default search action
52nd DSN 2022: Baltimore, MD, USA - Supplemental Volume
- 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Supplemental Volume, Baltimore, MD, USA, June 27-30, 2022. IEEE 2022, ISBN 978-1-6654-0260-6
- Rakshit Agrawal, Jack W. Stokes, Lukas Rist, Ryan Littlefield, Xun Fan, Ken Hollis, Zane Coppedge, Noah Chesterman, Christian Seifert:
Long-Term Study of Honeypots in a Public Cloud. 1-4 - Elisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Mattias Mattsson, Vincent Rigal:
An industrial perspective on web scraping characteristics and open issues. 5-8 - Xinyang Zhang, Zhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li:
SimLane: A Risk-Orientated Benchmark for Lane Detection. 9-12 - Ethan Buchman, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic, Dragos-Adrian Seredinschi, Josef Widder:
Revisiting Tendermint: Design Tradeoffs, Accountability, and Practical Use. 11-14 - Rick Boivie, Gururaj Saileshwar, Tong Chen, Benjamin Segal, Alper Buyuktosunoglu:
On the Scalability of HeapCheck. 15-18 - Dennis Abts, Ibrahim Ahmed, Andrew Bitar, Matthew Boyd, John Kim, Garrin Kimmell, Andrew C. Ling:
Challenges/Opportunities to Enable Dependable Scale-out System with Groq Deterministic Tensor-Streaming Processors. 19-22 - Nikolaos Ioannis Deligiannis, Riccardo Cantoro, Matteo Sonza Reorda, Marcello Traiola, Emanuele Valea:
Improving the Fault Resilience of Neural Network Applications Through Security Mechanisms. 23-24 - Rubens Luiz Rech Junior, Paolo Rech:
Reliability of Google's Tensor Processing Units for Convolutional Neural Networks. 25-27 - Alberto Bosio, Maurizio Rebaudengo, Alessandro Savino:
Reliability assessment of FreeRTOS in Embedded Systems. 28-30 - Muhammad Usama Sardar, Christof Fetzer:
Formal Foundations for SCONE Attestation. 31-32 - João Inácio, Ibéria Medeiros:
Effectiveness on C Flaws Checking and Removal. 33-34 - Nuno Neves:
Towards Fuzzing Target Lines. 35-36 - Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young:
A Policy Driven AI-Assisted PoW Framework. 37-38 - Xingjian Zhang, Long Wang:
Modeling Composition of Cloud Services with Complex Dependencies for Availability Assessment. 39-40 - Nathaniel Nauman, Ruochong Wu, Saurabh Bagchi:
Real-Time Digital Filtering for IoT Data in Programmable Network Switches. 41-42 - Radoslaw Bulat, Marek R. Ogiela:
Personalized Cryptography Algorithms - A Comparison Between Classic and Cognitive Methods. 43-44 - Priscila Silva:
Predictive Resilience Modeling. 45-46 - Hebert de Oliveira Silva:
CSAI-4-CPS: A Cyber Security characterization model based on Artificial Intelligence For Cyber Physical Systems. 47-48 - Muhammad Usama Sardar:
Understanding Trust Assumptions for Attestation in Confidential Computing. 49-50 - Arash Mirzaei:
Daric: A Storage Efficient Payment Channel With Penalization Mechanism. 51-52 - Rudra Prasad Baksi:
Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception Architecture. 53-54
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.