default search action
23rd PRDC 2018: Taipei, Taiwan
- 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, December 4-7, 2018. IEEE 2018, ISBN 978-1-5386-5700-3
Hardware Reliability
- Georg von der Brüggen, Lea Schönberger, Jian-Jia Chen:
Do Nothing, But Carefully: Fault Tolerance with Timing Guarantees for Multiprocessor Systems Devoid of Online Adaptation. 1-10 - Itsuo Takanami, Masaru Fukushi:
Degradable Restructuring of Mesh-Connected Processor Arrays with Spares on Orthogonal Sides. 11-14 - Ravikiran Yeleswarapu, Arun K. Somani:
SSCMSD - Single-Symbol Correction Multi-symbol Detection for DRAM Subsystem. 15-24
Information Security
- Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Neeraj Suri, Pang-Chieh Wang:
Exploring the Relationship Between Dimensionality Reduction and Private Data Release. 25-33 - Jyh-haw Yeh, Srisarguru Sridhar, Gaby G. Dagher, Hung-Min Sun, Ning Shen, Kathleen Dakota White:
A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption. 34-43 - Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri:
InfoLeak: Scheduling-Based Information Leakage. 44-53
Cyber-Physical Systems I
- Abu Hasnat Mohammad Rubaiyat, Yongming Qin, Homa Alemzadeh:
Experimental Resilience Assessment of an Open-Source Driving Agent. 54-63 - Matthew Wagner, Bruce M. McMillin:
Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains. 64-73 - Prashanth Palaniswamy, Bruce M. McMillin:
Cyber-Physical Security of an Electric Microgrid. 74-83
Modeling I
- Nadia Patricia Da Silva Medeiros, Naghmeh Ramezani Ivaki, Pedro Costa, Marco Vieira:
An Approach for Trustworthiness Benchmarking Using Software Metrics. 84-93 - Hyojung Lee, Kiwoon Sung, Kyusang Lee, Jaeseok Lee, Seungjai Min:
Economic Analysis of Blockchain Technology on Digital Platform Market. 94-103 - Simin Cai, Barbara Gallina, Dag Nyström, Cristina Seceleanu:
Specification and Formal Verification of Atomic Concurrent Real-Time Transactions. 104-114
Cyber-Physical Systems II
- Sai Sidharth Patlolla, Bruce M. McMillin, Sridhar Adepu, Aditya Mathur:
An Approach for Formal Analysis of the Security of a Water Treatment Testbed. 115-124 - Carmen Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen, William G. Temple, William H. Sanders:
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems. 125-134
Modeling II
- Zhengguo Yang, Toshiaki Aoki, Yasuo Tan:
Modeling the Required Indoor Temperature Change by Hybrid Automata for Detecting Thermal Problems. 135-144 - Yunlu Zhao, Tadashi Dohi, Hiroyuki Okamura:
Software Test-Run Reliability Modeling with Non-homogeneous Binomial Processes. 145-154
Internet of Things
- Daniel Mendes, Naghmeh Ramezani Ivaki, Henrique Madeira:
Effects of GPS Spoofing on Unmanned Aerial Vehicles. 155-160 - Mehdi Karimibiuki, Ekta Aggarwal, Karthik Pattabiraman, André Ivanov:
DynPolAC: Dynamic Policy-Based Access Control for IoT Systems. 161-170 - Amelia Samandari, Mengmeng Ge, Jin Bum Hong, Dong Seong Kim:
Evaluating the Security of IoT Networks with Mobile Devices. 171-180
Fast Abstracts + Posters I
- Itsuo Takanami, Masaru Fukushi:
Restructuring Mesh-Connected Processor Arrays with Spares on Four Sides by Orthogonal Side Rotation. 181-182 - Shu Nagai, Tatsuhiro Tsuchiya:
Applying Metamorphic Testing to e-Commerce Product Search Engines. 183-184 - Tsvetoslava Vateva-Gurova, Neeraj Suri:
On the Detection of Side-Channel Attacks. 185-186 - Tianyi Zhang, Masato Kitakami:
Research on Convolutional Codes are Used in RAID. 187-188 - Ilsun You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, Ing-Ray Chen, Jin-Hee Cho:
On IoT Misbehavior Detection in Cyber Physical Systems. 189-190 - Ryota Ogasawara, Masayuki Arai:
A SAT-Based Approach for SDN Rule Table Distribution. 191-192
Dependable Software I
- Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri:
FastFI: Accelerating Software Fault Injections. 193-202 - Zhiqi Zhu, Joseph Callenes-Sloan, Benjamin Carrión Schäfer:
Control Flow Checking Optimization Based on Regular Patterns Analysis. 203-212 - Venu Babu Thati, Jens Vankeirsbilck, Niels Penneman, Davy Pissoort, Jeroen Boydens:
An Improved Data Error Detection Technique for Dependable Embedded Software. 213-220
Fast Abstracts + Posters II
- Jianhui Jiang, Guangming Lu, Zhen Wang:
Methods for Approximate Adders Reliability Estimation Based on PTM Model. 221-222 - Hossain Shahriar, Kai Qian, Md Arabin Islam Talukder, Dan Chia-Tien Lo, Nidhibahen Patel:
Mobile Software Security with Dynamic Analysis. 223-224 - Koichi Bando, Kenji Tanaka:
Attempt to Apply Machine Learning to a Failure Database - A Case Study on Communications Networks. 225-226 - Masato Kitakami, Kazuki Matsuoka:
An Attack-Tolerant Agreement Algorithm for Block Chain. 227-228 - Junsik Seo, Jaehyun Nam, Seungwon Shin:
Towards a Security-Enhanced Cloud Platform. 229-230 - Christian M. Fuchs, Nadia M. Murillo, Aske Plaat, Erik van der Kouwe, Daniel Harsono, Peng Wang:
Software-Defined Dependable Computing for Spacecraft. 231-232
Dependable Software II
- Hao Jin, Tatsuhiro Tsuchiya:
Deriving Fault Locating Test Cases from Constrained Covering Arrays. 233-240 - Angelos Oikonomopoulos, Remco Vermeulen, Cristiano Giuffrida, Herbert Bos:
On the Effectiveness of Code Normalization for Function Identification. 241-251
Industrial
- Li-Sheng Chen, Wei-Ho Chung, Ing-Yi Chen, Sy-Yen Kuo:
Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT. 252-256 - Shun-Chieh Chang, Yeali S. Sun, Wu-Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi:
ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family. 257-262 - Pang-Yang Chu, Wei-Huan Lu, Jun-Wei Lin, Yu-Sung Wu:
Enforcing Enterprise Mobile Application Security Policy with Plugin Framework. 263-268
Dependable Network I
- Pedro Marques, Zayani Dabbabi, Miruna-Mihaela Mironescu, Olivier Thonnard, Alysson Bessani, Frances V. Buontempo, Ilir Gashi:
Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors. 269-278 - Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli:
On Algorithms Selection for Unsupervised Anomaly Detection. 279-288
Dependable Network II
- Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota:
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks. 289-298 - Shu-Wen Hsueh, Tung-Yueh Lin, Weng-Ian Lei, Chi-Leung Patrick Ngai, Yu-Hang Sheng, Yu-Sung Wu:
Semantic Failover in Software-Defined Networking. 299-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.