default search action
SERE 2013: Gaithersburg, Maryland, USA
- IEEE 7th International Conference on Software Security and Reliability, SERE 2013, Gaithersburg, MD, USA, June 18-20, 2013. IEEE 2013, ISBN 978-1-4799-0406-8
- Angelos Stavrou:
Programming on Android: Best Practices for Security and Reliability. 1-2 - Toshio Kaneishi, Tadashi Dohi:
Software Reliability Modeling and Evaluation under Incomplete Knowledge on Fault Distribution. 3-12 - Shunkun Yang, Minyan Lu, Lin Ge:
Bayesian Network Based Software Reliability Prediction by Dynamic Simulation. 13-20 - Jun Ai, Feng Zheng, Jingwei Shang:
Shortening the Cycle of Software Reliability Testing with Fuzzy Discrimination. 21-29 - Hsiao-Ying Lin, Li-Ping Tung, Bao-Shuh Paul Lin:
An Empirical Study on Data Retrievability in Decentralized Erasure Code Based Distributed Storage Systems. 30-39 - Christian Jung, Denis Feth, Christian Seise:
Context-Aware Policy Enforcement for Android. 40-49 - Liang Cheng, Yang Zhang, Zhihui Han:
Quantitatively Measure Access Control Mechanisms across Different Operating Systems. 50-59 - Yin-Chang Sung, Michael Cheng Yi Cho, Chi-Wei Wang, Chia-Wei Hsu, Shiuhpyng Winston Shieh:
Light-Weight CSRF Protection by Labeling User-Created Contents. 60-69 - Raymond Canzanese, Moshe Kam, Spiros Mancoridis:
Multi-channel Change-Point Malware Detection. 70-79 - Chia-Wei Hsu, Fan-Syun Shih, Chi-Wei Wang, Shiuhpyng Winston Shieh:
Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware. 80-89 - Borting Chen, Chien-Yu Lai, Yu-Lun Huang:
A Performance Mapping Model for Physical-to-Virtual Migration. 90-98 - Ryan K. McLean, Mark D. Silvius, Kenneth M. Hopkinson:
Method for Evaluating k-Means Clustering for Increased Reliability in Cognitive Radio Networks. 99-108 - Zebao Gao, Zhenyu Chen, Yang Feng, Bin Luo:
Mining Sequential Patterns of Predicates for Fault Localization and Understanding. 109-118 - Pingjian Wang, Lei Wang, Ji Xiang, Peng Liu, Neng Gao, Jiwu Jing:
MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker. 119-128 - Cuiting Chen, Hans-Gerhard Gross, Andy Zaidman:
Improving Service Diagnosis through Increased Monitoring Granularity. 129-138 - Yanjun Zuo:
Moving and Relocating: A Logical Framework of Service Migration for Software System Survivability. 139-148 - Hsu-Fang Lai, Yu-Sung Wu, Yu-Jui Cheng:
Exploiting Neigborhood Similarity for Virtual Machine Migration over Wide-Area Network. 149-158 - Ahmed Aleroud, George Karabatis:
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques. 159-168 - Kai Chen, Yingjun Zhang, Yifeng Lian:
Vulnerability-Based Backdoors: Threats from Two-step Trojans. 169-177 - Manghui Tu, Liangliang Xiao, Dianxiang Xu:
Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability. 178-187 - Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine:
Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications. 188-197 - Hossain Shahriar, Komminist Weldemariam, Thibaud Lutellier, Mohammad Zulkernine:
A Model-Based Detection of Vulnerable and Malicious Browser Extensions. 198-207 - Shih-Kun Huang, Han-Lin Lu, Wai-Meng Leong, Huan Liu:
CRAXweb: Automatic Web Application Testing and Attack Generation. 208-217 - Patrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, Anoop Singhal:
VULCAN: Vulnerability Assessment Framework for Cloud Computing. 218-226 - Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
A Security Risk Assessment Framework for SysML Activity Diagrams. 227-236 - Qiuying Li, Lei Luo, Jun Ai:
The Determination Method for Software Reliability Qualitative Indices. 237-245
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.