


default search action
18th HASE 2017: Singapore
- 18th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017, Singapore, January 12-14, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-4636-2

Session 1: Dependability
- Jian Xiang, John C. Knight, Kevin J. Sullivan:

Is My Software Consistent with the Real World? 1-4 - Rem Gensh, Ashur Rafiev, Alexander B. Romanovsky

, Alessandro F. Garcia, Fei Xia, Alex Yakovlev:
Architecting Holistic Fault Tolerance. 5-8 - Danielle C. Tarraf, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:

Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes. 9-12
Session 2A: Security & Safety I
- Nuno Silva, Marco Vieira

, João Carlos Cunha
, Ram Chillarege:
Evaluating a Corpus of Root Causes and Measures to Guide RCA Processes in Critical Software. 17-24 - Rajesh Kumar

, Mariëlle Stoelinga
:
Quantitative Security and Safety Analysis with Attack-Fault Trees. 25-32
Session 2B: Cyber Physical System I
- Prakash Rao Dunaka, Bruce M. McMillin:

Cyber-Physical Security of a Chemical Plant. 33-40 - Giedre Sabaliauskaite

, Sridhar Adepu:
Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security. 41-48 - Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:

Cyber Security Resource Allocation: A Markov Decision Process Approach. 49-52
Session 3: Hazard Analysis
- Mario Gleirscher

, Carmen Cârlan:
Arguing from Hazard Analysis in Safety Cases: A Modular Argument Pattern. 53-60 - Quentin Cappart, Christophe Limbrée, Pierre Schaus, Jean Quilbeuf, Louis-Marie Traonouez, Axel Legay:

Verification of Interlocking Systems Using Statistical Model Checking. 61-68
Session 4A: Security & Safety II
- Kazi Zakia Sultana, Ajay Deo, Byron J. Williams:

Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities. 69-76 - Ali Kanso, Nicolas Deixionne, Abdelouahed Gherbi

, Fereydoun Farrahi Moghaddam:
Enhancing OpenStack Fault Tolerance for Provisioning Computing Environments. 77-83 - Qi Cheng

, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation. 84-87
Session 4B: Software Engineering for Assurance
- Lov Kumar

, Santanu Kumar Rath
, Ashish Sureka:
Using Source Code Metrics and Multivariate Adaptive Regression Splines to Predict Maintainability of Service Oriented Software. 88-95 - Dusica Marijan, Sagar Sen

:
Detecting and Reducing Redundancy in Software Testing for Highly Configurable Systems. 96-99 - Dusica Marijan, Marius Liaaen:

Test Prioritization with Optimally Balanced Configuration Coverage. 100-103
Session 5: Cyber Physical Systems II
- Tze Meng Low, Franz Franchetti:

High Assurance Code Generation for Cyber-Physical Systems. 104-111 - Mario Gleirscher

, Stefan Kugele:
Defining Risk States in Autonomous Road Vehicles. 112-115
Session 6: Student Paper Session
- Ismail Rizky Harlin, Hironori Washizaki, Yoshiaki Fukazawa:

Impact of Using a Static-Type System in Computer Programming. 116-119 - Nghi Huynh, Marc Frappier, Amel Mammar, Régine Laleau:

Verification of SGAC Access Control Policies Using Alloy and ProB. 120-123 - Koyena Pal

, Sridhar Adepu, Jonathan Goh:
Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems. 124-127 - Sanya Khruahong

, Xiaoying Kong, Kumbesan Sandrasegaran, Li Liu:
Multi-Level Indoor Navigation Ontology for High Assurance Location-Based Services. 128-131 - Praneeth Sakhamuri, Olivia Das:

Acquisition of Virtual Machines for Tiered Applications with Availability Constraints. 132-135 - Anusha Thudimilla, Bruce M. McMillin:

Multiple Security Domain Nondeducibility Air Traffic Surveillance Systems. 136-139
Workshop on Security issues in Cyber Physical Systems (SecCPS 2017)
- Jonathan Goh, Sridhar Adepu, Marcus Tan, Zi Shan Lee:

Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. 140-145 - Qi Xiong, Yuan Xu, Baofeng Zhang, Feng Wang:

Overview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting Devices. 146-152 - Ron Biton, Clint Feher, Yuval Elovici, Asaf Shabtai, Gaby Shugol, Raz Tikochinski, Shachar Kur:

A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems. 153-156 - Amir Alipour-Fanid, Monireh Dabaghchian

, Hengrun Zhang, Kai Zeng
:
String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks. 157-162 - Jay Prakash, Chuadhry Mujeeb Ahmed

:
Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System. 163-170

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














