Abstract is missing.
- Do Nothing, But Carefully: Fault Tolerance with Timing Guarantees for Multiprocessor Systems Devoid of Online AdaptationGeorg von der Bruggen, Lea Schonberger, Jian-Jia Chen. 1-10 [doi]
- Degradable Restructuring of Mesh-Connected Processor Arrays with Spares on Orthogonal SidesItsuo Takanami, Masaru Fukushi. 11-14 [doi]
- SSCMSD - Single-Symbol Correction Multi-symbol Detection for DRAM SubsystemRavikiran Yeleswarapu, Arun K. Somani. 15-24 [doi]
- Exploring the Relationship Between Dimensionality Reduction and Private Data ReleaseBo-Chen Tai, Szu-Chuang Li, Yennun Huang, Neeraj Suri, Pang-Chieh Wang. 25-33 [doi]
- A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email EncryptionJyh-haw Yeh, Srisarguru Sridhar, Gaby G. Dagher, Hung-Min Sun, Ning Shen, Kathleen Dakota White. 34-43 [doi]
- InfoLeak: Scheduling-Based Information LeakageTsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri. 44-53 [doi]
- Experimental Resilience Assessment of an Open-Source Driving AgentAbu Hasnat Mohammad Rubaiyat, Yongming Qin, Homa Alemzadeh. 54-63 [doi]
- Cyber-Physical Transactions: A Method for Securing VANETs with BlockchainsMatthew Wagner, Bruce McMillin. 64-73 [doi]
- Cyber-Physical Security of an Electric MicrogridPrashanth Palaniswamy, Bruce McMillin. 74-83 [doi]
- An Approach for Trustworthiness Benchmarking Using Software MetricsNadia Patricia Da Silva Medeiros, Naghmeh Ivaki, Pedro Costa 0002, Marco Vieira. 84-93 [doi]
- Economic Analysis of Blockchain Technology on Digital Platform MarketHyojung Lee, Kiwoon Sung, Kyusang Lee, Jaeseok Lee, Seungjai Min. 94-103 [doi]
- Specification and Formal Verification of Atomic Concurrent Real-Time TransactionsSimin Cai, Barbara Gallina, Dag Nyström, Cristina Seceleanu. 104-114 [doi]
- An Approach for Formal Analysis of the Security of a Water Treatment TestbedSai Sidharth Patlolla, Bruce McMillin, Sridhar Adepu, Aditya Mathur. 115-124 [doi]
- Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical SystemsCarmen Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen, William G. Temple, William H. Sanders. 125-134 [doi]
- Modeling the Required Indoor Temperature Change by Hybrid Automata for Detecting Thermal ProblemsZhengguo Yang, Toshiaki Aoki, Yasuo Tan. 135-144 [doi]
- Software Test-Run Reliability Modeling with Non-homogeneous Binomial ProcessesYunlu Zhao, Tadashi Dohi, Hiroyuki Okamura. 145-154 [doi]
- Effects of GPS Spoofing on Unmanned Aerial VehiclesDaniel Mendes, Naghmeh Ivaki, Henrique Madeira. 155-160 [doi]
- DynPolAC: Dynamic Policy-Based Access Control for IoT SystemsMehdi Karimibiuki, Ekta Aggarwal, Karthik Pattabiraman, André Ivanov. 161-170 [doi]
- Evaluating the Security of IoT Networks with Mobile DevicesAmelia Samandari, Mengmeng Ge, Jin Bum Hong, Dong Seong Kim. 171-180 [doi]
- Restructuring Mesh-Connected Processor Arrays with Spares on Four Sides by Orthogonal Side RotationItsuo Takanami, Masaru Fukushi. 181-182 [doi]
- Applying Metamorphic Testing to e-Commerce Product Search EnginesShu Nagai, Tatsuhiro Tsuchiya. 183-184 [doi]
- On the Detection of Side-Channel AttacksTsvetoslava Vateva-Gurova, Neeraj Suri. 185-186 [doi]
- Research on Convolutional Codes are Used in RAIDTianyi Zhang, Masato Kitakami. 187-188 [doi]
- On IoT Misbehavior Detection in Cyber Physical SystemsIlsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho. 189-190 [doi]
- A SAT-Based Approach for SDN Rule Table DistributionRyota Ogasawara, Masayuki Arai. 191-192 [doi]
- FastFI: Accelerating Software Fault InjectionsOliver Schwahn, Nicolas Coppik, Stefan Winter 0001, Neeraj Suri. 193-202 [doi]
- Control Flow Checking Optimization Based on Regular Patterns AnalysisZhiqi Zhu, Joseph Callenes-Sloan, Benjamin Carrión Schäfer. 203-212 [doi]
- An Improved Data Error Detection Technique for Dependable Embedded SoftwareVenu Babu Thati, Jens Vankeirsbilck, Niels Penneman, Davy Pissoort, Jeroen Boydens. 213-220 [doi]
- Methods for Approximate Adders Reliability Estimation Based on PTM ModelJianhui Jiang, Guangming Lu, Zhen Wang. 221-222 [doi]
- Mobile Software Security with Dynamic AnalysisHossain Shahriar, Kai Qian, Md Arabin Islam Talukder, Dan Chia-Tien Lo, Nidhibahen Patel. 223-224 [doi]
- Attempt to Apply Machine Learning to a Failure Database - A Case Study on Communications NetworksKoichi Bando, Kenji Tanaka 0001. 225-226 [doi]
- An Attack-Tolerant Agreement Algorithm for Block ChainMasato Kitakami, Kazuki Matsuoka. 227-228 [doi]
- Towards a Security-Enhanced Cloud PlatformJunsik Seo, Jaehyun Nam, Seungwon Shin. 229-230 [doi]
- Software-Defined Dependable Computing for SpacecraftChristian M. Fuchs, Nadia M. Murillo, Aske Plaat, Erik van der Kouwe, Daniel Harsono, Peng Wang. 231-232 [doi]
- Deriving Fault Locating Test Cases from Constrained Covering ArraysHao Jin, Tatsuhiro Tsuchiya. 233-240 [doi]
- On the Effectiveness of Code Normalization for Function IdentificationAngelos Oikonomopoulos, Remco Vermeulen, Cristiano Giuffrida, Herbert Bos. 241-251 [doi]
- Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoTLi-Sheng Chen, Wei-Ho Chung, Ing-Yi Chen, Sy-Yen Kuo. 252-256 [doi]
- ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware FamilyShun-Chieh Chang, Yeali S. Sun, Wu-Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi 0001. 257-262 [doi]
- Enforcing Enterprise Mobile Application Security Policy with Plugin FrameworkPang-Yang Chu, Wei-Huan Lu, Jun-Wei Lin, Yu-Sung Wu. 263-268 [doi]
- Detecting Malicious Web Scraping Activity: A Study with Diverse DetectorsPedro Marques, Zayani Dabbabi, Miruna-Mihaela Mironescu, Olivier Thonnard, Alysson Bessani, Frances V. Buontempo, Ilir Gashi. 269-278 [doi]
- On Algorithms Selection for Unsupervised Anomaly DetectionTommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli. 279-288 [doi]
- Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor NetworksNesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota. 289-298 [doi]
- Semantic Failover in Software-Defined NetworkingShu-Wen Hsueh, Tung-Yueh Lin, Weng-Ian Lei, Chi-Leung Patrick Ngai, Yu-Hang Sheng, Yu-Sung Wu. 299-308 [doi]