


default search action
30th ISSRE 2019: Berlin, Germany - Workshops
- Katinka Wolter, Ina Schieferdecker, Barbara Gallina, Michel Cukier, Roberto Natella, Naghmeh Ramezani Ivaki, Nuno Laranjeiro:

IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops 2019, Berlin, Germany, October 27-30, 2019. IEEE 2019, ISBN 978-1-7281-5138-0
ISSRE 2019 Industry Track
- Takao Nakagawa, Kazuki Munakata, Koji Yamamoto:

Applying Modified Code Entity-Based Regression Test Selection for Manual End-to-End Testing of Commercial Web Applications. 1-6 - Bjarne Johansson, Alessandro Vittorio Papadopoulos

, Thomas Nolte:
Concurrency Defect Localization in Embedded Systems using Static Code Analysis: An Evaluation. 7-12 - Hiroshi Kuwajima

, Fuyuki Ishikawa:
Adapting SQuaRE for Quality Assessment of Artificial Intelligence Systems. 13-18 - André Pinho, Luis Couto, José Oliveira:

Towards Rust for Critical Systems. 19-24 - Nathan Riopelle, Aniket Malatpure, Swapnil Ashtekar, V. Raman:

Dependency Graph Based Failure Analysis for Private Clouds. 25-29 - Rasmus Adler, Mohammed Naveed Akram

, Patrik Feth, Takeshi Fukuda, Tasuku Ishigooka, Satoshi Otsuka, Daniel Schneider, Kentaro Yoshimura:
Engineering and Hardening of Functional Fail-Operational Architectures for Highly Automated Driving. 30-35 - Cong Wang, Hao Sun

, Yiwen Xu, Yu Jiang, Huafeng Zhang
, Ming Gu:
Go-Sanitizer: Bug-Oriented Assertion Generation for Golang. 36-41 - Guolin Tan, Peng Zhang, Lei Zhang, Yu Zhang, Chuang Zhang, Qingyun Liu, Xinran Liu:

Learning from Time Series with Outlier Correction for Malicious Domain Identification. 42-46 - Veena Mendiratta, Zhuoran Liu, Mrinmoy Bhattacharjee, Yu Zhou:

Detecting and Diagnosing Anomalous Behavior in Large Systems with Change Detection Algorithms. 47-52 - Uttam Thakore, Harigovind V. Ramasamy, William H. Sanders:

Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response. 53-58 - Pallavi Pandey, Anupam Sarkar, Ansuman Banerjee:

Triforce QNX Syscall Fuzzer. 59-60 - Kyawt Kyawt San, Hironori Washizaki, Yoshiaki Fukazawa, Kiyoshi Honda, Masahiro Taga, Akira Matsuzaki:

DC-SRGM: Deep Cross-Project Software Reliability Growth Model. 61-66 - Philipp Göttlich, Hans-Christian Reuss:

Functionality and Safety Weaknesses in Integration of Physics-Based Models on Critical Embedded Systems. 67-72 - Arpit Christi, Alex Groce, Austin Wellman:

Building Resource Adaptations via Test-Based Software Minimization: Application, Challenges, and Opportunities. 73-78 - Eugenio Parra, Luis Alonso, Roy Mendieta, Jose Luis de la Vara:

Advances in Artefact Quality Analysis for Safety-Critical Systems. 79-84
ISSRE 2019 Doctoral Symposium
- Theresa Bettmann:

A Framework for Resilient Data Management for Smart Grids. 85-88 - Willian Nalepa Oizumi

:
Recommendation of Refactorings for Improving Dependability Attributes. 89-92 - Lorenzo De Lauretis

:
From Monolithic Architecture to Microservices Architecture. 93-96 - Guang Peng:

Multi-objective Optimization Research and Applied in Cloud Computing. 97-99 - Ana Turlea:

Search-Based Testing using EFSMs. 100-103 - Luca Vittorio Sartori:

Simulation-Based Testing to Improve Safety of Autonomous Robots. 104-107 - Zhihao Shang:

The Performance and Dependability of Control Plane in OpenFlow Networks. 108-111 - Han Wu:

Research Proposal: Reliability Evaluation of the Apache Kafka Streaming System. 112-113
ISSRE 2019 Fast Abstracts
- Jane Huffman Hayes, Tingting Yu:

ISSRE Cares: How the Software Reliability Engineering Community Can Give Back to Society. 114-115 - Kobra Khanmohammadi, Raphaël Khoury, Abdelwahab Hamou-Lhadj

:
On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas. 116-117 - Michael Beyer

, Andrey Morozov, Kai Ding, Sheng Ding, Klaus Janschek
:
Quantification of the Impact of Random Hardware Faults on Safety-Critical AI Applications: CNN-Based Traffic Sign Recognition Case Study. 118-119 - Haoran Guo, Jun Ai, Tao Shi:

A Clone Code Detection Method Based on Software Complex Network. 120-121 - Marcello Cinque

, Raffaele Della Corte, Antonio Pecchia:
Advancing Monitoring in Microservices Systems. 122-123 - Hideharu Kojima

, Naoto Yanai
:
A State Space Suppression Method for Formal Verification of Secure Routing Protocols With SPIN. 124-125 - Antonio Ken Iannillo

, Radu State:
A Proposal for Security Assessment of Trustzone-M Based Software. 126-127
GAUSS 2019 Workshop
- Andrea Riboni, Luca Guglielmo

, Matteo Orrù, Pietro Braione
, Giovanni Denaro:
Design for Testability of ERMTS Applications. 128-136 - Mariano Ceccato

, Luca Gazzola, Fitsum Meshesha Kifetew, Leonardo Mariani, Matteo Orrù, Paolo Tonella:
Toward In-Vivo Testing of Mobile Applications. 137-143 - Antonia Bertolino

, Guglielmo De Angelis, Francesca Lonetti
:
Governing Regression Testing in Systems of Systems. 144-148 - Marco Autili

, Francesco Gallo, Paola Inverardi, Claudio Pompilio
, Massimo Tivoli
:
Introducing Trust in Service-Oriented Distributed Systems through Blockchain. 149-154 - Luciano Baresi

, Giovanni Denaro, Giovanni Quattrocchi:
Big-Data Applications as Self-Adaptive Systems of Systems. 155-162 - Andrea Janes, Barbara Russo:

Automatic Performance Monitoring and Regression Testing During the Transition from Monolith to Microservices. 163-168 - Antonio De Iasio, Eugenio Zimeo:

Avoiding Faults due to Dangling Dependencies by Synchronization in Microservices Applications. 169-176 - Ester Giallonardo, Francesco Poggi

, Davide Rossi, Eugenio Zimeo:
Resilient Reactive Systems Based on Runtime Semantic Models. 177-184 - Antonio Guerriero

, Raffaela Mirandola
, Roberto Pietrantuono
, Stefano Russo
:
A Hybrid Framework for Web Services Reliability and Performance Assessment. 185-192 - Marco Mobilio, Matteo Orrù, Oliviero Riganelli, Alessandro Tundo

, Leonardo Mariani:
Anomaly Detection As-a-Service. 193-199 - Emilia Cioroaica, Felicita Di Giandomenico, Thomas Kuhn, Francesca Lonetti

, Eda Marchetti
, Jasmin Jahic, Frank Schnicke:
Towards Runtime Monitoring for Malicious Behaviors Detection in Smart Ecosystems. 200-203
WoSAR 2019 Workshop
- Ermeson C. Andrade

, Fumio Machida:
Analysis of Software Aging Impacts on Plant Anomaly Detection with Edge Computing. 204-210 - Erico A. C. Guedes, Paulo R. M. Maciel:

Stochastic Model for Availability Analysis of Service Function Chains using Rejuvenation and Live Migration. 211-217 - Lukas Beierlieb, Lukas Iffländer, Aleksandar Milenkoski, Charles F. Gonçalves, Nuno Antunes

, Samuel Kounev:
Towards Testing the Software Aging Behavior of Hypervisor Hypercall Interfaces. 218-224 - Daniel S. Menasché, Kishor S. Trivedi, Eitan Altman:

Rejuvenation and the Age of Information. 225-231 - Mateus Schulz Nogueira, Felipe Assis, Daniel S. Menasché, Geraldo Xexéo

, Katinka Wolter:
Software Longevity in the Wild: Folklore and Law. 232-238 - Domenico Cotroneo, Luigi De Simone

, Roberto Natella
, Roberto Pietrantuono
, Stefano Russo
:
A Configurable Software Aging Detection and Rejuvenation Agent for Android. 239-245
RSDA 2019 Workshop
- Sean Rivera, Sofiane Lagraa, Antonio Ken Iannillo

, Radu State:
Auto-Encoding Robot State Against Sensor Spoofing Attacks. 252-257 - Fernando Kaway Carvalho Ota

, Jorge Augusto Meira
, Cyril Renaud Cassagnes, Radu State:
Mobile App to SGX Enclave Secure Channel. 258-263 - Saul A. Johnson

, João F. Ferreira, Alexandra Mendes
, Julien Cordry:
Lost in Disclosure: On the Inference of Password Composition Policies. 264-269 - Kevin Hogan, Noel Warford, Robert Morrison, David Miller, Sean Malone, James Purtilo:

The Challenges of Labeling Vulnerability-Contributing Commits. 270-275 - Jukka Ruohonen

, Kalle Rindell:
Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development. 276-281 - Serigne Mouhamadane Diop, Jema David Ndibwile, Doudou Fall, Shigeru Kashihara, Youki Kadobayashi:

To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications. 282-287 - Christian Lezcano

, Marta Arias:
Synthetic Dataset Generation with Itemset-Based Generative Models. 288-293 - Jukka K. Nurminen

, Tuomas Halvari, Juha Harviainen
, Juha Mylläri, Antti Röyskö, Juuso Silvennoinen, Tommi Mikkonen
:
Software Framework for Data Fault Injection to Test Machine Learning Systems. 294-299
WoSoCer 2019 Workshop
- Shujie Zhao, Yiqun Chen, Stefan Winter, Neeraj Suri

:
Analyzing and Improving Customer-Side Cloud Security Certifiability. 300-307 - Luigi De Simone

, Giovanni Mazzeo
:
Isolating Real-Time Safety-Critical Embedded Systems via SGX-Based Lightweight Virtualization. 308-313 - Ciro Donnarumma, Pietro Fara

, Gabriele Serra
, Sandro Di Leonardi
, Mauro Marinoni
:
EN-50128 Certification-Oriented Design of a Safety-Critical Hard Real-Time Kernel. 314-317 - Fredrik Warg

, Hans Blom, Jonas Borg, Rolf Johansson:
Continuous Deployment for Dependable Systems with Continuous Assurance Cases. 318-325 - Jose Luis de la Vara, Eugenio Parra, Luis Alonso, Roy Mendieta, Borja López, José María Álvarez Rodríguez

:
Integration of Tool Support for Assurance and Certification and for Knowledge-Centric Systems Engineering. 326-329 - Carmen Cârlan, Vivek Nigam, Sebastian Voss, Alexandros Tsalidis:

ExplicitCase: Tool-Support for Creating and Maintaining Assurance Arguments Integrated with System Models. 330-337 - Nicolas Metayer, Andrés Paz, Ghizlane El-Boussaidi:

Modelling DO-178C Assurance Needs: A Design Assurance Level-Sensitive DSL. 338-345 - Antoaneta Kondeva, Vivek Nigam, Harald Ruess, Carmen Cârlan:

On Computer-Aided Techniques for Supporting Safety and Security Co-Engineering. 346-353
IDEAR 2019 Workshop
- Ingo Pill, Franz Wotawa

:
Extending Automated FLTL Test Oracles with Diagnostic Support. 354-361 - Wenlu Li, Qiuying Li:

An Analysis of Factors Affecting Software Safety in the Aerospace Industry. 362-369 - Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:

Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing. 370-377
IWSF 2019 Workshop
- Rafig Almaghairbe

, Marc Roper
:
An Empirical Comparison of Two Different Strategies to Automated Fault Detection: Machine Learning Versus Dynamic Analysis. 378-385 - Marc Hartung, Florian Schintke, Thorsten Schütt:

Pinpoint Data Races via Testing and Classification. 386-393 - Han Wu, Zhihao Shang, Katinka Wolter:

TRAK: A Testing Tool for Studying the Reliability of Data Delivery in Apache Kafka. 394-397 - Quentin Fournier

, Naser Ezzati-Jivan, Daniel Aloise
, Michel R. Dagenais:
Automatic Cause Detection of Performance Problems in Web Applications. 398-405 - Raphaël Khoury, Abdelwahab Hamou-Lhadj

, Mohamed Ilyes Rahim, Sylvain Hallé, Fábio Petrillo:
TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension. 406-413 - Philippe Marcotte

, Frédéric Grégoire, Fábio Petrillo:
Multiple Fault-Tolerance Mechanisms in Cloud Systems: A Systematic Review. 414-421
SHIFT 2019 Workshop
- Peter T. Breuer, Jonathan P. Bowen

:
Safe Compilation for Hidden Deterministic Hardware Aliasing. 422-427 - Peter T. Breuer, Jonathan P. Bowen

:
Chaotic Compilation: A (Statistical) Cloak for a Secret Computer. 428-433 - Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hély

:
SHCoT: Secure (and Verified) Hybrid Chain of Trust to Protect from Malicious Software in LightWeight Devices. 434-439 - Amer Kajmakovic, Konrad Diwold, Nermin Kajtazovic, Robert Zupanc, Georg Macher:

Flexible Soft Error Mitigation Strategy for Memories in Mixed-Critical Systems. 440-445

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














