaS): Practical InsightsSenecca Miller, Travis Siems, Vidroha Debroy. 407-408 [doi]
- Classification of Testable and Valuable User Stories by using Supervised Machine Learning ClassifiersIshan Mani Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Singh Walia. 409-414 [doi]
- The Necessity of Low-code Engineering for Industrial Software Development: A Case Study and ReflectionsYi Wang, Yang Feng, Min Zhang, Pu Sun. 415-420 [doi]
- Automatic Issue Classifier: A Transfer Learning Framework for Classifying Issue ReportsAnas Nadeem, Muhammad Usman Sarwar, Muhammad Zubair Malik. 421-426 [doi]
- How Far Have We Come in Fault Tolerance for Distributed Graph Processing: A Quantitative Assessment of Fault Tolerance EffectivenessChengbo Zhang, Ying Li, Yong Yang, Tong Jia, Zhirong Hou. 427-432 [doi]
- Changes in Intent: Behavioral Predictions of Distributed SDN Controller ReconfigurationYuming Wu, Nishok Narasimha Mohanasamy, Lalita Jagadeesan, Muntasir Raihan Rahman. 433-438 [doi]