default search action
18th HASE 2017: Singapore
- 18th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017, Singapore, January 12-14, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-4636-2
Session 1: Dependability
- Jian Xiang, John C. Knight, Kevin J. Sullivan:
Is My Software Consistent with the Real World? 1-4 - Rem Gensh, Ashur Rafiev, Alexander B. Romanovsky, Alessandro F. Garcia, Fei Xia, Alex Yakovlev:
Architecting Holistic Fault Tolerance. 5-8 - Danielle C. Tarraf, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes. 9-12
Session 2A: Security & Safety I
- Nuno Silva, Marco Vieira, João Carlos Cunha, Ram Chillarege:
Evaluating a Corpus of Root Causes and Measures to Guide RCA Processes in Critical Software. 17-24 - Rajesh Kumar, Mariëlle Stoelinga:
Quantitative Security and Safety Analysis with Attack-Fault Trees. 25-32
Session 2B: Cyber Physical System I
- Prakash Rao Dunaka, Bruce M. McMillin:
Cyber-Physical Security of a Chemical Plant. 33-40 - Giedre Sabaliauskaite, Sridhar Adepu:
Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security. 41-48 - Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:
Cyber Security Resource Allocation: A Markov Decision Process Approach. 49-52
Session 3: Hazard Analysis
- Mario Gleirscher, Carmen Cârlan:
Arguing from Hazard Analysis in Safety Cases: A Modular Argument Pattern. 53-60 - Quentin Cappart, Christophe Limbrée, Pierre Schaus, Jean Quilbeuf, Louis-Marie Traonouez, Axel Legay:
Verification of Interlocking Systems Using Statistical Model Checking. 61-68
Session 4A: Security & Safety II
- Kazi Zakia Sultana, Ajay Deo, Byron J. Williams:
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities. 69-76 - Ali Kanso, Nicolas Deixionne, Abdelouahed Gherbi, Fereydoun Farrahi Moghaddam:
Enhancing OpenStack Fault Tolerance for Provisioning Computing Environments. 77-83 - Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation. 84-87
Session 4B: Software Engineering for Assurance
- Lov Kumar, Santanu Kumar Rath, Ashish Sureka:
Using Source Code Metrics and Multivariate Adaptive Regression Splines to Predict Maintainability of Service Oriented Software. 88-95 - Dusica Marijan, Sagar Sen:
Detecting and Reducing Redundancy in Software Testing for Highly Configurable Systems. 96-99 - Dusica Marijan, Marius Liaaen:
Test Prioritization with Optimally Balanced Configuration Coverage. 100-103
Session 5: Cyber Physical Systems II
- Tze Meng Low, Franz Franchetti:
High Assurance Code Generation for Cyber-Physical Systems. 104-111 - Mario Gleirscher, Stefan Kugele:
Defining Risk States in Autonomous Road Vehicles. 112-115
Session 6: Student Paper Session
- Ismail Rizky Harlin, Hironori Washizaki, Yoshiaki Fukazawa:
Impact of Using a Static-Type System in Computer Programming. 116-119 - Nghi Huynh, Marc Frappier, Amel Mammar, Régine Laleau:
Verification of SGAC Access Control Policies Using Alloy and ProB. 120-123 - Koyena Pal, Sridhar Adepu, Jonathan Goh:
Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems. 124-127 - Sanya Khruahong, Xiaoying Kong, Kumbesan Sandrasegaran, Li Liu:
Multi-Level Indoor Navigation Ontology for High Assurance Location-Based Services. 128-131 - Praneeth Sakhamuri, Olivia Das:
Acquisition of Virtual Machines for Tiered Applications with Availability Constraints. 132-135 - Anusha Thudimilla, Bruce M. McMillin:
Multiple Security Domain Nondeducibility Air Traffic Surveillance Systems. 136-139
Workshop on Security issues in Cyber Physical Systems (SecCPS 2017)
- Jonathan Goh, Sridhar Adepu, Marcus Tan, Zi Shan Lee:
Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. 140-145 - Qi Xiong, Yuan Xu, Baofeng Zhang, Feng Wang:
Overview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting Devices. 146-152 - Ron Biton, Clint Feher, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur:
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems. 153-156 - Amir Alipour-Fanid, Monireh Dabaghchian, Hengrun Zhang, Kai Zeng:
String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks. 157-162 - Jay Prakash, Chuadhry Mujeeb Ahmed:
Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System. 163-170
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.