Abstract is missing.
- An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time IntervalKuo-Fong Kao, Wen-Ching Chen, Jui-Chi Chang, Heng-Te Chu. 1-2 [doi]
- How Accurate Is Dynamic Program Slicing? An Empirical Approach to Compute Accuracy BoundsSiyuan Jiang, Raúl A. Santelices, Haipeng Cai, Mark Grechanik. 3-4 [doi]
- On Coverage-Based Attack ProfilesAnthony Thyron Rivers, Mladen A. Vouk, Laurie A. Williams. 5-6 [doi]
- Virtual Machine Migration as a Fault Tolerance Technique for Embedded Real-Time SystemsStefan Groesbrink. 7-12 [doi]
- Using Software Structure to Predict Vulnerability Exploitation PotentialAwad A. Younis, Yashwant K. Malaiya. 13-18 [doi]
- A Multi-function Error Detection Policy to Enhance Communication Integrity in Critical Embedded SystemsAmira Zammali, Agnan de Bonneval, Yves Crouzet. 19-24 [doi]
- System Call Anomaly Detection Using Multi-HMMsEsra N. Yolacan, Jennifer G. Dy, David R. Kaeli. 25-30 [doi]
- FRanC: A Ranking Framework for the Prioritization of Software MaintenanceDhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam. 31-40 [doi]
- Specification and Analysis of Attribute-Based Access Control Policies: An OverviewDianxiang Xu, Yunpeng Zhang. 41-49 [doi]
- A-R Exploit: An Automatic ROP Exploit Based on Long SequenceChao Yang, Tao Zheng, Zhitian Lin. 50-56 [doi]
- The Impact of Static and Dynamic Pairs on Pair ProgrammingRajendran Swamidurai, David Umphress. 57-63 [doi]
- Diagnosis-Guided Regression Test RefinementJ. Jenny Li, Patricia Morreale, John Douglas Palframan. 64-70 [doi]
- Software Reliability Virtual Testing for Reliability AssessmentJun Ai, Hanyu Pei, Liang Yan. 71-77 [doi]
- Evaluating Software Safety Standards: A Systematic Review and ComparisonW. Eric Wong, Tej Gidvani, Alfonso-Lopez, Ruizhi Gao, Matthew Horn. 78-87 [doi]
- New Gen2v2-Based Mutual Authentication SchemesHung-Yu Chien. 88-96 [doi]
- MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing EnvironmentYen-Chun Hsu, Yu-Sung Wu, Tsung-Han Tsai, Yi Pin Chiu, Chih-Hung Lin, Zhi-Wei Chen. 97-106 [doi]
- Defending ROP Attacks Using Basic Block Level RandomizationXun Zhan, Tao Zheng, Shixiang Gao. 107-112 [doi]
- Probabilistic Cycle Detection for Schneie's Solitaire Keystream AlgorithmWiem Tounsi, Benjamin Justus, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro. 113-120 [doi]
- Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile DevicesFarzana Rahman, Md. Osman Gani, Golam Mushih Tanimul Ahsan, Sheikh Iqbal Ahamed. 121-129 [doi]
- Classification of Partially Labeled Malicious Web Traffic in the Presence of Concept DriftGoce Anastasovski, Katerina Goseva-Popstojanova. 130-139 [doi]
- CRAXDroid: Automatic Android System Testing by Selective Symbolic ExecutionChao-Chun Yeh, Han-Lin Lu, Chun-Yen Chen, Kee Kiat Khor, Shih-Kun Huang. 140-148 [doi]
- Protection against Code Obfuscation Attacks Based on Control Dependencies in Android SystemsMariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana Cavalliy. 149-157 [doi]
- A Light-Weight Software Environment for Confining Android MalwareXiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang, Heng Yin. 158-167 [doi]
- Analysing Requirements to Detect Latent Security VulnerabilitiesCurtis C. R. Busby Earle, Robert B. France, Indrakshi Ray. 168-175 [doi]
- An Anomaly Detection Module for Firefox OSBorting Chen, Ming-Wei Shih, Yu-Lun Huang. 176-184 [doi]
- A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc NetworksAmna Saeed, Asad Raza, Haider Abbas. 185-191 [doi]
- Detecting DoS Attacks on Notification ServicesJ. Jenny Li, Tony Savor. 192-198 [doi]
- A Hybrid Clock System Related to STeC LanguageYixinag Chen, Yuanrui Zhang. 199-203 [doi]
- Post-condition-Directed Invariant Inference for Loops over Data StructuresJuan Zhai, Hanfei Wang, Jianhua Zhao. 204-212 [doi]
- A Qualitative Safety Analysis Method for AADL ModelBin Gu, Yunwei Dong, Xiaomin Wei. 213-217 [doi]
- A Load Scheduling Strategy for Electric Vehicles Charging SystemZheng Wang, Xiao Wu, Hongbin Zhao. 218-222 [doi]
- A Predictive Runtime Verification Framework for Cyber-Physical SystemsKang Yu, Zhenbang Chen, Wei Dong. 223-227 [doi]
- A Proof System in Process Algebra for Demand and SupplyXinghua Yao, Yixiang Chen. 228-236 [doi]
- Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADISNiansheng Liu, Huaiyu Dai, Donghui Guo. 237-242 [doi]
- Compiler Assisted Instruction Relocation for Performance Improvement of Cache Hit Rate and System ReliabilityBenbin Chen, Lin Li, Yiyang Li, Hongyin Luo, Donghui Guo. 243-246 [doi]
- Analysis of System Reliability for Cache Coherence Scheme in Multi-processorSizhao Li, Shan Lin, Deming Chen, W. Eric Wong, Donghui Guo. 247-251 [doi]
- Multiphysics Modeling and Characterization of MicroCVD Chip for Growing Carbon NanomaterialsLong Zheng, Yangbing Wu, Dan Zhang, Liwei Lin, Donghui Guo. 252-256 [doi]
- A Parameters Tuning Algorithm in Wireless NetworksHua-Ching Chen, Hsuan-Ming Feng, Ben Bin Chen, Dong-hui Guo. 257-260 [doi]
- Robustness and Fragility of a New Local-World Dynamical Network ModelPeizhong Liu, Minghang Wang, Ping Li. 261-265 [doi]