Abstract is missing.
- Handling Noise in Search-Based Scenario Generation for Autonomous Driving SystemsStefan Klikovits, Paolo Arcaini. 1-6 [doi]
- Egalitarian Byzantine Fault ToleranceMichael Eischer, Tobias Distler. 1-10 [doi]
- Measuring lead times for failure predictionFrederico Cerveira, Jomar Domingos, Raul Barbosa, Henrique Madeira. 1-5 [doi]
- Machine Learning Techniques for the Prediction of NoC Core Mapping PerformanceB. Naresh Kumar Reddy, Subrat Kar. 1-4 [doi]
- Benchmarking Safety Monitors for Image Classifiers with Machine LearningRaul Sena Ferreira, Jean Arlat, Jérémie Guiochet, Hélène Waeselynck. 7-16 [doi]
- An Empirical Evaluation of the Effectiveness of Smart Contract Verification ToolsBruno Dia, Naghmeh Ramezani Ivaki, Nuno Laranjeiro. 17-26 [doi]
- Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic ApproachMaxime Ayrault, Etienne Borde, Ulrich Kühne, Jean Leneutre. 27-36 [doi]
- Extending the Concept of Voting Structures to Support Path-Based Replication StrategiesChristian Linder, Oliver E. Theel. 37-46 [doi]
- Automated Security Assessment for the Internet of ThingsXuanyu Duan, Mengmeng Ge, Triet Huynh Minh Le, Faheem Ullah, Shang Gao, Xuequan Lu, Muhammad Ali Babar. 47-56 [doi]
- Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli. 57-66 [doi]
- Integrating Information Flow Analysis in Unifying Theories of ProgrammingChunyan Mu, Guoqiang Li 0001. 67-76 [doi]
- Availability Modeling for Drone Image Processing Systems with Adaptive OffloadingFumio Machida, Ermeson C. Andrade. 93-103 [doi]
- Reliability assessment of multi-sensor perception system in automated driving functionsMinhao Qiu, Peter Bazan, Tobias Antesberger, Florian Bock, Reinhard German. 104-112 [doi]
- Synergising Reliability Modelling Languages: BDMPs and Repairable DFTsShahid Khan 0002, Joost-Pieter Katoen. 113-122 [doi]
- SABER-GPU: A Response-Based Cryptography Algorithm for SABER on the GPUKaitlyn Lee, Michael Gowanlock, Bertrand Cambou. 123-132 [doi]
- A Practical and Secure Stateless Order Preserving Encryption for Outsourced DatabasesNing Shen, Jyh-haw Yeh, Hung-Min Sun, Chien-Ming Chen 0001. 133-142 [doi]
- Are you for Real? Authentication in Dynamic IoT SystemsMehdi Karimibiuki, Karthik Pattabiraman, André Ivanov. 143-152 [doi]
- An Efficient Application Core Mapping Algorithm for Wireless Network-an-ChipB. Naresh Kumar Reddy, Subrat Kar. 157-160 [doi]
- A VAE Conversion Method for Private Data LinkageBo-Chen Tai, Szu-Chuang Li, Yennun Huang. 161-164 [doi]