Abstract is missing.
- MisconfDoctor: Diagnosing Misconfiguration via Log-Based Configuration TestingTeng Wang, Xiaodong Liu, Shanshan Li, Xiangke Liao, Wang Li, Qing Liao. 1-12 [doi]
- BehaviorKI: Behavior Pattern Based Runtime Integrity Checking for Operating System KernelXinyue Feng, Qiusong Yang, Lin Shi, Qing Wang 0001. 13-24 [doi]
- MASKED: A MapReduce Solution for the Kappa-Pruned Ensemble-Based Anomaly Detection SystemMd. Shariful Islam, Korosh Koochekian Sabor, Abdelaziz Trabelsi, Wahab Hamou-Lhadj, Luay Alawneh. 25-34 [doi]
- Probabilistic Sampling-Based Testing for Accelerated Reliability AssessmentRoberto Pietrantuono, Stefano Russo. 35-46 [doi]
- An Automatic Parameterized Verification of FLASH Cache Coherence ProtocolYongjian Li, Jialun Cao, Kaiqiang Duan. 47-58 [doi]
- TBFV-SE: Testing-Based Formal Verification with Symbolic ExecutionRong Wang, Shaoying Liu. 59-66 [doi]
- Verifying Stochastic Behaviors of Decentralized Self-Adaptive Systems: A Formal Modeling and Simulation Based ApproachNianyu Li, Di Bai, Yiming Peng, Zhuoqun Yang, Wenpin Jiao. 67-74 [doi]
- Analysis of Experiences with the Engineering of a Medical Device Using State-Based Formal MethodsAtif Mashkoor, Alexander Egyed. 75-82 [doi]
- Machine Learning to Evaluate Evolvability Defects: Code Metrics Thresholds for a Given ContextNaohiko Tsuda, Hironori Washizaki, Yoshiaki Fukazawa, Yuichiro Yasuda, Shunsuke Sugimura. 83-94 [doi]
- Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?Caesar Jude Clemente, Fehmi Jaafar, Yasir Malik. 95-102 [doi]
- A Method for Predicting Two-Variable Atomicity ViolationsZhuo Sun, Reng Zeng, Xudong He. 103-110 [doi]
- Cross-Entropy: A New Metric for Software Defect PredictionXian Zhang, Kerong Ben, Jie Zeng. 111-122 [doi]
- Introspection for ARM TrustZone with the ITZ LibraryMiguel Guerra, Benjamin Taubmann, Hans P. Reiser, Sileshi Yalew, Miguel Correia. 123-134 [doi]
- A Security Model for Access Control in Graph-Oriented DatabasesClaudia Morgado, Gisele Busichia Baioco, Tânia Basso, Regina Moraes. 135-142 [doi]
- How Usable Are Rust Cryptography APIs?Kai Mindermann, Philipp Keck, Stefan Wagner 0001. 143-154 [doi]
- Hypervisor-Based Sensitive Data Leakage DetectorShu-Hao Chang, Sanoop Mallissery, Chih-Hao Hsieh, Yu-Sung Wu. 155-162 [doi]
- Detecting Errors in a Humanoid RobotJun Inoue, Fumio Kanehiro, Mitsuharu Morisawa, Akira Mori. 163-170 [doi]
- SynEva: Evaluating ML Programs by Mirror Program SynthesisYi Qin, Huiyan Wang, Chang Xu 0001, Xiaoxing Ma, Jian Lu 0001. 171-182 [doi]
- Using Crash Frequency Analysis to Identify Error-Prone Software Technologies in Multi-System MonitoringAndreas Schörgenhumer, Mario Kahlhofer, Hanspeter Mössenböck, Paul Grünbacher. 183-190 [doi]
- Exploratory Data Analysis of Fault Injection CampaignsFrederico Cerveira, Imre Kocsis, Raul Barbosa, Henrique Madeira, András Pataricza. 191-202 [doi]
- Differencing Graphical User InterfacesMark Grechanik, Chi-Wu Mao, Ankush Baisal, David Rosenblum, B. M. Mainul Hossain. 203-214 [doi]
- Change-Based Test Script Maintenance for Android AppsNana Chang, Linzhang Wang, Yu Pei 0001, Subrota K. Mondal, Xuandong Li. 215-225 [doi]
- How Do Defects Hurt Qualities? An Empirical Study on Characterizing a Software Maintainability Ontology in Open Source SoftwareCelia Chen, Shi Lin, Michael Shoga, Qing Wang 0001, Barry W. Boehm. 226-237 [doi]
- An Empirical Study of the Impact of Code Smell on File ChangesCan Zhu, Xiaofang Zhang, Yang Feng, Lin Chen 0015. 238-248 [doi]
- On the Suitability of a Portfolio-Based Design Improvement ApproachJohannes Bräuer, Reinhold Plösch, Christian Körner, Matthias Saft. 249-256 [doi]
- Automatic Detection of Feature Interactions Using Symbolic Analysis and Evolutionary ComputationByron DeVries, Betty H. C. Cheng. 257-268 [doi]
- Implementing Traceability Repositories as Graph Databases for Software Quality ImprovementRanda Elamin, Rasha Osman. 269-276 [doi]
- Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic PolicyYan Zhu 0010, Ruyun Yu, Yao Qin, Di Ma, William Cheng-Chung Chu. 277-288 [doi]
- Mutation Testing for Physical ComputingQianqian Zhu, Andy Zaidman. 289-300 [doi]
- Vulnerability Assessment of Web Services with Model-Based Mutation TestingFaezeh Siavashi, Dragos Truscan, Juri Vain. 301-312 [doi]
- Manifesting Bugs in Machine Learning Code: An Explorative Study with Mutation TestingDawei Cheng, Chun Cao, Chang Xu 0001, Xiaoxing Ma. 313-324 [doi]
- Model-Based Mutation Operators for Timed Systems: A Taxonomy and Research AgendaJames Jerson Ortiz Vega, Gilles Perrouin, Moussa Amrani, Pierre-Yves Schobbens. 325-332 [doi]
- Does Socio-Technical Congruence Have an Effect on Continuous Integration Build Failures? An Empirical Study on 10 GitHub ProjectsWeiqiang Zhang, Zhenyu Chen 0001, Bin Luo 0003. 333-343 [doi]
- Identification of Security Related Bug Reports via Text Mining Using Supervised and Unsupervised ClassificationKaterina Goseva-Popstojanova, Jacob Tyo. 344-355 [doi]
- The State of Practice on Virtual Reality (VR) Applications: An Exploratory Study on Github and Stack OverflowNaoures Ghrairi, Segla Kpodjedo, Amine Barrak, Fábio Petrillo, Foutse Khomh. 356-366 [doi]
- Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the CloudArmstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais, Khaled M. Khan. 367-374 [doi]
- Hardening Application Security Using Intel SGXMax Plauth, Fredrik Teschke, Daniel Richter, Andreas Polze. 375-380 [doi]
- Performance Analysis Using Automatic GroupingIsnaldo Francisco De Melo Jr., Abderrahmane Benbachir, Michel Dagenais. 381-387 [doi]
- QuantCloud: A Software with Automated Parallel Python for Quantitative Finance ApplicationsPeng Zhang, Yuxiang Gao, Xiang Shi. 388-396 [doi]
- Safety-Critical System Modeling in Model-Based Testing with Hazard and Operability AnalysisChang Rao, Jin Guo, Nan Li, Yu Lei, Yadong Zhang, Yao Li. 397-404 [doi]
- Model-Based Testing of Obligatory ABAC SystemsSamer Khamaiseh, Patrick Chapman, Dianxiang Xu. 405-413 [doi]
- Combinatorial Modeling and Test Case Generation for Industrial Control Software Using ACTSSara Ericsson, Eduard Enoiu. 414-425 [doi]
- Avoiding the Familiar to Speed Up Test Case ReductionGolnaz Gharachorlu, Nick Sumner. 426-437 [doi]
- Towards a Testing Framework with Visual Feedback for Actor-Based SystemsHasan Sözer, Ozan Gurler, Orhan Yilmaz. 438-445 [doi]
- Using Mutant Stubbornness to Create Minimal and Prioritized Test SetsLoreto Gonzalez-Hernandez, Birgitta Lindström, Jeff Offutt, Sten F. Andler, Pasqualina Potena, Markus Bohlin. 446-457 [doi]
- Target Selection for Test-Based Resource AdaptationArpit Christi, Alex Groce. 458-469 [doi]
- From Natural Language Requirements to Passive Test Cases Using Guarded AssertionsDaniel Flemström, Eduard Enoiu, Wasif Afzal, Daniel Sundmark, Thomas Gustafsson, Avenir Kobetski. 470-481 [doi]
- An Analysis of Complex Industrial Test Code Using Clone AnalysisWafa Hasanain, Yvan Labiche, Sigrid Eldh. 482-489 [doi]
- A Program Slicing-Based Bayesian Network Model for Change Impact AnalysisEkincan Ufuktepe, Tugkan Tuglular. 490-499 [doi]
- Automatically Repairing SQL FaultsYun Guo, Nan Li, Jeff Offutt, Amihai Motro. 500-511 [doi]