Abstract is missing.
- Diagnosing applications' I/O behavior through system call observabilityTânia Esteves, Ricardo Macedo, Rui Oliveira, João Paulo 0001. 1-8 [doi]
- Predicting Cloud Applications Failures from Infrastructure Level DataJomar Domingos, Frederico Cerveira, Raul Barbosa, Henrique Madeira. 9-16 [doi]
- Underestimation-Aware Failure Statistical Model Creation for Large Scale Critical SystemsSzilárd Bozóki, Imre Kocsis, András Pataricza. 17-24 [doi]
- IVSign: Interpretable Vulnerability Signature via Code Embedding and Static AnalysisAo Ding, Gaolei Li, Xiaoyu Yi, Yuchen Liu. 25-31 [doi]
- Security Risk Growth Models for Software Vulnerability AssessmentTakashi Minohara, Masaya Shimakawa. 32-35 [doi]
- JABBERWOCK: A Tool for WebAssembly Dataset Generation towards Malicious Website DetectionChika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura. 36-39 [doi]
- EMER-GO: real-time grip enhanced speed advisory for emergency intelligent transportation systemsVincenzo Maria Arricale, Michele Caggiano, Marcello Cinque, Angelo Coppola, Flavio Farroni, Mario Fiorentino, Andrea Garofalo, Andrea Marchetta, Antimo Perfetto, Aleksandr Sakhnevych. 40-47 [doi]
- Multi-Objective Optimization for an Online Re-Planning of Autonomous VehiclesKilian Le Gall, Laurent Lemarchand, Catherine Dezan. 48-51 [doi]
- An ETSI ITS-enabled Robotic Scale Testbed for Network-Aided Safety-Critical ScenariosJosé M. Pinheiro, Enio Vasconcelos Filho, Pedro M. Santos 0002, Luís Almeida 0001. 52-59 [doi]
- PSP Framework: A novel risk assessment method in compliance with ISO/SAE-21434Franco Oberti, Ernesto Sánchez 0001, Alessandro Savino, Filippo Parisi, Stefano Di Carlo. 60-67 [doi]
- Edge-Aided V2X Collision Avoidance with Platoons: Towards a Hybrid Evaluation ToolsetJoão Pereira, Harrison Kurunathan, Enio Vasconcelos Filho, Pedro M. Santos 0002. 68-71 [doi]
- Integration of U-space Safety Assessment Methodologies With ExperimentationOmid Asghari, Naghmeh Ivaki, Henrique Madeira. 72-75 [doi]
- Susceptibility of Autonomous Driving Agents to Learning-Based Action-Space AttacksYuting Wu, Xin Lou, Pengfei Zhou, Rui Tan, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 76-83 [doi]
- An Automotive Cybersecurity Maturity Level Assessment ProgrammePatrick Grümer, Pedro Brandão. 84-91 [doi]
- CarFASE: A Carla-based Tool for Evaluating the Effects of Faults and Attacks on Autonomous Driving StacksMehdi Maleki, Ashfaq Farooqui, Behrooz Sangchoolie. 92-99 [doi]
- BEAT-Traffic: a Blockchain-Enabled infrastructure for Anonymous-yet-Traceable Traffic reportingMarina Dehez-Clementi, Jean-Christophe Deneuville, Emmanuel Lochin, Jérôme Lacan. 100-107 [doi]
- Safeguarding Cooperative Maneuver Information with Practical Byzantine Fault ToleranceEmanuel Vieira, João Almeida 0002, Joaquim Ferreira 0001, Paulo C. Bartolomeu. 108-115 [doi]
- Minimal Risk Manoeuvre Strategies for Cooperative and Collaborative Automated VehiclesVictoria Vu, Fredrik Warg, Anders Thorsén, Stig Ursing, Fredrik Sunnerstam, Jimmy Holler, Carl Bergenhem, Irina Cosmin. 116-123 [doi]
- Adversarial Patch Detection and Mitigation by Detecting High Entropy RegionsNiklas Bunzel, Ashim Siwakoti, Gerrit Klause. 124-128 [doi]
- IB-RAR: Information Bottleneck as Regularizer for Adversarial RobustnessXiaoyun Xu, Guilherme Perin, Stjepan Picek. 129-135 [doi]
- A Concise Analysis of Pasting Attacks and their Impact on Image ClassificationNiklas Bunzel, Lukas Graner. 136-140 [doi]
- FADO: A Federated Learning Attack and Defense OrchestratorFilipe Rodrigues, Rodrigo Simões, Nuno Neves 0001. 141-148 [doi]
- Enhancing the Reliability of Perception Systems using N-version Programming and RejuvenationJúlio Mendonça, Fumio Machida, Marcus Völp. 149-156 [doi]
- Revenue Maximization of a Slice Broker in the Presence of Byzantine FaultsMuhidul Islam Khan, Gianfranco Nencioni. 157-162 [doi]
- Cross-Layer Approximations for System-Level Optimizations: Challenges and OpportunitiesJorge Castro-Godínez, Muhammad Abdullah Hanif, Muhammad Shafique 0001. 163-166 [doi]
- Design Space Exploration of Approximate Computing Techniques with a Reinforcement Learning ApproachSepide Saeedi, Alessandro Savino, Stefano Di Calro. 167-170 [doi]
- Generic Accuracy Configurable Matrix Multiplication-Addition Accelerator using HLSLuis G. León-Vega, Jorge Castro-Godínez. 171-174 [doi]
- A Parametrizable Template for Approximate Logic SynthesisMorteza Rezaalipour, Marco Biasion, Ilaria Scarabottolo, George A. Constantinides, Laura Pozzi. 175-178 [doi]
- Input-aware accuracy characterization for approximate circuitsAli Piri, Salvatore Pappalardo, Salvatore Barone, Mario Barbareschi, Bastien Deveautour, Marcello Traiola, Ian O'Connor, Alberto Bosio. 179-182 [doi]
- AxASRE: A Novel Approach to Approximate Adder Synthesis Results EstimationPedro Tauã Lopes Pereira, Guilherme Paim, Paulo F. Flores, Eduardo A. C. da Costa, Sergio Bampi. 183-186 [doi]
- Exploit Approximation to Support Fault Resiliency in MPI-based ApplicationsRoberto Rocco, Gianluca Palermo. 187-190 [doi]
- Stochastic Computing as a Defence Against Adversarial AttacksFlorian Neugebauer, Vivek Vekariya, Ilia Polian, John P. Hayes. 191-194 [doi]
- Guardband Optimization for the Preconditioned Conjugate Gradient AlgorithmNatalia Lylina, Stefan Holst, Hanieh Jafarzadeh, Alexandra Kourfali, Hans-Joachim Wunderlich. 195-198 [doi]
- Multi-Metric SMT-Based Evaluation of Worst-Case-Error for Approximate CircuitsMorteza Rezaalipour, Lorenzo Ferretti, Ilaria Scarabottolo, George A. Constantinides, Laura Pozzi. 199-202 [doi]
- Low Power Streaming of Sensor Data Using Gray Code-Based Approximate CommunicationSomayeh Sadeghi Kohan, Sybille Hellebrand, Hans-Joachim Wunderlich. 203-206 [doi]
- NetLoiter: A Tool for Automated Testing of Network Applications using Fault-injectionMichal Rozsíval, Ales Smrcka. 207-210 [doi]
- RISC-V Timing-Instructions for Open Time-Triggered ArchitecturesNithin Ravani Nanjundaswamy, Gregor Nitsche, Frank Poppen, Kim Grüttner. 211-214 [doi]
- Evaluating the Safety Impact of Network Disturbances for Remote Driving with Simulation-Based Human-in-the-Loop TestingShrishti Trivedi, Fredrik Warg. 215-222 [doi]
- Using AI to Inject Vulnerabilities in Python CodeC. G. Frédéric Bogaerts, Naghmeh Ivaki, José Fonseca 0002. 223-230 [doi]
- Timeseries-aware Uncertainty Wrappers for Uncertainty Quantification of Information-Fusion-Enhanced AI Models based on Machine LearningJanek Groß, Michael Kläs, Lisa Jöckel, Pascal Gerber. 231-238 [doi]
- Modelling V&V Workflows to Improve Development Processes of Software-intensive SystemsThomas Bauer, Wolfgang Herzner, Bob Hruska, Katia Di Blasio, Zain Shahwar. 239-242 [doi]
- SMT-Based Stability Verification of an Industrial Switched PI Control SystemsStylianos Basagiannis, Ludovico Battista, Anna Becchi, Alessandro Cimatti, Georgios Giantamidis, Sergio Mover, Alberto Tacchella, Stefano Tonetta, Vassilios A. Tsachouridis. 243-250 [doi]
- llhsc: A DeviceTree Syntax and Semantic CheckerVítor Rodrigues, André Mato Pedro. 251-258 [doi]
- Translating Natural Language Requirements to Formal Specifications: A Study on GPT and Symbolic NLPIat Tou Leong, Raul Barbosa. 259-262 [doi]
- Simplifying Requirements Formalization for Resource-Constrained Mission-Critical SoftwareCarlos Mão de Ferro, Anastasia Mavridou, Michael Dille, Francisco Martins. 263-266 [doi]
- Preliminary Risk and Mitigation Assessment in Cyber-Physical SystemsAndrás Földvári, Francesco Brancati, András Pataricza. 267-274 [doi]
- *R. Bouchekir, M. Guzman, A. Cook, J. Haindl, R. Woolnough. 275-282 [doi]
- Formalizing Model Inference of MicroPythonCarlos Mão de Ferro, Tiago Cogumbreiro, Francisco Martins. 283-289 [doi]
- SIMoT: A Low-fidelity Orchestrator Simulator for Task Allocation in IoT DevicesTiago Fragoso, David Silva, João Pedro Dias, André Restivo, Hugo Sereno Ferreira. 290-296 [doi]