Abstract is missing.
- Building Resilient ML Applications using Ensembles against Faulty Training DataAbraham Chan. 1-4 [doi]
- Early Detection of Unknown Attacks with Algorithms for Structured DataTommaso Puccetti. 5-8 [doi]
- Enhancing White-Box Search-Based Testing of RESTful APIsAmid Golmohammadi. 9-12 [doi]
- Reviewing and Proposing Approaches for Self-adaptive Testing in the FieldSamira Silva. 13-16 [doi]
- Revolutionizing Log Parsing for Modern Software SystemsStefan Petrescu. 17-21 [doi]
- Security Assessment and Hardening of Fog Computing SystemsCarmine Cesarano. 22-25 [doi]
- Toward an efficient End-to-End test suite executionCristian Augusto. 26-29 [doi]
- Towards human-centric software complexity metrics: a neuroscience-based approachHao Gao. 30-33 [doi]
- Automatic Bug Fixing via Deliberate Problem Solving with Large Language ModelsGuoyang Weng, Artur Andrzejak 0001. 34-36 [doi]
- On the Efficacy of Smart Contract Analysis ToolsSilvia Bonomi, Stefano Cappai, Emilio Coppa. 37-38 [doi]
- Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with PrivilegesMarek R. Ogiela, Urszula Ogiela. 39-40 [doi]
- Safety Assurance of a Driverless Regional Train -Insight in the safe.trAIn ProjectMarc Zeller, Thomas Waschulzik, Martin Rothfelder, Cornel Klein. 41-42 [doi]
- Software Defect Prediction by Online Learning Considering Defect OverlookingYuta Yamasaki, Nikolay Fedorov, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai. 43-44 [doi]
- A Fault Injection and Formal Verification Framework Based on UML Sequence DiagramsHezhen Liu, Jiacheng Yin, Chengqiang Huang, Hao Lan, Zhi Jin, Zheng Zheng, Xun Zhang. 45-50 [doi]
- Bridging the Gap Between System Architecture and Software Design using Model TransformationFaezeh Siavashi, Horacio Hoyos Rodriguez, Vera Pantelic, Mark Lawford, Richard F. Paige, Monika Jaskolka, Guanrui Hou, Alessandro Verde. 51-56 [doi]
- CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC NetworksAmin Fakhereldine, Mohammad Zulkernine, Dan Murdock. 57-62 [doi]
- HRCA: A Heterogeneous Graph-based Adaptive Root Cause Analysis FrameworkEnyu Yu, Hui Dong, Yuxiang Ren, Minzhi Yan, Xuecang Zhang, Yi Yang, Le Yue, Zhengbin Huang. 63-68 [doi]
- Precise Dynamic Data Race Prediction for Interrupt-Driven Embedded SoftwareTingting Yu, Chunpeng Jia, Rui Chen, Chao Li, Boxiang Wang, Yunsong Jiang. 69-74 [doi]
- Semi-formal and formal specification of a telerehabilitation system for chronic respiratory diseases: methodology and feedbackAnne-lise Courbis, Farid Arfi, Thomas Lambolais, François Bughin, Maurice Hayot. 75-80 [doi]
- Towards Multi-Language Static Code AnalysisSanaa Siddiqui, Ravindra Metta, Kumar Madhukar. 81-82 [doi]
- When Simulator Meets Natural Deviation: A Study on Deviations in Simulation-based ADS TestingRenzhi Wang, Zhijie Wang, Yuheng Huang, Lei Ma 0003. 83-88 [doi]
- Formalization and Verification of the ICC Mechanism in Android System Using CSPYixiao Lv, Jiaqi Yin, Sini Chen, Huibiao Zhu. 89-95 [doi]
- Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex SystemsNoor Al-Gburi, Attila Klenik, Imre Kocsis. 96-102 [doi]
- Software Reliability Prediction via Neural NetworkWataru Zama, Xiao Xiao. 103-107 [doi]
- Towards Predicting Source Code Changes Based on Natural Language Processing Models: An Empirical EvaluationYuto Kaibe, Hiroyuki Okamura, Tadashi Dohi. 108-111 [doi]
- Software Vulnerability Detection using Large Language ModelsMoumita Das Purba, Arpita Ghosh, Benjamin J. Radford, Bill Chu. 112-119 [doi]
- Discriminating Human-authored from ChatGPT-Generated Code Via Discernable Feature AnalysisKe Li, Sheng Hong, Cai Fu, Yunhe Zhang, Ming Liu. 120-127 [doi]
- Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated CodeCristina Improta. 128-131 [doi]
- Simulation Environment for the Evaluation of Lightweight Intrusion Detection SystemsSimona De Vivo, Pietro Liguori. 132-135 [doi]
- DroidSecTester: Towards context-driven modelling and detection of Android application vulnerabilitiesIvan Baheux, Oum-El-Kheir Aktouf, Mohammed El Amin Tebib, Mariem Graa, Pascal André, Yves Ledru. 136-141 [doi]
- Finding Needle in a Haystack: An Algorithm for Real-Time Log Anomaly Detection with Real-Time LearningPrachi Chitnis, Abhaya Asthana. 142-147 [doi]
- Risk-Aware Intrusion Detection and Prevention System for Automated UASRaphael Schermann, Thomas Ammerer, Philipp Stelzer, Georg Macher, Christian Steger. 148-153 [doi]
- A Bayesian Network-Based Analysis of Changing Impact of Organizational Goals on Software DevelopmentKiyoshi Honda, Naohiro Hashimoto, Hironori Washizaki, Yoshiaki Fukazawa, Masahiro Taga, Akira Matsuzaki, Kazuyuki Nakagawa, Yusuke Sakai. 154-159 [doi]
- Modeling Moving Target Defense strategies and attacks with SAN and ADVISEFrancesco Mariotti, Lorenzo Manetti, Paolo Lollini. 160-161 [doi]
- The GOLDS satellite constellation: preparatory works for a model-based performability analysisFrancesco Mariotti, Paolo Lollini, Fátima Mattiello-Francisco. 162-163 [doi]
- Towards Robust Visual Odometry Systems Against Camera Lens FailuresLorenzo Sarti, Hudson Martins Silva Bruno, Tommaso Puccetti, Esther Colombini, Andrea Ceccarelli. 164-165 [doi]
- Validating the BIECO Security Evaluation Methodology within a Smart Grid Monitoring SWIrene Bicchierai, Enrico Araniti, Sara Nieves Matheu-García, Juan Francisco Martínez Gil. 166-173 [doi]
- A robust online extrinsic calibration method for GNSS-RTK and IMU system and vehicle setupsPeng Wang, Qingyang Xu, Siyun Yao, Xiangfei Wu, Qunli Zhang, Ruichen Lv, Shiming Liu, Yamin Li, Hui Fang, Zheng Hu. 174-179 [doi]
- A Survey of Metrics to Enhance Training Dependability in Large Language ModelsWenyi Fang, Hao Zhang, Ziyu Gong, Longbin Zeng, Xuhui Lu, Biao Liu, Xiaoyu Wu, Yang Zheng, Zheng Hu, Xun Zhang. 180-185 [doi]
- Black-Box Test Case Prioritization Using Log Analysis and Test Case DiversityXiaolei Yu, Kai Jia, Wenhua Hu, Jing Tian, Jianwen Xiang. 186-191 [doi]
- Runtime operational design domain monitoring of static road geometry for automated vehiclesShiming Liu, Qunli Zhang, Wei Li, Siyun Yao, Yucheng Mu, Zheng Hu. 192-197 [doi]
- Assessment of Aging and Rejuvenation for Resiliency in Heterogeneous Network ClustersAlberto Avritzer, Andrea Janes, Andrea Marin, André van Hoorn, Matteo Camilli, Catia Trubiani, Daniel S. Menasché. 198-205 [doi]
- Cross-Project Aging-Related Bug Prediction Based on Feature Transfer and Class Imbalance LearningWenzhi Xie, Chen Zhang, Kai Jia, Dongdong Zhao 0001, Junwei Zhou, Jing Tian, Jianwen Xiang. 206-213 [doi]
- Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural NetworksYunzhe Tian, Yike Li, Kang Chen, Endong Tong, Wenjia Niu, Jiqiang Liu, Fangyun Qin, Zheng Zheng 0001. 214-221 [doi]
- Software Aging Analysis in a Testing FrameworkDouglas Dias, Fumio Machida, Ermeson C. Andrade. 222-229 [doi]