


default search action
14th EDCC 2018: Iași, Romania
- 14th European Dependable Computing Conference, EDCC 2018, Iași, Romania, September 10-14, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-8060-5

Distinguished Papers
- Ilya Tuzov

, David de Andrés, Juan Carlos Ruiz:
Accurate Robustness Assessment of HDL Models Through Iterative Statistical Fault Injection. 1-8 - João R. Campos

, Marco Vieira
, Ernesto Costa
:
Exploratory Study of Machine Learning Techniques for Supporting Failure Prediction. 9-16 - Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo

, Luigi Romano, Luigi Sgaglione:
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level. 17-24
Verification & Validation
- Dimitry Solet, Jean-Luc Béchennec

, Mikaël Briday
, Sébastien Faucou
, Sébastien Pillement:
Hardware Runtime Verification of a RTOS Kernel: Evaluation Using Fault Injection. 25-32 - Paul Crubillé, Benjamin Lussier, Walter Schön, Brini Manel:

Validation of Safety Necessities for a Safety-Bag Component in Experimental Autonomous Vehicles. 33-40
Model-based design
- Behrooz Sangchoolie, Peter Folkesson, Jonny Vinter

:
A Study of the Interplay Between Safety and Security Using Model-Implemented Fault Injection. 41-48 - Lucas Bressan, André Luíz de Oliveira, Leonardo Montecchi

, Barbara Gallina:
A Systematic Process for Applying the CHESS Methodology in the Creation of Certifiable Evidence. 49-56
Security and Dependability Analysis
- Areej Algaith

, Paulo Jorge Costa Nunes, José Fonseca, Ilir Gashi
, Marco Vieira
:
Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools. 57-64 - Frederico Cerveira

, Alcides Fonseca
, Raul Barbosa
, Henrique Madeira:
Evaluating the Inherent Sensitivity of Programming Languages to Soft Errors. 65-72 - Minh Lê, Josef Weidendorfer:

A Message-Passing Based Algorithm for k-Terminal Reliability. 73-80
Fault Tolerance and Performance Evaluation
- Ainhoa Azqueta-Alzúaz

, Marta Patiño-Martínez
, Valerio Vianello, Ricardo Jiménez-Peris:
Fault-Tolerance Evaluation of a New SQL Database. 81-86 - Gerhard Habiger, Franz J. Hauck, Johannes Köstler, Hans P. Reiser

:
Resource-Efficient State-Machine Replication with Multithreading and Vertical Scaling. 87-94 - Mariana Cunha, Nuno Laranjeiro

:
Assessing Containerized REST Services Performance in the Presence of Operator Faults. 95-100
Frameworks, Architectures and Tools
- Hebert de Oliveira Silva, Tânia Basso, Regina Moraes

, Donatello Elia
, Sandro Fiore
:
A Re-Identification Risk-Based Anonymization Framework for Data Analytics Platforms. 101-106 - Mario Trapp, Daniel Schneider, Gereon Weiss:

Towards Safety-Awareness and Dynamic Safety Management. 107-111 - Marcello Cinque

, Raffaele Della Corte, Raffaele Iorio, Antonio Pecchia:
An Exploratory Study on Zeroconf Monitoring of Microservices Systems. 112-115 - Giulio Masetti, Silvano Chiaradonna, Felicita Di Giandomenico, Brett Feddersen, William H. Sanders:

An Efficient Strategy for Model Composition in the Möbius Modeling Environment. 116-119
Threats and Anomaly Detection
- Ziad Ismail, Jean Leneutre, Alia Fourati:

Optimal Deployment of Security Policies: Application to Industrial Control Systems. 120-127 - Ivo Vacas, Iberia Medeiros

, Nuno Neves:
Detecting Network Threats using OSINT Knowledge-Based IDS. 128-135 - Simona Bernardi

, Raquel Trillo Lado, José Merseguer
:
Detection of Integrity Attacks to Smart Grids using Process Mining and Time-Evolving Graphs. 136-139 - Mostafa Farshchi, Ingo Weber, Raffaele Della Corte, Antonio Pecchia, Marcello Cinque

, Jean-Guy Schneider, John C. Grundy:
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics. 140-143
WBD 2018: Workshop on Blockchain Dependability
- Amjad Aldweesh, Maher Alharby

, Ellis Solaiman, Aad van Moorsel:
Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum. 144-149 - Pierre-Yves Piriou, Jean-Francois Dumas:

Simulation of Stochastic Blockchain Models. 150-157 - Joshua Ellul

, Gordon J. Pace
:
Runtime Verification of Ethereum Smart Contracts. 158-163 - Marcello Cinque

, Christian Esposito
:
How to Assess the Dependability of Applications on Top of the Blockchain: Novel Research Challenges. 164-165
SERENE 2018: 10th International Workshop on Software Engineering for Resilient Systems
- Federico Lombardi

:
A Proactive Q-Learning Approach for Autoscaling Heterogeneous Cloud Servers. 166-172 - Stephan Adelsberger

, Bashar Igried
, Markus Moser
, Vadim Savenkov
, Anton Setzer:
Formal Verification for Feature-Based Composition of Workflows. 173-181 - Inna Vistbakka, Elena Troubitsyna:

Towards a Formal Approach to Analysing Security of Safety-Critical Systems. 182-189 - Patrik Feth, Rasmus Adler, Daniel Schneider:

A Context-Aware, Confidence-Disclosing and Fail-Operational Dynamic Risk Assessment Architecture. 190-194 - Bogdan Aman

, Gabriel Ciobanu
:
Analyzing the Shared Information in Social Networks. 195-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














