Abstract is missing.
- Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in VehiclesThomas Rosenstatter, Christian Sandberg, Tomas Olovsson. 1-10 [doi]
- SAGA: Secure Auto-Configurable Gateway Architecture for Smart HomeHuichen Lin, Dong Seong Kim, Neil W. Bergmann. 11-20 [doi]
- Estimation of Target Failure Measures for E/E/PE Safety-Related SoftwareShinji Inoue, Takaji Fujiwara, Shigeru Yamada. 21-22 [doi]
- Evaluation on Configurable Approximate Circuit for Aging-Induced Timing Violation ToleranceToshinori Sato, Tomoaki Ukezono. 23-24 [doi]
- Fully Homomorphic Key Update and Key Exchange Over Exterior Product Spaces For Cloud Computing ApplicationsDavid William Honorio Araujo da Silva, Carlos Paz de Araujo, Edward Chow. 25-26 [doi]
- A Fault-Tolerant Consensus Protocol for Software-Defined NetworksChien-Fu Cheng, Chu-Chiao Hsu. 27-28 [doi]
- State Transition Tuple Coverage Criterion for Extended Place/Transition Net-Based TestingTomohiko Takagi, Ryo Kurozumi, Tetsuro Katayama. 29-30 [doi]
- Reliability Modeling of Coherent Systems with Dependent Components Due to Common FactorsShuhei Ota, Mitsuhiro Kimura. 31-32 [doi]
- Approximate QoS Rule Derivation Based on Root Cause Analysis for Cloud ComputingSatoshi Konno, Xavier Défago. 33-42 [doi]
- SLICER: Safe Long-Term Cloud Event ArchivalAdriano Serckumecka, Ibéria Medeiros, Bernardo Ferreira, Alysson Bessani. 43-52 [doi]
- A Method for Stable Block Generation Time in Proof of WorkNaoki Torii, Masato Kitakami. 53-54 [doi]
- Reliability Estimation of Approximate Circuits Based on Probabilistic Gate ModelTao Wang, Jianhui Jiang, Zhen Wang. 55-56 [doi]
- Attempt to Extract Similar Cases by Applying Multilayer Perceptron to a Failure DatabaseKoichi Bando, Kenji Tanaka 0001. 57-58 [doi]
- An Attack Scenario Generation Method Using the Behavior ModelToshiyuki Fujikura, Ryo Kurachi. 59-60 [doi]
- BBB: Make Benchmarking Blockchains Configurable and ExtensibleXuheng Duan, Haochen Pan, Lewis Tseng, Yingjian Wu. 61-62 [doi]
- Uniform Consensus Prone to Omission Failures with Fault KnowledgeXiao Cao. 63-64 [doi]
- Detecting and Analyzing Year 2038 Problem Bugs in User-Level ApplicationsKeita Suzuki, Takafumi Kubota, Kenji Kono. 65-74 [doi]
- High-Accuracy Software Fault Injection in Source Code with ClangUlrich Thomas Gabor, Daniel Ferdinand Siegert, Olaf Spinczyk. 75-84 [doi]
- Integrate Dragonfly Key Exchange (IETF - RFC 7664) into Arithmetic Circuit Homomorphic EncryptionLi Xin Tan, Jing Wei Shannen Wee, Jun Rong Chan, Wei Jie Soh, Chern Nam Yap. 85-86 [doi]
- SNudge: A Slidebar Nudge for Users to Practice Better Habits For Mobile Fingerprint AuthenticationJoon Kuy Han, Dennis Wong. 87-88 [doi]
- A Fine-Grained SDN Rule Table Partitioning and DistributionYutaro Yoshikawa, Masayuki Arai. 89-90 [doi]
- A Reliability Automatic Assessment Framework for Open Source SoftwareQian Wang, Jianhui Jiang, Long Li. 91-92 [doi]
- Ensemble Methods for Anomaly Detection Based on System LogXuze Xia, Wei Zhang, Jianhui Jiang. 93-94 [doi]
- Resilient Distributed Causal Memory in Client-Server ModelLewis Tseng, Zezhi Wang, Yajie Zhao. 95-104 [doi]
- Satisfiability-Based Analysis of Cascading Failures in Systems of Interdependent NetworksKenta Hanada, Tatsuhiro Tsuchiya, Yasumasa Fujisaki. 105-113 [doi]
- Privacy Assurance for Android Augmented Reality AppsXueling Zhang, Rocky Slavin, Xiaoyin Wang, Jianwei Niu 0001. 114-115 [doi]
- A Study on Checkpointing for Distributed Applications Using Blockchain-Based Data StorageMamoru Ohara. 116-117 [doi]
- Static Analysis of File Manipulation ScriptsRodney Rodriguez, Xiaoyin Wang. 118-119 [doi]
- Moment-Based Approximation for Uncertainty Propagation in Fault TreesJiahao Zhang, Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi. 120-121 [doi]
- An Analytical Approach for Optimizing Data Transfer Rate in a Faulty Wireless Sensor NetworkMuhammad Alfian Amrizal, Luis Guillen, Takuo Suganuma. 122-123 [doi]
- Targeted Partial-Shift For Mitigating Shift Switching Activity Hot-Spots During Scan TestStefan Holst, Shiling Shi, Xiaoqing Wen. 124-129 [doi]
- On-Chip Delay Measurement for In-Field Test of FPGAsYousuke Miyake, Yasuo Sato, Seiji Kajihara. 130-137 [doi]
- Program-Structure-Guided Approximation of Large Fault SpacesOskar Pusz, Daniel Kiechle, Christian Dietrich 0001, Daniel Lohmann. 138-147 [doi]
- A Visualization Analytical Framework for Software Fault Localization MetricsXiao-Yi Zhang, Zheng Zheng. 148-157 [doi]
- Testing Graph Searching Based Path Planning Algorithms by Metamorphic TestingJiantao Zhang, Zheng Zheng, Beibei Yin, Kun Qiu, Yang Liu. 158-167 [doi]
- Towards a Structured Specification of Coding ConventionsElder Rodrigues Jr., Leonardo Montecchi. 168-177 [doi]
- Implementation of a Host-Based Intrusion Detection System for Avionic ApplicationsAliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche. 178-187 [doi]
- Adversarial Impact on Anomaly Detection in Cloud DatacentersPratyush Kr. Deka, Monowar H. Bhuyan, Youki Kadobayashi, Erik Elmroth. 188-197 [doi]
- Evaluating Variational Autoencoder as a Private Data Release Mechanism for Tabular DataSzu-Chuang Li, Bo-Chen Tai, Yennun Huang. 198-206 [doi]
- A New Insight into Local Coin-Based Randomized ConsensusAchour Mostéfaoui, Matthieu Perrin, Michel Raynal. 207-216 [doi]
- Distributed Maintenance of a Spanning Tree of k-Connected GraphsBrahim Hamid, Quentin Rouland, Jason Jaskolka. 217-226 [doi]
- Auditability: An Approach to Ease Debugging of Reliable Distributed SystemsSara Alhajaili, Arshad Jhumka. 227-235 [doi]
- Learning-Based Falsification for Model Families of Cyber-Physical SystemsKoki Kato, Fuyuki Ishikawa. 236-245 [doi]
- AMVG: Adaptive Malware Variant Generation Framework Using Machine LearningJusop Choi, Dongsoon Shin, Hyoungshick Kim, Jason Seotis, Jin B. Hong. 246-255 [doi]
- Deep Learning-Based Intrusion Detection for IoT NetworksMengmeng Ge, Xiping Fu, Naeem Syed, Zubair A. Baig, Gideon Teo, Antonio Robles-Kelly. 256-265 [doi]
- Synergizing Reliability Modeling Languages: BDMPs without Repairs and DFTsShahid Khan, Joost-Pieter Katoen, Matthias Volk 0001, Marc Bouissou. 266-275 [doi]
- On the Diversity of Machine Learning Models for System ReliabilityFumio Machida. 276-285 [doi]