default search action
HASE 2014: Miami Beach, FL, USA
- 15th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2014, Miami Beach, FL, USA, January 9-11, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3465-2
- Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability. 1-8 - Zahid A. Syed, Sean Banerjee, Bojan Cukic:
Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems. 9-16 - Farid Molazem Tabrizi, Karthik Pattabiraman:
A Model-Based Intrusion Detection System for Smart Meters. 17-24 - Erik van der Kouwe, Cristiano Giuffrida, Andrew S. Tanenbaum:
Evaluating Distortion in Fault Injection Experiments. 25-32 - Martin Hoffmann, Peter Ulbrich, Christian Dietrich, Horst Schirmeier, Daniel Lohmann, Wolfgang Schröder-Preikschat:
A Practitioner's Guide to Software-Based Soft-Error Mitigation Using AN-Codes. 33-40 - Amanda Sávio Nascimento, Cecília M. F. Rubira, Fernando Castor:
ArCMAPE: A Software Product Line Infrastructure to Support Fault-Tolerant Composite Services. 41-48 - Anneliese Amschler Andrews, Salwa Elakeili, Salah Boukhris:
Fail-Safe Test Generation in Safety Critical Systems. 49-56 - Mahnaz Malekzadeh, Iain Bate:
Making an ALARP Decision of Sufficient Testing. 57-64 - Linbin Yu, Feng Duan, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Combinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples. 65-72 - Yujian Fu, Steven Drager:
Modeling and Verification of Humanoid Robot Task Coordination. 73-80 - Jiri Barnat, Petr Bauch, Vojtech Havel:
Temporal Verification of Simulink Diagrams. 81-88 - Faqing Yang, Jean-Pierre Jacquot, Jeanine Souquières:
Proving the Fidelity of Simulations of Event-B Models. 89-96 - Hiroyuki Okamura, Tadashi Dohi:
A Novel Framework of Software Reliability Evaluation with Software Reliability Growth Models and Software Metrics. 97-104 - Koosha Marashi, Sahra Sedigh Sarvestani:
Towards Comprehensive Modeling of Reliability for Smart Grids: Requirements and Challenges. 105-112 - Peter Garraghan, Paul Townend, Jie Xu:
An Empirical Failure-Analysis of a Large-Scale Cloud Computing Environment. 113-120 - Philippa Conmy, Iain Bate:
Assuring Safety for Component Based Software Engineering. 121-128 - Panayiotis Steele, John Knight:
Analysis of Critical Systems Certification. 129-136 - Victor L. Winter, Carl Reinke, Jonathan Guerrero:
Using Program Transformation, Annotation, and Reflection to Certify a Java Type Resolution Function. 137-145 - Abdulrahman Almutairi, Tawfeeq A. Shawly, Saleh M. Basalamah, Arif Ghafoor:
Policy-Driven High Assurance Cyber Infrastructure-Based Systems. 146-153 - Tadashi Koga, Xiaodong Lu, Kinji Mori:
Autonomous Decentralized High-Assurance Surveillance System for Air Traffic Control. 154-157 - Jerry Gao, Wei-Tek Tsai, Raymond A. Paul, Xiaoying Bai, Tadahiro Uehara:
Mobile Testing-as-a-Service (MTaaS) - Infrastructures, Issues, Solutions and Needs. 158-167 - Regina Moraes, Hélène Waeselynck, Jérémie Guiochet:
UML-Based Modeling of Robustness Testing. 168-175 - Hossain Shahriar, Sarah North, Edward Mawangi:
Testing of Memory Leak in Android Applications. 176-183 - Anneliese Amschler Andrews, Hyunsook Do:
Trade-Off Analysis for Selective versus Brute-Force Regression Testing in FSMWeb. 184-192 - Pei Luo, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky:
Hardware Implementation of Secure Shamir's Secret Sharing Scheme. 193-200 - Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View. 201-205 - Jawwad A. Shamsi, Sufian Hameed, Waleed Rahman, Farooq Zuberi, Kaiser Altaf, Ammar Amjad:
Clicksafe: Providing Security against Clickjacking Attacks. 206-210 - Jesse Musgrove, Bojan Cukic, Vittorio Cortellessa:
Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System. 211-215 - Ivano Irrera, João Durães, Marco Vieira:
On the Need for Training Failure Prediction Algorithms in Evolving Software Systems. 216-223 - Alexandre Petrenko, Nina Yevtushenko:
Adaptive Testing of Nondeterministic Systems with FSM. 224-228 - Amel Mammar, Marc Frappier:
Verifying the Precedence Property Pattern Using the B Method. 229-233 - Zheng Chen, Allen McBride:
Using Flash to Tolerate Track Failures in RAID. 234-235 - Farzana Rahman, Drew Williams, Sheikh Iqbal Ahamed, Ji-Jiang Yang, Qing Wang:
PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare Services. 236-242 - Curtis Rasmussen, Rozita Dara:
Recommender Systems for Privacy Management: A Framework. 243-244 - Patrick J. Graydon, Iain Bate:
On the Nature and Content of Safety Contracts. 245-246 - Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Oleg Sokolsky, Insup Lee:
Functional Alarms for Systems of Interoperable Medical Devices. 247-248 - Alexandre Petrenko, Keqin Li, Roland Groz, Karim Hossen, Catherine Oriat:
Inferring Approximated Models for Systems Engineering. 249-253 - Claudio A. Ardagna, Ernesto Damiani, Kouessi A. R. Sagbo, Fulvio Frati:
Zero-Knowledge Evaluation of Service Performance Based on Simulation. 254-258 - Ali Davoudian, Ferhat Khendek, Maria Toeroe:
Ordering Upgrade Changes for Highly Available Component Based Systems. 259-260 - Yuki Matsui, Hideharu Kojima, Tatsuhiro Tsuchiya:
Modeling the Interaction of Power Line and SCADA Networks. 261-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.