Abstract is missing.
- Assessing Real-Time Malware ThreatsMatthias Gander, Clemens Sauerwein, Ruth Breu. 6-13  [doi]
 - An AST-Based Approach to Classifying DefectsChangsong Liu, Yangyang Zhao, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu. 14-21  [doi]
 - Selective Regression Testing of Safety-Critical Systems: A Black Box ApproachAnneliese Andrews, Salwa Elakeili, Ahmed Alhaddad. 22-31  [doi]
 - An Adaptive Control Strategy for Resource Allocation of Service-Based Systems in Cloud EnvironmentSiqian Gong, Beibei Yin, Wenlong Zhu, Kaiyuan Cai. 32-39  [doi]
 - Detecting Security Threats Using Mobile DevicesJuan Jenny Li, Peter Abbate, Brian Vega. 40-45  [doi]
 - PURITY: A Planning-based secURITY Testing ToolJosip Bozic, Franz Wotawa. 46-55  [doi]
 - Software Network Models Based on Dynamic Execution for Fault Propagation ResearchLinzhi Huang, Jun Ai, Hanyu Pei. 56-61  [doi]
 - Efficiently Testing Intelligent Transportation System in Simulation EnvironmentXu Zhao, Yan Wang. 62-71  [doi]
 - A Fault Propagation Model for Embedded SoftwareXiaobo Yan, Yichen Wang, Anzhi Zhu, Yikun Wang. 72-79  [doi]
 - Feature Selection and Analysis of Diffraction ImagesSai Kiran Thati, Junhua Ding, Dongmei Zhang, Xin-Hua Hu. 80-88  [doi]
 - An Attributes-Based Allocation Approach of Software Trustworthy DegreesYujing Ma, Yixiang Chen, Bin Gu. 89-94  [doi]
 - Securing Scientific WorkflowsDonghoon Kim, Mladen A. Vouk. 95-104  [doi]
 - On the Effect of Counters in Guard Conditions When State-Based Multi-objective TestingNesa Asoudeh, Yvan Labiche. 105-114  [doi]
 - An Adjustable Risk Assessment Method for a Cloud SystemChi-An Chih, Yu-Lun Huang. 115-120  [doi]
 - Diagnosing SDN Network Problems by Using Spectrum-Based Fault Localization TechniquesHsia-Hsiang Chen, Han-Lin Lu, Shih-Kun Huang, Ruizhi Gao, W. Eric Wong. 121-127  [doi]
 - Automated Detection of Information Flow Vulnerabilities in UML State Charts and C CodePaul Muntean, Adnan Rabbi, Andreas Ibing, Claudia Eckert. 128-137  [doi]
 - Boolean Differentiation for Formalizing Myers' Cause-Effect Graph Testing TechniqueTolga Ayav, Fevzi Belli. 138-143  [doi]
 - On Proposing a Test Oracle Generator Based on Static and Dynamic Source Code AnalysisAlessandro Oliveira Arantes, Valdivino Alexandre de Santiago Jr., Nandamudi Lankalapalli Vijaykumar. 144-152  [doi]
 - Code Generation for Abstract Data Types Based on Program AnalysisBin Li, Jun Liu, Jianhua Zhao. 153-160  [doi]
 - PSTEP - A Novel Probabilistic Event Processing Language for Uncertain Spatio-temporal Event Streams of Internet of VehiclesHuiyong Li, Yuanrui Zhang, Yixiang Chen. 161-168  [doi]
 - The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data AccessNa Li, Yunwei Dong, Tianwei Che, Chao Wang, Yang Gao. 169-172  [doi]
 - A Model Language for Describing Spatio-temporal ChangesXinghua Yao, Jie Zhou. 173-181  [doi]
 - Software Intensity Function Prediction by Haar Wavelet RegressionXiao Xiao. 182-183  [doi]
 - A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu. 184-185  [doi]
 - Critical Nodes Evaluation in Large-Scale Software Based on Static Structure and Runtime InformationQian Ye, Minyan Lu, Luyi Li. 186-187  [doi]
 - Towards Transformation from UML to Event-BSiyuan Hu, Hong Zhang. 188-189  [doi]
 - Mining Potential Information for Multiclass Microarray Data Using Centroid-Based Dimension ReductionShun Guo, Donghui Guo. 190-194  [doi]
 - Data Obfuscation for Privacy and Confidentiality in Cloud ComputingKhaled M. Khan, Mahboob Shaheen. 195-196  [doi]
 - UT-LDA Based Similarity Computing in MicroblogWeifeng Zhang, TianHao Pan, Yun Wang, Ziyuan Wang, Lei Xu. 197-201  [doi]
 - An Empirical Study of Developer QualityYilin Qiu, Weiqiang Zhang, Weiqin Zou, Jia Liu, Qin Liu. 202-209  [doi]
 - Case Study of Requirements-Based Test Case Generation on an Automotive DomainJeong Soo Eo, Hae-Ryong Choi, Ruizhi Gao, Shou-Yu Lee, W. Eric Wong. 210-215  [doi]
 - A Test Data Generation Approach for Automotive SoftwareJungui Zhou, Zhiyi Zhang, Peizhang Xie, Jingyu Wang. 216-220  [doi]
 - Facilitating Information Management in Integrated Development Environments through Visual Interface EnhancementsHaipeng Cai. 221-229  [doi]
 - A Refined Algorithm for Reachability Analysis of Updatable Timed AutomataBingbing Fang, Guoqiang Li 0001, Ling Fang, Jianwen Xiang. 230-236  [doi]
 - A Survey on Knowledge Management in Software EngineeringShanmuganathan Vasanthapriyan, Jing Tian, Jianwen Xiang. 237-244  [doi]
 - Service Systems Development Based on a Knowledge Synthesis MethodologyYoshiteru Nakamori, F. Meng, Michitaka Kosaka, J. Tian, J. W. Xiang. 245-250  [doi]