Abstract is missing.
- A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing ExampleDaniel S. Fowler, Jeremy W. Bryans, Madeline Cheah, Paul Wooderson, Siraj A. Shaikh. 1-8 [doi]
- Adding Cyberattacks To An Industry-Leading CAN SimulatorJake Hayward, Andrew Tomlinson, Jeremy Bryans. 9-16 [doi]
- Security Vulnerability Metrics for Connected VehiclesLama Moukahal, Mohammad Zulkernine. 17-23 [doi]
- Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive CybersecurityClifford Liem, Dan Murdock, Andrew Williams, Martin Soukup. 24-27 [doi]
- Improved Pattern for ISO 26262 ASIL Decomposition with Dependent RequirementsChristian Lidström, Carl Bondesson, Mattias Nyberg, Jonas Westman. 28-35 [doi]
- DDCAN: Delay-Time Deliverable CAN NetworkRyo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita. 36-41 [doi]
- Integrating Application Security Testing Tools into ALM Tools in the Automotive IndustryDennis Kengo Oka, Tommi Makila, Rikke Kuipers. 42-45 [doi]
- Towards Transparency and Trustworthy: A Used-Car Deposit Platform Based on BlockchainJinyu Zhang, Honghui Zhao, Yumeng Yang, Jiaqi Yan. 46-50 [doi]
- Study on Hybrid Collaborative Simulation Testing Method Towards CPSSiyou Ma, Feng Gao, Yunqiang Yan. 51-56 [doi]
- Design of an Automated Test Tool Based on Interface ProtocolYusong Chen, Yang Gao, Yufeng Zhou, Menghui Chen, Xingyue Ma. 57-61 [doi]
- Evaluation of Judicial Imprisonment Term Prediction Model Based on Text MutationShu Zhang, Ge Yan, Yu Li, Jia Liu. 62-65 [doi]
- Quality Driven Judicial Data GovernanceTieke He, Shenghao Chen, Lian Hao, Jia Liu. 66-70 [doi]
- AMDroid: Android Malware Detection Using Function Call GraphsXiuting Ge, Ya Pan, Yong Fan, Chunrong Fang. 71-77 [doi]
- A Baseline Evaluation Method Based on Principal Component Analysis for Software Test Case DesignWenhong Liu, Jiahong Jiang, Zhongtian Li, Jun Yang, Yakui Song, Zhaohui Dou. 78-83 [doi]
- Judicial Knowledge Reasoning Based on Representation LearningBaogui Chen, Zhuoyang Li, Siyuan Shen, Zhipeng Zou, Tieke He. 84-88 [doi]
- A Test Case Design Method Based on Path Depth CoverageYunqiang Yan, Linbo Wu, Yanhong Peng, Changhai Nie. 89-96 [doi]
- Security Requirements Analysis - A Vision for an Automated ToolchainMichael Atighetchi, Borislava I. Simidchieva, Katarzyna Olejnik. 97-104 [doi]
- Exploring the Dependency Relationships between Software QualitiesCelia Chen, Michael Shoga, Barry W. Boehm. 105-108 [doi]
- Detecting Android Security Vulnerabilities Using Machine Learning and System Calls AnalysisYasir Malik, Carlos Renato Salim Campos, Fehmi Jaafar. 109-113 [doi]
- An Empirical Study of Comparison of Code Metric Aggregation Methods-on Embedded SoftwareZekun Song, Yichen Wang, Pengyang Zong, Zhiwei Ren, Di Qi. 114-119 [doi]
- Influence of Developer Factors on Code Quality: A Data StudyMaría José Salamea, Carles Farré. 120-125 [doi]
- Development of Intelligent Virtual Assistant for Software Testing TeamIosif Itkin, Andrey Novikov, Rostislav Yavorskiy. 126-129 [doi]
- A Software Service Supporting Software Quality ForecastingMartí Manzano, Claudia P. Ayala, Cristina Gómez, Lidia López Cuesta. 130-132 [doi]
- Using Case Facts to Predict Accusation Based on Deep LearningHui Wang, Tieke He, Zhipeng Zou, Siyuan Shen, Yu Li. 133-137 [doi]
- Design and Implementation of Software Test Laboratory Based on Cloud PlatformWu Wen, Jiahui Sun, Ya Li, Peng Gu, Jianfeng Xu. 138-144 [doi]
- A Deep Learning Method for Judicial Decision SupportBaogui Chen, Yu Li, Shu Zhang, Hao Lian, Tieke He. 145-149 [doi]
- Research on Modeling and Verification Methods for Embedded Software Systems Based on SysMLLinbo Wu, Yunqiang Yan, Feng Gao, Xiaohong Chen, Changhai Nie. 150-157 [doi]
- NONYM!ZER: Mitigation Framework for Browser FingerprintingAmr ElBanna, Nashwa Abdelbaki. 158-163 [doi]
- An Empirical Study of Open Source Flight Control Software Program Model CheckingZhiqin Cao, Jinyu Yin, Yichen Wang, Yu Li, Jintao Zhang. 164-169 [doi]
- Random Test Generation from Regular Expressions for Graphical User Interface (GUI) TestingOnur Kilinççeker, Alper Silistre, Moharram Challenger, Fevzi Belli. 170-176 [doi]
- Repairing Over-Constrained Models for Combinatorial Robustness TestingKonrad Fögen, Horst Lichter. 177-184 [doi]
- Design Fractals: A Graphical Method for Evaluating Binary Covering ArraysCaleb King, Joseph Morgan, Ryan Lekivetz. 185-190 [doi]
- Automation in Hardware-in-the-Loop Units Development and IntegrationNikolay Brayanov, Arno Eichberger. 191-197 [doi]
- Raising the Quality of Bug Reports by Predicting Software Defect IndicatorsAnna Gromova, Iosif Itkin, Sergey Pavlov, Alexander Korovayev. 198-204 [doi]
- Branch Sequence Coverage Criterion for Testing-Based Formal Verification with Symbolic ExecutionRong Wang, Shaoying Liu. 205-212 [doi]
- A Fault Localization Method Based on Conditional ProbabilityYonghui Yang, Fei Deng, Yunqiang Yan, Feng Gao. 213-218 [doi]
- Using TLA+ to Specify Leader Election of Raft Algorithm with Consideration of Leadership Transfer in Multiple ControllersYu Gao, Hua Li, Yuanping Li, Bowei Liu, Xianrong Wang, Hongwei Ruan. 219-226 [doi]
- REPD: Source Code Defect Prediction As Anomaly DetectionPetar Afric, Lucija Sikic, Adrian Satja Kurdija, Goran Delac, Marin Silic. 227-234 [doi]
- B-SEFI: A Binary Level Soft Error Fault Injection ToolYing Wang, Jian Dong, Sen Zhang, Decheng Zuo. 235-241 [doi]
- Task Decision-Making for UAV Swarms Based on Robustness EvaluationXiaohong Wang, Yuan Zhang, Lizhi Wang, Dawei Lu, Yusheng Sun, Jun Yao, Tielin Ma, Xiaohui Wang. 242-248 [doi]
- A Petri Net Modeling Approach for Reliability of PMS with Time RedundancyXiaoyue Wu, Haiyue Yu. 249-254 [doi]
- A Remaining Useful Life Prediction Framework for Multi-sensor SystemHeng Zhang, Jing Jiang, Zhenling Mo, Qiang Miao. 255-259 [doi]
- Bayesian Estimation of Residual Life for Weibull Distributed Products Based on the Fusion of Different Forms of Expert InformationQian Zhao, Xiang Jia, Bo Guo. 260-267 [doi]
- Some Thoughts on Model-Based Test OptimizationPan Liu, Yudong Li, Zhaojun Li. 268-274 [doi]
- Crowd Intelligence-Based Interactive Creation PlatformYi Yang, Jian Wang, Weixing Huang, Guoqing Li, Lan Huang. 275-280 [doi]
- Law Article Prediction Based on Deep LearningGe Yan, Yu Li, Siyuan Shen, Shu Zhang, Jia Liu. 281-284 [doi]
- Emotion-Based Interactive Art DesignYihang Bo. 285-290 [doi]
- Improving GAN-Based Calligraphy Character Generation using Graph MatchingMeng Li, Jian Wang, Yi Yang, Weixing Huang, Wenjuan Du. 291-295 [doi]
- Quality Measurement of Judgment DocumentsJiawei Liu, Zhenzhen Wang, Ge Yan, Hao Lian. 296-299 [doi]
- An Approach to Test Classification in Big Android ApplicationsThomas Hirsch, Christian Schindler, Matthias Müller, Thomas Schranz, Wolfgang Slany. 300-308 [doi]
- Complicated Causality Discovering and Presenting Based on Enterprise Knowledge ManagementZhongzhao Zhang, Yanzhong Dang. 309-315 [doi]
- Detect Triangle Attack on Blockchain by Trace AnalysisYingying Wang, Guoqiang Li. 316-321 [doi]
- Feature Extraction from Japanese Natural Language Requirements Documents for Software Product Line EngineeringKenji Hisazumi. 322-329 [doi]
- Knowledge Extraction and Integration for Information Gathering in Penetration TestingAnis Kothia, Bobby Swar, Fehmi Jaafar. 330-335 [doi]
- Quick Solutions to Production Problems in Manufacturing Enterprises: A Knowledge PerspectiveYubin Wang, Yanzhong Dang. 336-341 [doi]
- Ranking Online Reviews Based on Consumer PreferencesDan Luo, Jiangning Wu. 342-347 [doi]
- Resilience of air Transport Network with the Complementary Effects of High-Speed Rail NetworkTao Li, Lili Rong. 348-353 [doi]
- Similarity Analysis of Law Documents Based on Word2vecChunyu Xia, Tieke He, Wenlong Li, Zemin Qin, Zhipeng Zou. 354-357 [doi]
- Study on the Automated Unit Testing Solution on the Linux PlatformBo Sun, Yachao Shao, Chao Chen. 358-361 [doi]
- Automatical Segmentation of Pelvic Organs After Hysterectomy by using Dilated Convolution U-Net++Su Wu, Ziheng Wang, Chang Liu, Chenming Zhu, Shaozhi Wu, Kai Xiao. 362-367 [doi]
- Reliable Automatic Organ Segmentation from CT Images using Deep CNNChang Liu, Shaozhi Wu, Su Wu, Ziheng Wang, Kai Xiao. 368-374 [doi]
- Improving Wireless Network Security Based On Radio FingerprintingYun Lin, Jie Chang. 375-379 [doi]
- Search Over Encrypted Cloud Data With Secure UpdatesSelasi Kwame Ocansey, Changda Wang. 380-386 [doi]
- An FPGA Design and Implementation of 4G Network Security Algorithm Based on SNOW3GChaopeng Shen, Xiaotao Yan, Qiaozhen Liu, Jian Kang, Yang Liu, Xiaogang Zheng, Xige Zhang, Yuanyi Liu. 387-392 [doi]
- AADL Vulnerability Modeling and Security Analysis MethodYang Cao, Yunwei Dong, Xiaomin Wei, Xiao Wu. 399-406 [doi]
- A Flexible Cyber Security Experimentation Platform Architecture Based on DockerYongfeng Yin, Yuyan Shao, Xuefeng Wang, Qingran Su. 413-420 [doi]
- The Need for Unified Testbed Management Across Multiple Teams and Stakeholders in a Large Scale Telecom Integration ContextNikolay Tcholtchev, Steven Ulrich, Faruk Catal, Wojciech Konitzer, Ramon Barakat, Andreas Hoffmann 0001, Ina Schieferdecker. 427-434 [doi]
- Standards-Based IoT Testing with Open-Source Test EquipmentAlexander Kaiser, Sascha Hackel. 435-441 [doi]
- Security Smells in Smart ContractsMehmet Demir, Manar Alalfi, Ozgur Turetken, Alexander Ferworn. 442-449 [doi]
- 3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT CloudYu-Lun Huang, Wen-Lin Sun, Ying-Han Tang. 450-457 [doi]
- 10 Years of IoT Malware: A Feature-Based TaxonomyBenjamin Vignau, Raphaël Khoury, Sylvain Hallé. 458-465 [doi]
- Research on Security Detection and Data Analysis for Industrial InternetJun Lin, Lan Liu 0003. 466-470 [doi]
- DDoS Intrusion Detection Through Machine Learning EnsembleSaikat Das, Ahmed M. Mahfouz, Deepak Venugopal, Sajjan Shiva. 471-477 [doi]
- Security and Fault Diagnosis-Based Assertion-Based Verification for FPGAShasha Zhang, Liang Cao. 478-481 [doi]
- Formal Verification Technology for Asynchronous Communication ProtocolYayun Hu, Dongfang Li. 482-486 [doi]
- A Noval Method of Security Verification for JTAG Protection FunctionDongfang Li, Wei Shen, ZhiHao Wang. 487-492 [doi]
- Research on Heterogeneous Cloud Test Platform Based on Elastic Scaling MechanismShuling Yang, Suzhi Cao, Lei Yan, Siyan Pan, Houpeng Wang, Jian Zhang, Dandan Cui. 493-498 [doi]
- Software Simulation Error Injection in RAM on RISC-V of PolarFire FPGAJiajie Dong, Long Xi, Mengxi Yu, Zeming Zhang. 499-502 [doi]
- Enhancing Acceptance Test-Driven Development with Model-Based Test GenerationRudolf Ramler, Claus Klammer. 503-504 [doi]
- Quality Metrics for Hybrid Software Development Organizations - A Case StudySatya Pradhan, Venky Nanniyur, Paddu Melanahalli, Munir Palla, Sunita Chulani. 505-506 [doi]
- Reliable Life Prediction and Evaluation Analysis of Lithium-ion Battery Based on Long-Short Term Memory ModelXuejiao Zhao, Lizhi Wang, Xiaohong Wang, Yusheng Sun, Tongmin Jiang, Zhiqiang Li, Yuan Zhang. 507-509 [doi]
- A Method of Bug Report Quality Detection Based on Vector Space ModelSong Huang, Lele Chen, Zhanwei Hui, Jialuo Liu, Sen Yang, Qiang Chen. 510-511 [doi]
- A Survey of the Application of Combinatorial TestingZhao Li, Yuhang Chen, Guoqiang Gong, Dongcheng Li, Ke Lv, Peng Chen. 512-513 [doi]
- Critical Quality Factors for Rapid, Scalable, Agile DevelopmentBarry W. Boehm, Doug Rosenberg, Neil G. Siegel. 514-515 [doi]
- Applying Ordered Technique Set for Fault LocalizationZhao Li, Yi Song, Guoqiang Gong, Dongcheng Li, Ke Lv, Jingsha He. 516-517 [doi]
- An API Development Model for Digital TwinsJim Scheibmeir, Yashwant Malaiya. 518-519 [doi]
- A Test Cases Generation Technique Based on an Adversarial Samples Generation Algorithm for Image Classification Deep Neural NetworksSong Huang, Qiang Chen, Zhanwei Chen, Lele Chen, Jialuo Liu, Sen Yang. 520-521 [doi]
- Automatic Test Case Generation and Optimization Based on Mutation TestingYunqi Du, Ya Pan, Haiyang Ao, Nimako Ottinah Alexander, Yong Fan. 522-523 [doi]
- Automatically Capturing and Reproducing Android Application CrashesJunmei Sun, Kai Yan, Xuejiao Liu, Min Zhu, Lei Xiao. 524-525 [doi]
- The Significant Effect of Parameter Tuning on Software Vulnerability Prediction ModelsPatrick Kwaku Kudjo, Selasie Brown Aformaley, Solomon Mensah, Jinfu Chen. 526-527 [doi]
- Reliability Modeling and Optimization for Large-Scale Network SystemsSa Meng, Yuanshun Dai, Liang Luo, Chang Liu. 528-529 [doi]
- A Two-stage Personnel Recommendation Method Directed Towards Mobile Crowdsourcing TestingWenguang Xie, Yuyang Fan. 530-531 [doi]
- Fault Density, Fault Depth and Fault Multiplicity: The Reward of DiscernmentBesma Khaireddine, Aleksandr Zakharchenko, Ali Mili. 532-533 [doi]
- Runtime-Environment Testing Method for Android ApplicationsSong Huang, Sen Yang, Zhanwei Hui, Yongming Yao, Lele Chen, Jialuo Liu, Qiang Chen. 534-535 [doi]
- Testing Adequacy of Convolutional Neural Network Based on Mutation TestingYi Yao, Jiuluo Liu, Song Huang, Zhanwei Hui, Kaishun Wu, Lele Chen, Sen Yang, Qiang Chen. 536-537 [doi]
- Progress of Word Embedding in Code GenerationZhao Li, Yi Song, Peng Chen, Dongcheng Li, Guoqiang Gong, Ke Lv. 538-539 [doi]
- Safe Traffic Sign Recognition through Data Augmentation for Autonomous Vehicles SoftwareLisa Jöckel, Michael Kläs, Silverio Martínez-Fernández. 540-541 [doi]
- A Test Scenario Generation Method for High Requirement Coverage by using KAOS MethodToshiyuki Fujikura, Ryo Kurachi. 542-543 [doi]
- A Fuzz Testing Service for Assuring Smart ContractsXiupei Mei, Imran Ashraf, Bo Jiang, Wing Kwong Chan. 544-545 [doi]