


default search action
SERE 2014: San Francisco, California, USA
- Eighth International Conference on Software Security and Reliability, SERE 2014, San Francisco, California, USA, June 30 - July 2, 2014. IEEE 2014, ISBN 978-1-4799-4296-1

Session II-A: Failure and Fault Prediction
- Luping Chen, John H. R. May:

A Diversity Model Based on Failure Distribution and Its Application in Safety Cases. 1-10 - Yangsong Wu, Yibiao Yang

, Yangyang Zhao, Hongmin Lu, Yuming Zhou, Baowen Xu
:
The Influence of Developer Quality on Software Fault-Proneness Prediction. 11-19 - Jiaqiang Chen, Shulong Liu, Wangshu Liu, Xiang Chen, Qing Gu, Daoxu Chen:

A Two-Stage Data Preprocessing Approach for Software Fault Prediction. 20-29
Session II-B: System Performance and Accuracy Analysis
- Mohammad R. Eletriby, Mohammed Ali Sobh

, Ayman M. Bahaa Eldin
, Hossam M. A. Fahmy:
High Performance Java Card Operating System. 30-39 - Azadeh Jahanbanifar, Ferhat Khendek

, Maria Toeroe:
Providing Hardware Redundancy for Highly Available Services in Virtualized Environments. 40-47 - Haipeng Cai

, Raúl A. Santelices, Tianyu Xu:
Estimating the Accuracy of Dynamic Change-Impact Analysis Using Sensitivity Analysis. 48-57
Session II-C: Mobile Security
- Yingjun Zhang, Kai Chen:

AppMark: A Picture-Based Watermark for Android Apps. 58-67 - Ang Li, Zishan Qin, Mingsong Chen, Jing Liu:

ADAutomation: An Activity Diagram Based Automated GUI Testing Framework for Smartphone Applications. 68-77 - Mohammad Reza Farhadi, Benjamin C. M. Fung

, Philippe Charland, Mourad Debbabi
:
BinClone: Detecting Code Clones in Malware. 78-87
Session III-A: Software Testing I
- Philipp Zech

, Michael Felderer
, Basel Katt, Ruth Breu:
Security Test Generation by Answer Set Programming. 88-97 - Ting Su, Geguang Pu, Bin Fang, Jifeng He, Jun Yan, Siyuan Jiang

, Jianjun Zhao:
Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution. 98-107 - Weifeng Xu, Tao Ding, Dianxiang Xu:

Rule-Based Test Input Generation from Bytecode. 108-117 - Tianyong Wu, Jun Yan, Jian Zhang:

Automatic Test Data Generation for Unit Testing to Achieve MC/DC Criterion. 118-126
Session IV-A: Software Testing II
- Wei-Tek Tsai, Guanqiu Qi

, Lian Yu, Jerry Gao:
TaaS (Testing-as-a-Service) Design for Combinatorial Testing. 127-136 - Lian Yu, Wei-Tek Tsai, Yanbing Jiang, Jerry Gao:

Generating Test Cases for Context-Aware Applications Using Bigraphs. 137-146 - Elizabeta Fourneret, Jérôme Cantenot, Fabrice Bouquet

, Bruno Legeard
, Julien Botella:
SeTGaM: Generalized Technique for Regression Testing Based on UML/OCL Models. 147-156 - Charitha Hettiarachchi, Hyunsook Do, Byoungju Choi:

Effective Regression Testing Using Requirements and Risks. 157-166
Session VII-A: Format Specification and Strategy Analysis
- Mo Li, Shaoying Liu:

Traceability-Based Formal Specification Inspection. 167-176 - Lena Herscheid, Peter Tröger:

Specification of Dynamic Fault Tree Concepts with Stochastic Petri Nets. 177-186 - Chung-Yi Lin, Wen-Guey Tzeng:

Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems. 187-195
Session VIII-A: System Quality & Network Security
- Yen Ju Liu, Chong Kuan Chen, Michael Cheng Yi Cho, Shiuhpyng Shieh:

Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison. 196-205 - Peter Mell, Richard E. Harang:

Using Network Tainting to Bound the Scope of Network Ingress Attacks. 206-215 - Shuai Wei, Enyi Tang, Tianyu Liu, Norbert Th. Müller, Zhenyu Chen:

Automatic Numerical Analysis Based on Infinite-Precision Arithmetic. 216-224
Session X-A: System Security
- Gerry Howser, Bruce M. McMillin

:
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust. 225-234 - Hsiao-Ying Lin, Li-Ping Tung, Bao-Shuh Paul Lin:

Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage Systems. 235-244 - Jang Jin Kwon, Doohwan Kim, Jae Jin Park, Jang-Eui Hong

:
Collision Analysis of Safety Devices to Prevent Hazards in Safety Critical Systems. 245-254

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














