Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ssiri/sere2014c.bht:"
@inproceedings{DBLP:conf/ssiri/AiPY14, author = {Jun Ai and Hanyu Pei and Liang Yan}, title = {Software Reliability Virtual Testing for Reliability Assessment}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {71--77}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.24}, doi = {10.1109/SERE-C.2014.24}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/AiPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/AnastasovskiG14, author = {Goce Anastasovski and Katerina Goseva{-}Popstojanova}, title = {Classification of Partially Labeled Malicious Web Traffic in the Presence of Concept Drift}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {130--139}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.31}, doi = {10.1109/SERE-C.2014.31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/AnastasovskiG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ChaudhariZW14, author = {Dhyanesh Chaudhari and Mohammad Zulkernine and Komminist Weldemariam}, title = {FRanC: {A} Ranking Framework for the Prioritization of Software Maintenance}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {31--40}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.20}, doi = {10.1109/SERE-C.2014.20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ChaudhariZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ChenFCG14, author = {Hua{-}Ching Chen and Hsuan{-}Ming Feng and Benbin Chen and Donghui Guo}, title = {A Parameters Tuning Algorithm in Wireless Networks}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {257--260}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.49}, doi = {10.1109/SERE-C.2014.49}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ChenFCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ChenLLLG14, author = {Benbin Chen and Lin Li and Yiyang Li and Hongyin Luo and Donghui Guo}, title = {Compiler Assisted Instruction Relocation for Performance Improvement of Cache Hit Rate and System Reliability}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {243--246}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.46}, doi = {10.1109/SERE-C.2014.46}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ChenLLLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ChenSH14, author = {Borting Chen and Ming{-}Wei Shih and Yu{-}Lun Huang}, title = {An Anomaly Detection Module for Firefox {OS}}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {176--184}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.36}, doi = {10.1109/SERE-C.2014.36}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ChenSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ChenZ14, author = {Yixiang Chen and Yuanrui Zhang}, title = {A Hybrid Clock System Related to STeC Language}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {199--203}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.39}, doi = {10.1109/SERE-C.2014.39}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ChenZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/Chien14, author = {Hung Yu Chien}, title = {New Gen2v2-Based Mutual Authentication Schemes}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {88--96}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.26}, doi = {10.1109/SERE-C.2014.26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/Chien14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/EarleFR14, author = {Curtis C. R. Busby Earle and Robert B. France and Indrakshi Ray}, title = {Analysing Requirements to Detect Latent Security Vulnerabilities}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {168--175}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.35}, doi = {10.1109/SERE-C.2014.35}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/EarleFR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/GraaCCC14, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, title = {Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {149--157}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.33}, doi = {10.1109/SERE-C.2014.33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/GraaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/Groesbrink14, author = {Stefan Groesbrink}, title = {Virtual Machine Migration as a Fault Tolerance Technique for Embedded Real-Time Systems}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {7--12}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.16}, doi = {10.1109/SERE-C.2014.16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/Groesbrink14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/GuDW14, author = {Bin Gu and Yunwei Dong and Xiaomin Wei}, title = {A Qualitative Safety Analysis Method for {AADL} Model}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {213--217}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.41}, doi = {10.1109/SERE-C.2014.41}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/GuDW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/HsuWTCLC14, author = {Yen{-}Chun Hsu and Yu{-}Sung Wu and Tsung{-}Han Tsai and Yi Pin Chiu and Chih{-}Hung Lin and Zhi{-}Wei Chen}, title = {MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {97--106}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.27}, doi = {10.1109/SERE-C.2014.27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/HsuWTCLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/JiangSCG14, author = {Siyuan Jiang and Ra{\'{u}}l A. Santelices and Haipeng Cai and Mark Grechanik}, title = {How Accurate Is Dynamic Program Slicing? An Empirical Approach to Compute Accuracy Bounds}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {3--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.14}, doi = {10.1109/SERE-C.2014.14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/JiangSCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/KaoCCC14, author = {Kuo{-}Fong Kao and Wen{-}Ching Chen and Jui{-}Chi Chang and Heng{-}Te Chu}, title = {An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {1--2}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.13}, doi = {10.1109/SERE-C.2014.13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/KaoCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LiBTLY14, author = {Xiaolei Li and Guangdong Bai and Benjamin Thian and Zhenkai Liang and Heng Yin}, title = {A Light-Weight Software Environment for Confining Android Malware}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {158--167}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.34}, doi = {10.1109/SERE-C.2014.34}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/LiBTLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LiLCWG14, author = {Sizhao Li and Shan Lin and Deming Chen and W. Eric Wong and Donghui Guo}, title = {Analysis of System Reliability for Cache Coherence Scheme in Multi-processor}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {247--251}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.47}, doi = {10.1109/SERE-C.2014.47}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LiLCWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LiMP14, author = {J. Jenny Li and Patricia Morreale and John Douglas Palframan}, title = {Diagnosis-Guided Regression Test Refinement}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {64--70}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.23}, doi = {10.1109/SERE-C.2014.23}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LiMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LiS14, author = {J. Jenny Li and Tony Savor}, title = {Detecting DoS Attacks on Notification Services}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {192--198}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.38}, doi = {10.1109/SERE-C.2014.38}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LiuDG14, author = {Niansheng Liu and Huaiyu Dai and Donghui Guo}, title = {Security Analysis of {MAC} Protocol for Mobile Device Identification Based on {PARADIS}}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {237--242}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.45}, doi = {10.1109/SERE-C.2014.45}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/LiuDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LiuWL14, author = {Peizhong Liu and Minghang Wang and Ping Li}, title = {Robustness and Fragility of a New Local-World Dynamical Network Model}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {261--265}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.53}, doi = {10.1109/SERE-C.2014.53}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LiuWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/RahmanGAA14, author = {Farzana Rahman and Md. Osman Gani and Golam Mushih Tanimul Ahsan and Sheikh Iqbal Ahamed}, title = {Seeing Beyond Visibility: {A} Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {121--129}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.30}, doi = {10.1109/SERE-C.2014.30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/RahmanGAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/RiversVW14, author = {Anthony Thyron Rivers and Mladen A. Vouk and Laurie A. Williams}, title = {On Coverage-Based Attack Profiles}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {5--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.15}, doi = {10.1109/SERE-C.2014.15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/RiversVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/SaeedRA14, author = {Amna Saeed and Asad Raza and Haider Abbas}, title = {A Survey on Network Layer Attacks and {AODV} Defense in Mobile Ad Hoc Networks}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {185--191}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.37}, doi = {10.1109/SERE-C.2014.37}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/SaeedRA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/SwamiduraiU14, author = {Rajendran Swamidurai and David A. Umphress}, title = {The Impact of Static and Dynamic Pairs on Pair Programming}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {57--63}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.52}, doi = {10.1109/SERE-C.2014.52}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/SwamiduraiU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/TounsiJCCA14, author = {Wiem Tounsi and Benjamin Justus and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {113--120}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.29}, doi = {10.1109/SERE-C.2014.29}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/TounsiJCCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/WangWZ14, author = {Zheng Wang and Xiao Wu and Hongbin Zhao}, title = {A Load Scheduling Strategy for Electric Vehicles Charging System}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {218--222}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.42}, doi = {10.1109/SERE-C.2014.42}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/WangWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/WongGLGH14, author = {W. Eric Wong and Tej Gidvani and Alfonso Lopez and Ruizhi Gao and Matthew Horn}, title = {Evaluating Software Safety Standards: {A} Systematic Review and Comparison}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {78--87}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.25}, doi = {10.1109/SERE-C.2014.25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/WongGLGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/XuZ14, author = {Dianxiang Xu and Yunpeng Zhang}, title = {Specification and Analysis of Attribute-Based Access Control Policies: An Overview}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {41--49}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.21}, doi = {10.1109/SERE-C.2014.21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/XuZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/YangZL14, author = {Chao Yang and Tao Zheng and Zhitian Lin}, title = {{A-R} Exploit: An Automatic {ROP} Exploit Based on Long Sequence}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {50--56}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.22}, doi = {10.1109/SERE-C.2014.22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/YangZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/YaoC14, author = {Xinghua Yao and Yixiang Chen}, title = {A Proof System in Process Algebra for Demand and Supply}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {228--236}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.44}, doi = {10.1109/SERE-C.2014.44}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/YaoC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/YehLCKH14, author = {Chao{-}Chun Yeh and Han{-}Lin Lu and Chun{-}Yen Chen and Kee Kiat Khor and Shih{-}Kun Huang}, title = {CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {140--148}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.32}, doi = {10.1109/SERE-C.2014.32}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/YehLCKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/YolacanDK14, author = {Esra N. Yolacan and Jennifer G. Dy and David R. Kaeli}, title = {System Call Anomaly Detection Using Multi-HMMs}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {25--30}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.19}, doi = {10.1109/SERE-C.2014.19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/YolacanDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/YounisM14, author = {Awad A. Younis and Yashwant K. Malaiya}, title = {Using Software Structure to Predict Vulnerability Exploitation Potential}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {13--18}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.17}, doi = {10.1109/SERE-C.2014.17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/YounisM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/YuCD14, author = {Kang Yu and Zhenbang Chen and Wei Dong}, title = {A Predictive Runtime Verification Framework for Cyber-Physical Systems}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {223--227}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.43}, doi = {10.1109/SERE-C.2014.43}, timestamp = {Wed, 25 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/YuCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ZammaliBC14, author = {Amira Zammali and Agnan de Bonneval and Yves Crouzet}, title = {A Multi-function Error Detection Policy to Enhance Communication Integrity in Critical Embedded Systems}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {19--24}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.18}, doi = {10.1109/SERE-C.2014.18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ZammaliBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ZhaiWZ14, author = {Juan Zhai and Hanfei Wang and Jianhua Zhao}, title = {Post-condition-Directed Invariant Inference for Loops over Data Structures}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {204--212}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.40}, doi = {10.1109/SERE-C.2014.40}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ZhaiWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ZhanZG14, author = {Xun Zhan and Tao Zheng and Shixiang Gao}, title = {Defending {ROP} Attacks Using Basic Block Level Randomization}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {107--112}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.28}, doi = {10.1109/SERE-C.2014.28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ZhanZG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ZhengWZLG14, author = {Long Zheng and Yangbing Wu and Dan Zhang and Liwei Lin and Donghui Guo}, title = {Multiphysics Modeling and Characterization of MicroCVD Chip for Growing Carbon Nanomaterials}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {252--256}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.48}, doi = {10.1109/SERE-C.2014.48}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/ZhengWZLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ssiri/2014c, title = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6898626/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/2014c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.