Abstract is missing.
- A Control Flow Representation for Component-Based Software Reliability AnalysisAtef Mohamed, Mohammad Zulkernine. 1-10 [doi]
- Applying Microreboot to System SoftwareMichael Le, Yuval Tamir. 11-20 [doi]
- Software Fault Localization Using DStar (D*)W. Eric Wong, Vidroha Debroy, Yihao Li, Ruizhi Gao. 21-30 [doi]
- Automatic Simplification of Obfuscated JavaScript Code: A Semantics-Based ApproachGen Lu, Saumya K. Debray. 31-40 [doi]
- Flexible Data-Driven Security for AndroidDenis Feth, Alexander Pretschner. 41-50 [doi]
- An Autonomic Framework for Integrating Security and Quality of Service Support in DatabasesFiras B. Alomari, Daniel A. Menascé. 51-60 [doi]
- VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOAJianchun Jiang, Liping Ding, Ennan Zhai, Ting Yu. 61-70 [doi]
- Security Impacts of Virtualization on a Network TestbedYu-Lun Huang, Borting Chen, Ming-Wei Shih, Chien-Yu Lai. 71-77 [doi]
- CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic ContinuationsShih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Chung-Wei Lai, Han-Lin Lu, Wai-Meng Leong. 78-87 [doi]
- A Study of Using Two-Parameter Generalized Pareto Model to Analyze the Fault Distribution of Open Source SoftwareChih-Song Kuo, Chin-Yu Huang, Shao-Pu Luan. 88-97 [doi]
- DESERVE: A Framework for Detecting Program Security Vulnerability ExploitationsAmatul Mohosina, Mohammad Zulkernine. 98-107 [doi]
- On the Effective Use of Security Test PatternsBen H. Smith, Laurie Williams. 108-117 [doi]
- Toward Systematic Construction of Timing Diagrams from UML/MARTE Behavioral Models for Time-Triggered Embedded SoftwareJinho Choi 0002, Eunkyoung Jee, Doo-Hwan Bae. 118-127 [doi]
- A Precise Information Flow Measure from Imprecise ProbabilitiesSari Haj Hussein. 128-137 [doi]
- Using Weighted Attributes to Improve Cluster Test SelectionYabin Wang, Zhenyu Chen, Yang Feng, Bin Luo, Yijie Yang. 138-146 [doi]
- Mobile Application and Device Power Usage MeasurementsRahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeffrey M. Voas. 147-156 [doi]
- Specification-guided Golden Run for Analysis of Robustness Testing ResultsGizelle Sandrini Lemos, Eliane Martins. 157-166 [doi]
- Extending the Reliability of Wireless Sensor Networks through Informed Periodic RedeploymentLuiz A. Laranjeira, Genaína Nunes Rodrigues. 167-176 [doi]
- Finding Buffer Overflow Inducing Loops in Binary ExecutablesSanjay Rawat, Laurent Mounier. 177-186 [doi]
- Accelerating Taint-Based Concolic Testing by Pruning Pointer OvertaintYun-Min Cheng, Bing-Han Li, Shiuhpyng Winston Shieh. 187-196 [doi]
- µTIL: Mutation-based Statistical Test Inputs Generation for Automatic Fault LocalizationMickaël Delahaye, Lionel C. Briand, Arnaud Gotlieb, Matthieu Petit. 197-206 [doi]
- An Embedded Software Reliability Model with Consideration of Hardware Related Software FailuresJinhee Park, Hyeon Jeong Kim, Ju-Hwan Shin, Jongmoon Baik. 207-214 [doi]
- Robust Wavelet Shrinkage Estimation without Data Transform for Software Reliability AssessmentXiao Xiao, Tadashi Dohi. 215-224 [doi]
- A Secure Fine-Grained Access Control Mechanism for Networked Storage SystemsHsiao-Ying Lin, John Kubiatowicz, Wen-Guey Tzeng. 225-234 [doi]
- Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared TasksQussai Yaseen, Brajendra Panda. 235-244 [doi]
- A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone UsersChien-Cheng Lin, Chin-Chun Chang, Deron Liang, Ching-Han Yang. 245-252 [doi]
- Semi-Automatic Security Testing of Web Applications from a Secure ModelMatthias Büchler, Johan Oudinet, Alexander Pretschner. 253-262 [doi]
- Mining Executable Specifications of Web Applications from Selenium IDE TestsDianxiang Xu, Weifeng Xu, Bharath K. Bavikati, W. Eric Wong. 263-272 [doi]
- Countering Network-Centric Insider Threats through Self-Protective Autonomic Rule GenerationFaisal M. Sibai, Daniel A. Menascé. 273-282 [doi]
- Reliability Analysis of PLC Systems by Bayesian NetworkHehua Zhang, Yu Jiang, Xun Jiao, Xiaoyu Song, William N. N. Hung, Ming Gu. 283-290 [doi]
- Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service AttackFerdous A. Barbhuiya, Vaibhav Gupta, Santosh Biswas, Sukumar Nandi. 291-300 [doi]