Abstract is missing.
- Voting in the Presence of Byzantine FaultsLewis Tseng. 1-10 [doi]
- On Dependability, Cost and Security Trade-Off in Cloud Data CentersSubrota K. Mondal, Abadhan S. Sabyasachi, Jogesh K. Muppala. 11-19 [doi]
- Accelerating Integrity Verification on Secure Processors by Promissory HashMizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai. 20-29 [doi]
- Robust ORAM: Enhancing Availability, Confidentiality and IntegrityTran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota. 30-39 [doi]
- Resilience Benchmarking of Transactional Systems: Experimental Study of Alternative MetricsRaquel Almeida, Afonso Araújo Neto, Henrique Madeira. 40-49 [doi]
- Mercury: Performance and Dependability Evaluation of Systems with Exponential, Expolynomial, and General DistributionsPaulo R. M. Maciel, Rubens de S. Matos, Bruno Silva, Jair Figueiredo, Danilo Oliveira, Iure Fe, Ronierison Maciel, Jamilson Dantas. 50-57 [doi]
- Detection of Recovery Patterns in Cluster Systems Using Resource Usage DataNentawe Gurumdimma, Arshad Jhumka. 58-67 [doi]
- Light-Weight Techniques for Improving the Controllability and Efficiency of ISA-Level Fault Injection ToolsBehrooz Sangchoolie, Roger Johansson, Johan Karlsson. 68-77 [doi]
- Generating High Strength Test Suites for Combinatorial Interaction Testing Using ZDD-Based Graph AlgorithmsTeru Ohashi, Tatsuhiro Tsuchiya. 78-85 [doi]
- Expolynomial Modelling for Supporting VANET Infrastructure PlanningAleciano Lobo Junior, Rubens de S. Matos, Bruno Silva, Paulo R. M. Maciel. 86-91 [doi]
- Meeting the Challenges of Critical and Extreme Dependability and SecurityPaulo Jorge Esteves Veríssimo, Marcus Völp, Jeremie Decouchant, Vincent Rahli, Francisco Rocha. 92-97 [doi]
- Increasing the Accuracy of Cost and Availability Predictions of Quorum ProtocolsRobert Schadek, Oliver E. Theel. 98-103 [doi]
- A Rejuvenation Strategy of Two-Granularity Software Based on Adaptive ControlYunyu Fang, Bei-Bei Yin, Gao-Rong Ning, Zheng Zheng, Kai-Yuan Cai. 104-109 [doi]
- A Built-in Circuit for Self-Repairing Mesh-Connected Processor Arrays with Spares on DiagonalItsuo Takanami, Masaru Fukushi. 110-117 [doi]
- Key Management in Internet of Things via Kronecker ProductI-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo. 118-124 [doi]
- Soft Errors Susceptibility of Virtualization ServersFrederico Cerveira, Raul Barbosa, Henrique Madeira. 125-134 [doi]
- An Empirical Investigation of Fault Triggers in Android Operating SystemFangyun Qin, Zheng Zheng, Xiaodan Li, Yu Qiao, Kishor S. Trivedi. 135-144 [doi]
- Learning Process Behavioral Baselines for Anomaly DetectionAhmed M. Fawaz, William H. Sanders. 145-154 [doi]
- Integration of Integrity Enforcing Technologies into Embedded Control Devices: Experiences and EvaluationTobias Rauter, Andrea Höller, Johannes Iber, Michael Krisper, Christian Kreiner. 155-164 [doi]
- Application of Congestion Notifications in a Cyber-Physical SystemStephen Jackson, Bruce M. McMillin. 165-174 [doi]
- SeReCP: A Secure and Reliable Communication Platform for the Smart GridKubilay Demir, Neeraj Suri. 175-184 [doi]
- Designing Networks-on-Chip for High Assurance Real-Time SystemsEberle A. Rambo, Christoph Seitz, Selma Saidi, Rolf Ernst. 185-194 [doi]
- Multi-site Synchronous VM Replication for Persistent Systems with Asymmetric Read/Write LatenciesVasily A. Sartakov, Rüdiger Kapitza. 195-204 [doi]
- Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience ReportBernard Lim, Daniel Chen, Yongkyu An, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 205-210 [doi]
- Fast Controller Switching for Fault-Tolerant Cyber-Physical Systems on Software-Defined NetworksSeunghyun Yoon, Jiae Lee, Yohan Kim, Sunghwan Kim, Hyuk Lim. 211-212 [doi]
- Spare-Tile-Based Dependable Logic Design for Sea-of-Tiles Architecture with Ambipolar DevicesDan Takahashi, Masayuki Arai. 213-214 [doi]
- Erasure-Code-Based DTN Multi-path Routing for Contact AvoidanceHironori Arai, Masayuki Arai. 215-216 [doi]
- A Diagnostic Fault Simulation Method for a Single Universal Logical Fault ModelToshinori Hosokawa, Hideyuki Takano, Hiroshi Yamazaki, Koji Yamazaki. 217-218 [doi]
- Bitcoin's Consistency PropertyLewis Tseng. 219-220 [doi]
- A Hardware Trojan Circuit Detection Method Using Activation Sequence GenerationsMasayoshi Yoshimura, Tomohiro Bouyashiki, Toshinori Hosokawa. 221-222 [doi]
- Efficient Fault-Tolerant Clock Synchronization in Ring TopologiesKlaus Echtle, Zoha Moztarzadeh. 223-224 [doi]
- Towards Outsourced Privacy-Preserving Multiparty DBSCANMohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto. 225-226 [doi]
- Instagram Spam DetectionWuxain Zhang, Hung-Min Sun. 227-228 [doi]
- Dependability Evaluation of AFDX Real-Time Avionic Communication NetworksArmin Zimmermann, Paulo R. M. Maciel. 229-230 [doi]
- Smart Cage Implementation with Dependable Safety Agent for DogsKiat Siong Ng, Pei-Yin Chen, Pi-Hui Ting. 231-232 [doi]
- Trend Analyses of Failures in Information Systems: A Case Study on Communications Networks and Financial Information SystemsKoichi Bando, Yutaka Matsuno, Yang Ishigaki, Kenji Tanaka. 233-234 [doi]
- Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical SystemsGiedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya Mathur. 235-244 [doi]
- An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation MechanismsGuillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. 245-254 [doi]
- Capacity-Oriented Availability Model for Resources Estimation on Private Cloud InfrastructureCarlos Melo, Rubens de S. Matos, Jamilson Dantas, Paulo R. M. Maciel. 255-260 [doi]
- Method and Case Study of Model Checking Concurrent Systems That Use Unbounded TimestampsShinya Nakano, Tatsuhiro Tsuchiya. 261-266 [doi]
- Formal Specification and Verification of Security GuidelinesZeineb Zhioua, Yves Roudier, Rabea Boulifa Ameur. 267-273 [doi]
- On Train Automatic Stop Control Using Balises: Attacks and a Software-Only CountermeasureWilliam G. Temple, Bao Anh N. Tran, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders. 274-283 [doi]
- Electromagnetic Noise Tolerant Hybrid Communication Protocol for CANsMuneyuki Nakamura, Koji Konomi, Mamoru Ohara, Kazuya Sakai, Satoshi Fukumoto. 284-291 [doi]
- MEC: Network Optimized Multi-stage Erasure Coding for Scalable Storage SystemsHiroaki Akutsu, Takahiro Yamamoto, Kazunori Ueda, Hideo Saito. 292-300 [doi]
- A Novel Highly Available Data Replication Strategy Exploiting Data Semantics, Coding Techniques and Prior At-Hand KnowledgeAwais Usman, Robert Schadek, Oliver E. Theel. 301-310 [doi]
- A Probabilistic Analysis of a Leader Election Protocol for Virtual Traffic LightsNegin Fathollahnejad, Raul Barbosa, Johan Karlsson. 311-320 [doi]
- Specification, Implementation and Verification of Dynamic Group Membership for Vehicle CoordinationMikael Asplund, Jakob Lovhall, Emília Villani. 321-328 [doi]
- Accounting for the Human User in Predictive Security ModelsMohammad A. Noureddine, Andrew Marturano, Ken Keefe, Masooda Bashir, William H. Sanders. 329-338 [doi]
- Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential PrivacyHung-Li Chen, Jia-Yang Chen, Yao-Tung Tsou, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Chia-Ming Lin. 339-347 [doi]