Abstract is missing.
- Programming on Android: Best Practices for Security and ReliabilityAngelos Stavrou. 1-2 [doi]
- Software Reliability Modeling and Evaluation under Incomplete Knowledge on Fault DistributionToshio Kaneishi, Tadashi Dohi. 3-12 [doi]
- Bayesian Network Based Software Reliability Prediction by Dynamic SimulationShunkun Yang, Minyan Lu, Lin Ge. 13-20 [doi]
- Shortening the Cycle of Software Reliability Testing with Fuzzy DiscriminationJun Ai, Feng Zheng, Jingwei Shang. 21-29 [doi]
- An Empirical Study on Data Retrievability in Decentralized Erasure Code Based Distributed Storage SystemsHsiao-Ying Lin, Li-Ping Tung, Bao-Shuh Paul Lin. 30-39 [doi]
- Context-Aware Policy Enforcement for AndroidChristian Jung, Denis Feth, Christian Seise. 40-49 [doi]
- Quantitatively Measure Access Control Mechanisms across Different Operating SystemsLiang Cheng, Yang Zhang, Zhihui Han. 50-59 [doi]
- Light-Weight CSRF Protection by Labeling User-Created ContentsYin-Chang Sung, Michael Cheng Yi Cho, Chi-Wei Wang, Chia-Wei Hsu, Shiuhpyng Winston Shieh. 60-69 [doi]
- Multi-channel Change-Point Malware DetectionRaymond Canzanese, Moshe Kam, Spiros Mancoridis. 70-79 [doi]
- Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness MalwareChia-Wei Hsu, Fan-Syun Shih, Chi-Wei Wang, Shiuhpyng Winston Shieh. 80-89 [doi]
- A Performance Mapping Model for Physical-to-Virtual MigrationBorting Chen, Chien-Yu Lai, Yu-Lun Huang. 90-98 [doi]
- Method for Evaluating k-Means Clustering for Increased Reliability in Cognitive Radio NetworksRyan K. McLean, Mark D. Silvius, Kenneth M. Hopkinson. 99-108 [doi]
- Mining Sequential Patterns of Predicates for Fault Localization and UnderstandingZebao Gao, Zhenyu Chen, Yang Feng, Bin Luo. 109-118 [doi]
- MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions BlockerPingjian Wang, Lei Wang, Ji Xiang, Peng Liu, Neng Gao, Jiwu Jing. 119-128 [doi]
- Improving Service Diagnosis through Increased Monitoring GranularityCuiting Chen, Hans-Gerhard Gross, Andy Zaidman. 129-138 [doi]
- Moving and Relocating: A Logical Framework of Service Migration for Software System SurvivabilityYanjun Zuo. 139-148 [doi]
- Exploiting Neigborhood Similarity for Virtual Machine Migration over Wide-Area NetworkHsu-Fang Lai, Yu-Sung Wu, Yu-Jui Cheng. 149-158 [doi]
- Toward Zero-Day Attack Identification Using Linear Data Transformation TechniquesAhmed AlEroud, George Karabatis. 159-168 [doi]
- Vulnerability-Based Backdoors: Threats from Two-step TrojansKai Chen, Yingjun Zhang, Yifeng Lian. 169-177 [doi]
- Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network AvailabilityManghui Tu, Liangliang Xiao, Dianxiang Xu. 178-187 [doi]
- Confeagle: Automated Analysis of Configuration Vulnerabilities in Web ApplicationsBirhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine. 188-197 [doi]
- A Model-Based Detection of Vulnerable and Malicious Browser ExtensionsHossain Shahriar, Komminist Weldemariam, Thibaud Lutellier, Mohammad Zulkernine. 198-207 [doi]
- CRAXweb: Automatic Web Application Testing and Attack GenerationShih-Kun Huang, Han-Lin Lu, Wai-Meng Leong, Huan Liu. 208-217 [doi]
- VULCAN: Vulnerability Assessment Framework for Cloud ComputingPatrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, Anoop Singhal. 218-226 [doi]
- A Security Risk Assessment Framework for SysML Activity DiagramsSamir Ouchani, Otmane Aït Mohamed, Mourad Debbabi. 227-236 [doi]
- The Determination Method for Software Reliability Qualitative IndicesQiuying Li, Lei Luo, Jun Ai. 237-245 [doi]