default search action
13th EDCC 2017: Geneva, Switzerland
- 13th European Dependable Computing Conference, EDCC 2017, Geneva, Switzerland, September 4-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0602-5
Keynotes
- Christian Cachin:
Blockchains and Consensus Protocols: Snake Oil Warning. 1-2 - Andreas Eckel:
It is a Disruptive World with Exponential Development: Expected Trends in Embedded Systems, with a Special Focus on the Automotive Industry and Its Likely Effects on Industry and Society. 3-4
Industrial Track
- Roberto Natella:
Advancing Fault Injection and Dependability Evaluation in the Software-Driven Telecom Industry. 5 - Francisco Maia:
Data Management and Privacy in a World of Data Wealth. 6-7 - Hans-Peter Schwefel, Walter Schaffer, Robert Damboeck:
ICT and Data-Management for Dependability of Electricity Distribution Grids: Opportunities and Barriers. 8-9
Distinguish Papers
- Ilya Tuzov, Juan Carlos Ruiz, David de Andrés:
Accurately Simulating the Effects of Faults in VHDL Models Described at the Implementation-Level. 10-17 - Yazdan Movahedi, Michel Cukier, Ambrose Andongabo, Ilir Gashi:
Cluster-Based Vulnerability Assessment Applied to Operating Systems. 18-25 - Vidhya Tekken Valapil, Sandeep S. Kulkarni:
Preserving Stabilization While Practically Bounding State Space. 26-33
Fault-Tolerance
- Michael Eischer, Tobias Distler:
Scalable Byzantine Fault Tolerance on Heterogeneous Servers. 34-41 - Ryan Slechta, Laura Monroe, Nathan DeBardeleben, Qiang Guan, Joanne Wendelberger, Sarah Michalak:
Resilience Analysis of Top K Selection Algorithms. 42-49 - William Excoffon, Jean-Charles Fabre, Michaël Lauer:
Analysis of Adaptive Fault Tolerance for Resilient Computing. 50-57
Hardware Architecture
- Lars Nagel, Tim Süß:
Computing the Probability for Data Loss in Two-Dimensional Parity RAIDs. 58-65 - Georg Macher, Markus Bachinger, Michael Stolz:
Embedded Multi-core System for Design of Next Generation Powertrain Control Units. 66-72
Testing and Validation Methods
- Frederico Cerveira, Raul Barbosa, Marta Mercier, Henrique Madeira:
On the Emulation of Vulnerabilities through Software Fault Injection. 73-78 - Kazuto Shigihara, Shinya Honda, Hiroaki Takada:
Test Program Generator for AUTOSAR OS. 79-86 - Ghazal Zamani, Olivia Das:
Impact of a Fault Management Architecture on the Performance of a Component-Based System. 87-94
Safety-Critical Systems
- Omar Tawffeeq Saleem Jaradat, Iain Bate:
Using Safety Contracts to Guide the Maintenance of Systems and Safety Cases. 95-102 - Omar Jaradat, Irfan Sljivo, Ibrahim Habli, Richard Hawkins:
Challenges of Safety Assurance for Industry 4.0. 103-106 - Luke J. W. Martin, Alexander B. Romanovsky:
An Approach for Designing Knowledge-Based Systems for High-Integrity Applications. 107-110
Security and Privacy
- Hebert de Oliveira Silva, Tânia Basso, Regina Lúcia de Oliveira Moraes:
Privacy and Data Mining: Evaluating the Impact of Data Anonymization on Classification Algorithms. 111-116 - Manuel Barbosa, Sonia Ben Mokhtar, Pascal Felber, Francisco Maia, Miguel Matos, Rui Oliveira, Etienne Rivière, Valerio Schiavoni, Spyros Voulgaris:
SAFETHINGS: Data Security by Design in the IoT. 117-120 - Paulo Jorge Costa Nunes, Iberia Medeiros, José Fonseca, Nuno Ferreira Neves, Miguel Correia, Marco Vieira:
On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. 121-128 - Ivano Alessandro Elia, Nuno Antunes, Nuno Laranjeiro, Marco Vieira:
An Analysis of OpenStack Vulnerabilities. 129-134 - Ambrose Andongabo, Ilir Gashi:
vepRisk - A Web Based Analysis Tool for Public Security Data. 135-138
Intrusion and Evaluation
- Kevin Bock, Sydnee Shannon, Yazdan Movahedi, Michel Cukier:
Application of Routine Activity Theory to Cyber Intrusion Location and Time. 139-146 - Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche:
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling. 147-150 - Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone:
A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database. 151-154
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.