Search dblp for Publications

export results for "toc:db/conf/ssiri/sere2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ssiri/AlomariM12,
  author       = {Firas B. Alomari and
                  Daniel A. Menasc{\'{e}}},
  title        = {An Autonomic Framework for Integrating Security and Quality of Service
                  Support in Databases},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {51--60},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.15},
  doi          = {10.1109/SERE.2012.15},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/AlomariM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BarbhuiyaGBN12,
  author       = {Ferdous A. Barbhuiya and
                  Vaibhav Gupta and
                  Santosh Biswas and
                  Sukumar Nandi},
  title        = {Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of
                  Service Attack},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {291--300},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.27},
  doi          = {10.1109/SERE.2012.27},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/BarbhuiyaGBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BuchlerOP12,
  author       = {Matthias B{\"{u}}chler and
                  Johan Oudinet and
                  Alexander Pretschner},
  title        = {Semi-Automatic Security Testing of Web Applications from a Secure
                  Model},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {253--262},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.38},
  doi          = {10.1109/SERE.2012.38},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/BuchlerOP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChengLS12,
  author       = {Yun{-}Min Cheng and
                  Bing{-}Han Li and
                  Shiuhpyng Winston Shieh},
  title        = {Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {187--196},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.31},
  doi          = {10.1109/SERE.2012.31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChengLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChoiJB12,
  author       = {Jinho Choi and
                  Eunkyoung Jee and
                  Doo{-}Hwan Bae},
  title        = {Toward Systematic Construction of Timing Diagrams from {UML/MARTE}
                  Behavioral Models for Time-Triggered Embedded Software},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {118--127},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.24},
  doi          = {10.1109/SERE.2012.24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChoiJB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DelahayeBGP12,
  author       = {Micka{\"{e}}l Delahaye and
                  Lionel C. Briand and
                  Arnaud Gotlieb and
                  Matthieu Petit},
  title        = {{\(\mathrm{\mu}\)}TIL: Mutation-based Statistical Test Inputs Generation
                  for Automatic Fault Localization},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {197--206},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.32},
  doi          = {10.1109/SERE.2012.32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/DelahayeBGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FethP12,
  author       = {Denis Feth and
                  Alexander Pretschner},
  title        = {Flexible Data-Driven Security for Android},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {41--50},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.14},
  doi          = {10.1109/SERE.2012.14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/FethP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangCSL12,
  author       = {Yu{-}Lun Huang and
                  Borting Chen and
                  Ming{-}Wei Shih and
                  Chien{-}Yu Lai},
  title        = {Security Impacts of Virtualization on a Network Testbed},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {71--77},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.17},
  doi          = {10.1109/SERE.2012.17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuangCSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangHHLLL12,
  author       = {Shih{-}Kun Huang and
                  Min{-}Hsiang Huang and
                  Po{-}Yen Huang and
                  Chung{-}Wei Lai and
                  Han{-}Lin Lu and
                  Wai{-}Meng Leong},
  title        = {{CRAX:} Software Crash Analysis for Automatic Exploit Generation by
                  Modeling Attacks as Symbolic Continuations},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {78--87},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.20},
  doi          = {10.1109/SERE.2012.20},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuangHHLLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Hussein12,
  author       = {Sari Haj Hussein},
  title        = {A Precise Information Flow Measure from Imprecise Probabilities},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {128--137},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.25},
  doi          = {10.1109/SERE.2012.25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Hussein12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JiangDZY12,
  author       = {Jianchun Jiang and
                  Liping Ding and
                  Ennan Zhai and
                  Ting Yu},
  title        = {VRank: {A} Context-Aware Approach to Vulnerability Scoring and Ranking
                  in {SOA}},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {61--70},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.16},
  doi          = {10.1109/SERE.2012.16},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/JiangDZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KuoHL12,
  author       = {Chih{-}Song Kuo and
                  Chin{-}Yu Huang and
                  Shao{-}Pu Luan},
  title        = {A Study of Using Two-Parameter Generalized Pareto Model to Analyze
                  the Fault Distribution of Open Source Software},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {88--97},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.21},
  doi          = {10.1109/SERE.2012.21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/KuoHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LaranjeiraR12,
  author       = {Luiz A. Laranjeira and
                  Gena{\'{\i}}na Nunes Rodrigues},
  title        = {Extending the Reliability of Wireless Sensor Networks through Informed
                  Periodic Redeployment},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {167--176},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.29},
  doi          = {10.1109/SERE.2012.29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LaranjeiraR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LeT12,
  author       = {Michael Le and
                  Yuval Tamir},
  title        = {Applying Microreboot to System Software},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {11--20},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.11},
  doi          = {10.1109/SERE.2012.11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LeT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LemosM12,
  author       = {Gizelle Sandrini Lemos and
                  Eliane Martins},
  title        = {Specification-guided Golden Run for Analysis of Robustness Testing
                  Results},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {157--166},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.28},
  doi          = {10.1109/SERE.2012.28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LemosM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinCLY12,
  author       = {Chien{-}Cheng Lin and
                  Chin{-}Chun Chang and
                  Deron Liang and
                  Ching{-}Han Yang},
  title        = {A New Non-Intrusive Authentication Method Based on the Orientation
                  Sensor for Smartphone Users},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {245--252},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.37},
  doi          = {10.1109/SERE.2012.37},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinCLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinKT12,
  author       = {Hsiao{-}Ying Lin and
                  John Kubiatowicz and
                  Wen{-}Guey Tzeng},
  title        = {A Secure Fine-Grained Access Control Mechanism for Networked Storage
                  Systems},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {225--234},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.35},
  doi          = {10.1109/SERE.2012.35},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LuD12,
  author       = {Gen Lu and
                  Saumya K. Debray},
  title        = {Automatic Simplification of Obfuscated JavaScript Code: {A} Semantics-Based
                  Approach},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {31--40},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.13},
  doi          = {10.1109/SERE.2012.13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LuD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MohamedZ12,
  author       = {Atef Mohamed and
                  Mohammad Zulkernine},
  title        = {A Control Flow Representation for Component-Based Software Reliability
                  Analysis},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.33},
  doi          = {10.1109/SERE.2012.33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MohamedZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MohosinaZ12,
  author       = {Amatul Mohosina and
                  Mohammad Zulkernine},
  title        = {{DESERVE:} {A} Framework for Detecting Program Security Vulnerability
                  Exploitations},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {98--107},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.22},
  doi          = {10.1109/SERE.2012.22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MohosinaZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MurmuriaMSV12,
  author       = {Rahul Murmuria and
                  Jeffrey Medsger and
                  Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {Mobile Application and Device Power Usage Measurements},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {147--156},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.19},
  doi          = {10.1109/SERE.2012.19},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MurmuriaMSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ParkKSB12,
  author       = {Jinhee Park and
                  Hyeon{-}Jeong Kim and
                  Ju{-}Hwan Shin and
                  Jongmoon Baik},
  title        = {An Embedded Software Reliability Model with Consideration of Hardware
                  Related Software Failures},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {207--214},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.10},
  doi          = {10.1109/SERE.2012.10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ParkKSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RawatM12,
  author       = {Sanjay Rawat and
                  Laurent Mounier},
  title        = {Finding Buffer Overflow Inducing Loops in Binary Executables},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {177--186},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.30},
  doi          = {10.1109/SERE.2012.30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/RawatM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SibaiM12,
  author       = {Faisal M. Sibai and
                  Daniel A. Menasc{\'{e}}},
  title        = {Countering Network-Centric Insider Threats through Self-Protective
                  Autonomic Rule Generation},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {273--282},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.40},
  doi          = {10.1109/SERE.2012.40},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SibaiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SmithW12,
  author       = {Ben H. Smith and
                  Laurie A. Williams},
  title        = {On the Effective Use of Security Test Patterns},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {108--117},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.23},
  doi          = {10.1109/SERE.2012.23},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SmithW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangCFLY12,
  author       = {Yabin Wang and
                  Zhenyu Chen and
                  Yang Feng and
                  Bin Luo and
                  Yijie Yang},
  title        = {Using Weighted Attributes to Improve Cluster Test Selection},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {138--146},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.18},
  doi          = {10.1109/SERE.2012.18},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangCFLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WongDLG12,
  author       = {W. Eric Wong and
                  Vidroha Debroy and
                  Yihao Li and
                  Ruizhi Gao},
  title        = {Software Fault Localization Using DStar (D*)},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {21--30},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.12},
  doi          = {10.1109/SERE.2012.12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WongDLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XiaoD12,
  author       = {Xiao Xiao and
                  Tadashi Dohi},
  title        = {Robust Wavelet Shrinkage Estimation without Data Transform for Software
                  Reliability Assessment},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {215--224},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.34},
  doi          = {10.1109/SERE.2012.34},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/XiaoD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XuXBW12,
  author       = {Dianxiang Xu and
                  Weifeng Xu and
                  Bharath K. Bavikati and
                  W. Eric Wong},
  title        = {Mining Executable Specifications of Web Applications from Selenium
                  {IDE} Tests},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {263--272},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.39},
  doi          = {10.1109/SERE.2012.39},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/XuXBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YaseenP12,
  author       = {Qussai Yaseen and
                  Brajendra Panda},
  title        = {Mitigating Insider Threat without Limiting the Availability in Concurrent
                  Undeclared Tasks},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {235--244},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.36},
  doi          = {10.1109/SERE.2012.36},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YaseenP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangJJSHG12,
  author       = {Hehua Zhang and
                  Yu Jiang and
                  Xun Jiao and
                  Xiaoyu Song and
                  William N. N. Hung and
                  Ming Gu},
  title        = {Reliability Analysis of {PLC} Systems by Bayesian Network},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {283--290},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.26},
  doi          = {10.1109/SERE.2012.26},
  timestamp    = {Mon, 16 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangJJSHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2012,
  title        = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6257299/proceeding},
  isbn         = {978-0-7695-4742-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics