Search dblp for Publications

export results for "stream:conf/ssiri:"

 download as .bib file

@inproceedings{DBLP:conf/ssiri/AiPY14,
  author       = {Jun Ai and
                  Hanyu Pei and
                  Liang Yan},
  title        = {Software Reliability Virtual Testing for Reliability Assessment},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {71--77},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.24},
  doi          = {10.1109/SERE-C.2014.24},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/AiPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AnastasovskiG14,
  author       = {Goce Anastasovski and
                  Katerina Goseva{-}Popstojanova},
  title        = {Classification of Partially Labeled Malicious Web Traffic in the Presence
                  of Concept Drift},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {130--139},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.31},
  doi          = {10.1109/SERE-C.2014.31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/AnastasovskiG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/CaiSX14,
  author       = {Haipeng Cai and
                  Ra{\'{u}}l A. Santelices and
                  Tianyu Xu},
  title        = {Estimating the Accuracy of Dynamic Change-Impact Analysis Using Sensitivity
                  Analysis},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {48--57},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.18},
  doi          = {10.1109/SERE.2014.18},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/CaiSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChaudhariZW14,
  author       = {Dhyanesh Chaudhari and
                  Mohammad Zulkernine and
                  Komminist Weldemariam},
  title        = {FRanC: {A} Ranking Framework for the Prioritization of Software Maintenance},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {31--40},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.20},
  doi          = {10.1109/SERE-C.2014.20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChaudhariZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenFCG14,
  author       = {Hua{-}Ching Chen and
                  Hsuan{-}Ming Feng and
                  Benbin Chen and
                  Donghui Guo},
  title        = {A Parameters Tuning Algorithm in Wireless Networks},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {257--260},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.49},
  doi          = {10.1109/SERE-C.2014.49},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenFCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenLLCGC14,
  author       = {Jiaqiang Chen and
                  Shulong Liu and
                  Wangshu Liu and
                  Xiang Chen and
                  Qing Gu and
                  Daoxu Chen},
  title        = {A Two-Stage Data Preprocessing Approach for Software Fault Prediction},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {20--29},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.15},
  doi          = {10.1109/SERE.2014.15},
  timestamp    = {Mon, 17 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenLLCGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenLLLG14,
  author       = {Benbin Chen and
                  Lin Li and
                  Yiyang Li and
                  Hongyin Luo and
                  Donghui Guo},
  title        = {Compiler Assisted Instruction Relocation for Performance Improvement
                  of Cache Hit Rate and System Reliability},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {243--246},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.46},
  doi          = {10.1109/SERE-C.2014.46},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenLLLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenM14,
  author       = {Luping Chen and
                  John H. R. May},
  title        = {A Diversity Model Based on Failure Distribution and Its Application
                  in Safety Cases},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.13},
  doi          = {10.1109/SERE.2014.13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenSH14,
  author       = {Borting Chen and
                  Ming{-}Wei Shih and
                  Yu{-}Lun Huang},
  title        = {An Anomaly Detection Module for Firefox {OS}},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {176--184},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.36},
  doi          = {10.1109/SERE-C.2014.36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenZ14,
  author       = {Yixiang Chen and
                  Yuanrui Zhang},
  title        = {A Hybrid Clock System Related to STeC Language},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {199--203},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.39},
  doi          = {10.1109/SERE-C.2014.39},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Chien14,
  author       = {Hung Yu Chien},
  title        = {New Gen2v2-Based Mutual Authentication Schemes},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {88--96},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.26},
  doi          = {10.1109/SERE-C.2014.26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Chien14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/EarleFR14,
  author       = {Curtis C. R. Busby Earle and
                  Robert B. France and
                  Indrakshi Ray},
  title        = {Analysing Requirements to Detect Latent Security Vulnerabilities},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {168--175},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.35},
  doi          = {10.1109/SERE-C.2014.35},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/EarleFR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/EletribySEF14,
  author       = {Mohammad R. Eletriby and
                  Mohammed Ali Sobh and
                  Ayman M. Bahaa Eldin and
                  Hossam M. A. Fahmy},
  title        = {High Performance Java Card Operating System},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {30--39},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.16},
  doi          = {10.1109/SERE.2014.16},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/EletribySEF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FarhadiFCD14,
  author       = {Mohammad Reza Farhadi and
                  Benjamin C. M. Fung and
                  Philippe Charland and
                  Mourad Debbabi},
  title        = {BinClone: Detecting Code Clones in Malware},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {78--87},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.21},
  doi          = {10.1109/SERE.2014.21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/FarhadiFCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FourneretCBLB14,
  author       = {Elizabeta Fourneret and
                  J{\'{e}}r{\^{o}}me Cantenot and
                  Fabrice Bouquet and
                  Bruno Legeard and
                  Julien Botella},
  title        = {SeTGaM: Generalized Technique for Regression Testing Based on {UML/OCL}
                  Models},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {147--156},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.28},
  doi          = {10.1109/SERE.2014.28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/FourneretCBLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GraaCCC14,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Ana R. Cavalli},
  title        = {Protection against Code Obfuscation Attacks Based on Control Dependencies
                  in Android Systems},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {149--157},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.33},
  doi          = {10.1109/SERE-C.2014.33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/GraaCCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Groesbrink14,
  author       = {Stefan Groesbrink},
  title        = {Virtual Machine Migration as a Fault Tolerance Technique for Embedded
                  Real-Time Systems},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.16},
  doi          = {10.1109/SERE-C.2014.16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Groesbrink14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GuDW14,
  author       = {Bin Gu and
                  Yunwei Dong and
                  Xiaomin Wei},
  title        = {A Qualitative Safety Analysis Method for {AADL} Model},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {213--217},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.41},
  doi          = {10.1109/SERE-C.2014.41},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/GuDW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HerscheidT14,
  author       = {Lena Herscheid and
                  Peter Tr{\"{o}}ger},
  title        = {Specification of Dynamic Fault Tree Concepts with Stochastic Petri
                  Nets},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {177--186},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.31},
  doi          = {10.1109/SERE.2014.31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HerscheidT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HettiarachchiDC14,
  author       = {Charitha Hettiarachchi and
                  Hyunsook Do and
                  Byoungju Choi},
  title        = {Effective Regression Testing Using Requirements and Risks},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {157--166},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.29},
  doi          = {10.1109/SERE.2014.29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HettiarachchiDC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HowserM14,
  author       = {Gerry Howser and
                  Bruce M. McMillin},
  title        = {A Modal Model of Stuxnet Attacks on Cyber-physical Systems: {A} Matter
                  of Trust},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {225--234},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.36},
  doi          = {10.1109/SERE.2014.36},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HowserM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HsuWTCLC14,
  author       = {Yen{-}Chun Hsu and
                  Yu{-}Sung Wu and
                  Tsung{-}Han Tsai and
                  Yi Pin Chiu and
                  Chih{-}Hung Lin and
                  Zhi{-}Wei Chen},
  title        = {MicroApp: Architecting Web Application for Non-uniform Trustworthiness
                  in Cloud Computing Environment},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {97--106},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.27},
  doi          = {10.1109/SERE-C.2014.27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HsuWTCLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JahanbanifarKT14,
  author       = {Azadeh Jahanbanifar and
                  Ferhat Khendek and
                  Maria Toeroe},
  title        = {Providing Hardware Redundancy for Highly Available Services in Virtualized
                  Environments},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.17},
  doi          = {10.1109/SERE.2014.17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/JahanbanifarKT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JiangSCG14,
  author       = {Siyuan Jiang and
                  Ra{\'{u}}l A. Santelices and
                  Haipeng Cai and
                  Mark Grechanik},
  title        = {How Accurate Is Dynamic Program Slicing? An Empirical Approach to
                  Compute Accuracy Bounds},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {3--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.14},
  doi          = {10.1109/SERE-C.2014.14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/JiangSCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KaoCCC14,
  author       = {Kuo{-}Fong Kao and
                  Wen{-}Ching Chen and
                  Jui{-}Chi Chang and
                  Heng{-}Te Chu},
  title        = {An Accurate Fake Access Point Detection Method Based on Deviation
                  of Beacon Time Interval},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.13},
  doi          = {10.1109/SERE-C.2014.13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/KaoCCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KwonKPH14,
  author       = {Jang Jin Kwon and
                  Doohwan Kim and
                  Jae Jin Park and
                  Jang{-}Eui Hong},
  title        = {Collision Analysis of Safety Devices to Prevent Hazards in Safety
                  Critical Systems},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {245--254},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.38},
  doi          = {10.1109/SERE.2014.38},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KwonKPH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiBTLY14,
  author       = {Xiaolei Li and
                  Guangdong Bai and
                  Benjamin Thian and
                  Zhenkai Liang and
                  Heng Yin},
  title        = {A Light-Weight Software Environment for Confining Android Malware},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {158--167},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.34},
  doi          = {10.1109/SERE-C.2014.34},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiBTLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiL14,
  author       = {Mo Li and
                  Shaoying Liu},
  title        = {Traceability-Based Formal Specification Inspection},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {167--176},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.30},
  doi          = {10.1109/SERE.2014.30},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiLCWG14,
  author       = {Sizhao Li and
                  Shan Lin and
                  Deming Chen and
                  W. Eric Wong and
                  Donghui Guo},
  title        = {Analysis of System Reliability for Cache Coherence Scheme in Multi-processor},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {247--251},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.47},
  doi          = {10.1109/SERE-C.2014.47},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiLCWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiMP14,
  author       = {J. Jenny Li and
                  Patricia Morreale and
                  John Douglas Palframan},
  title        = {Diagnosis-Guided Regression Test Refinement},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {64--70},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.23},
  doi          = {10.1109/SERE-C.2014.23},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiQCL14,
  author       = {Ang Li and
                  Zishan Qin and
                  Mingsong Chen and
                  Jing Liu},
  title        = {ADAutomation: An Activity Diagram Based Automated {GUI} Testing Framework
                  for Smartphone Applications},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {68--77},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.20},
  doi          = {10.1109/SERE.2014.20},
  timestamp    = {Mon, 28 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiQCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiS14,
  author       = {J. Jenny Li and
                  Tony Savor},
  title        = {Detecting DoS Attacks on Notification Services},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {192--198},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.38},
  doi          = {10.1109/SERE-C.2014.38},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinT14,
  author       = {Chung{-}Yi Lin and
                  Wen{-}Guey Tzeng},
  title        = {Game-Theoretic Strategy Analysis for Data Reliability Management in
                  Cloud Storage Systems},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {187--195},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.32},
  doi          = {10.1109/SERE.2014.32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinTL14,
  author       = {Hsiao{-}Ying Lin and
                  Li{-}Ping Tung and
                  Bao{-}Shuh Paul Lin},
  title        = {Reliable Repair Mechanisms with Low Connection Cost for Code Based
                  Distributed Storage Systems},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {235--244},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.37},
  doi          = {10.1109/SERE.2014.37},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinTL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuCCS14,
  author       = {Yen Ju Liu and
                  Chong Kuan Chen and
                  Michael Cheng Yi Cho and
                  Shiuhpyng Shieh},
  title        = {Fast Discovery of VM-Sensitive Divergence Points with Basic Block
                  Comparison},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {196--205},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.33},
  doi          = {10.1109/SERE.2014.33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuCCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuDG14,
  author       = {Niansheng Liu and
                  Huaiyu Dai and
                  Donghui Guo},
  title        = {Security Analysis of {MAC} Protocol for Mobile Device Identification
                  Based on {PARADIS}},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {237--242},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.45},
  doi          = {10.1109/SERE-C.2014.45},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuDG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuWL14,
  author       = {Peizhong Liu and
                  Minghang Wang and
                  Ping Li},
  title        = {Robustness and Fragility of a New Local-World Dynamical Network Model},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {261--265},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.53},
  doi          = {10.1109/SERE-C.2014.53},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MellH14,
  author       = {Peter Mell and
                  Richard E. Harang},
  title        = {Using Network Tainting to Bound the Scope of Network Ingress Attacks},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {206--215},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.34},
  doi          = {10.1109/SERE.2014.34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MellH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RahmanGAA14,
  author       = {Farzana Rahman and
                  Md. Osman Gani and
                  Golam Mushih Tanimul Ahsan and
                  Sheikh Iqbal Ahamed},
  title        = {Seeing Beyond Visibility: {A} Four Way Fusion of User Authentication
                  for Efficient Usable Security on Mobile Devices},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {121--129},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.30},
  doi          = {10.1109/SERE-C.2014.30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/RahmanGAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RiversVW14,
  author       = {Anthony Thyron Rivers and
                  Mladen A. Vouk and
                  Laurie A. Williams},
  title        = {On Coverage-Based Attack Profiles},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {5--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.15},
  doi          = {10.1109/SERE-C.2014.15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/RiversVW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SaeedRA14,
  author       = {Amna Saeed and
                  Asad Raza and
                  Haider Abbas},
  title        = {A Survey on Network Layer Attacks and {AODV} Defense in Mobile Ad
                  Hoc Networks},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {185--191},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.37},
  doi          = {10.1109/SERE-C.2014.37},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SaeedRA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SuPFHYJZ14,
  author       = {Ting Su and
                  Geguang Pu and
                  Bin Fang and
                  Jifeng He and
                  Jun Yan and
                  Siyuan Jiang and
                  Jianjun Zhao},
  title        = {Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic
                  Execution},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {98--107},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.23},
  doi          = {10.1109/SERE.2014.23},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SuPFHYJZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SwamiduraiU14,
  author       = {Rajendran Swamidurai and
                  David A. Umphress},
  title        = {The Impact of Static and Dynamic Pairs on Pair Programming},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {57--63},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.52},
  doi          = {10.1109/SERE-C.2014.52},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SwamiduraiU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TounsiJCCA14,
  author       = {Wiem Tounsi and
                  Benjamin Justus and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {113--120},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.29},
  doi          = {10.1109/SERE-C.2014.29},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TounsiJCCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TsaiQYG14,
  author       = {Wei{-}Tek Tsai and
                  Guanqiu Qi and
                  Lian Yu and
                  Jerry Gao},
  title        = {TaaS (Testing-as-a-Service) Design for Combinatorial Testing},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {127--136},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.26},
  doi          = {10.1109/SERE.2014.26},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/TsaiQYG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangWZ14,
  author       = {Zheng Wang and
                  Xiao Wu and
                  Hongbin Zhao},
  title        = {A Load Scheduling Strategy for Electric Vehicles Charging System},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {218--222},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.42},
  doi          = {10.1109/SERE-C.2014.42},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WeiTLMC14,
  author       = {Shuai Wei and
                  Enyi Tang and
                  Tianyu Liu and
                  Norbert Th. M{\"{u}}ller and
                  Zhenyu Chen},
  title        = {Automatic Numerical Analysis Based on Infinite-Precision Arithmetic},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {216--224},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.35},
  doi          = {10.1109/SERE.2014.35},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WeiTLMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WongGLGH14,
  author       = {W. Eric Wong and
                  Tej Gidvani and
                  Alfonso Lopez and
                  Ruizhi Gao and
                  Matthew Horn},
  title        = {Evaluating Software Safety Standards: {A} Systematic Review and Comparison},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {78--87},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.25},
  doi          = {10.1109/SERE-C.2014.25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WongGLGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WuY014,
  author       = {Tianyong Wu and
                  Jun Yan and
                  Jian Zhang},
  title        = {Automatic Test Data Generation for Unit Testing to Achieve {MC/DC}
                  Criterion},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {118--126},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.25},
  doi          = {10.1109/SERE.2014.25},
  timestamp    = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WuY014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WuYZLZX14,
  author       = {Yangsong Wu and
                  Yibiao Yang and
                  Yangyang Zhao and
                  Hongmin Lu and
                  Yuming Zhou and
                  Baowen Xu},
  title        = {The Influence of Developer Quality on Software Fault-Proneness Prediction},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {11--19},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.14},
  doi          = {10.1109/SERE.2014.14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WuYZLZX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XuDX14,
  author       = {Weifeng Xu and
                  Tao Ding and
                  Dianxiang Xu},
  title        = {Rule-Based Test Input Generation from Bytecode},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {108--117},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.24},
  doi          = {10.1109/SERE.2014.24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/XuDX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XuZ14,
  author       = {Dianxiang Xu and
                  Yunpeng Zhang},
  title        = {Specification and Analysis of Attribute-Based Access Control Policies:
                  An Overview},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {41--49},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.21},
  doi          = {10.1109/SERE-C.2014.21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/XuZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YangZL14,
  author       = {Chao Yang and
                  Tao Zheng and
                  Zhitian Lin},
  title        = {{A-R} Exploit: An Automatic {ROP} Exploit Based on Long Sequence},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {50--56},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.22},
  doi          = {10.1109/SERE-C.2014.22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YangZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YaoC14,
  author       = {Xinghua Yao and
                  Yixiang Chen},
  title        = {A Proof System in Process Algebra for Demand and Supply},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {228--236},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.44},
  doi          = {10.1109/SERE-C.2014.44},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YaoC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YehLCKH14,
  author       = {Chao{-}Chun Yeh and
                  Han{-}Lin Lu and
                  Chun{-}Yen Chen and
                  Kee Kiat Khor and
                  Shih{-}Kun Huang},
  title        = {CRAXDroid: Automatic Android System Testing by Selective Symbolic
                  Execution},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {140--148},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.32},
  doi          = {10.1109/SERE-C.2014.32},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YehLCKH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YolacanDK14,
  author       = {Esra N. Yolacan and
                  Jennifer G. Dy and
                  David R. Kaeli},
  title        = {System Call Anomaly Detection Using Multi-HMMs},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.19},
  doi          = {10.1109/SERE-C.2014.19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YolacanDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YounisM14,
  author       = {Awad A. Younis and
                  Yashwant K. Malaiya},
  title        = {Using Software Structure to Predict Vulnerability Exploitation Potential},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.17},
  doi          = {10.1109/SERE-C.2014.17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YounisM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YuCD14,
  author       = {Kang Yu and
                  Zhenbang Chen and
                  Wei Dong},
  title        = {A Predictive Runtime Verification Framework for Cyber-Physical Systems},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {223--227},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.43},
  doi          = {10.1109/SERE-C.2014.43},
  timestamp    = {Wed, 25 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YuCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YuTJG14,
  author       = {Lian Yu and
                  Wei{-}Tek Tsai and
                  Yanbing Jiang and
                  Jerry Gao},
  title        = {Generating Test Cases for Context-Aware Applications Using Bigraphs},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {137--146},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.27},
  doi          = {10.1109/SERE.2014.27},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YuTJG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZammaliBC14,
  author       = {Amira Zammali and
                  Agnan de Bonneval and
                  Yves Crouzet},
  title        = {A Multi-function Error Detection Policy to Enhance Communication Integrity
                  in Critical Embedded Systems},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.18},
  doi          = {10.1109/SERE-C.2014.18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZammaliBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZechFKB14,
  author       = {Philipp Zech and
                  Michael Felderer and
                  Basel Katt and
                  Ruth Breu},
  title        = {Security Test Generation by Answer Set Programming},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {88--97},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.22},
  doi          = {10.1109/SERE.2014.22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZechFKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhaiWZ14,
  author       = {Juan Zhai and
                  Hanfei Wang and
                  Jianhua Zhao},
  title        = {Post-condition-Directed Invariant Inference for Loops over Data Structures},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {204--212},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.40},
  doi          = {10.1109/SERE-C.2014.40},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhaiWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhanZG14,
  author       = {Xun Zhan and
                  Tao Zheng and
                  Shixiang Gao},
  title        = {Defending {ROP} Attacks Using Basic Block Level Randomization},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {107--112},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.28},
  doi          = {10.1109/SERE-C.2014.28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhanZG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangC14,
  author       = {Yingjun Zhang and
                  Kai Chen},
  title        = {AppMark: {A} Picture-Based Watermark for Android Apps},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {58--67},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.19},
  doi          = {10.1109/SERE.2014.19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhengWZLG14,
  author       = {Long Zheng and
                  Yangbing Wu and
                  Dan Zhang and
                  Liwei Lin and
                  Donghui Guo},
  title        = {Multiphysics Modeling and Characterization of MicroCVD Chip for Growing
                  Carbon Nanomaterials},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {252--256},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.48},
  doi          = {10.1109/SERE-C.2014.48},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhengWZLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2014,
  title        = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6890830/proceeding},
  isbn         = {978-1-4799-4296-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2014c,
  title        = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6898626/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2014c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/0002S13,
  author       = {Ryan Johnson and
                  Angelos Stavrou},
  title        = {Forced-Path Execution for Android Applications on x86 Platforms},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {188--197},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.36},
  doi          = {10.1109/SERE-C.2013.36},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/0002S13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AhmadKA13,
  author       = {Afzaal Ahmad and
                  Noor Ullah Khan and
                  Arbab Waseem Abbas},
  title        = {PHP+MySQL Based Online Examination System with Power Failure Handling
                  and Dropbox Capability},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {21--25},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.27},
  doi          = {10.1109/SERE-C.2013.27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/AhmadKA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AiZS13,
  author       = {Jun Ai and
                  Feng Zheng and
                  Jingwei Shang},
  title        = {Shortening the Cycle of Software Reliability Testing with Fuzzy Discrimination},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {21--29},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.18},
  doi          = {10.1109/SERE.2013.18},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/AiZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AlEroudK13,
  author       = {Ahmed Aleroud and
                  George Karabatis},
  title        = {Toward Zero-Day Attack Identification Using Linear Data Transformation
                  Techniques},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {159--168},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.16},
  doi          = {10.1109/SERE.2013.16},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/AlEroudK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AticiYS13,
  author       = {Ali Can Atici and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {An Approach for Isolating the Sources of Information Leakage Exploited
                  in Cache-Based Side-Channel Attacks},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {74--83},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.15},
  doi          = {10.1109/SERE-C.2013.15},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/AticiYS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Belli13,
  author       = {Fevzi Belli},
  title        = {Dependability and Software Reuse - Coupling Them by an Industrial
                  Standard},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {145--154},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.39},
  doi          = {10.1109/SERE-C.2013.39},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Belli13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BosuC13,
  author       = {Amiangshu Bosu and
                  Jeffrey C. Carver},
  title        = {Peer Code Review to Prevent Security Vulnerabilities: An Empirical
                  Evaluation},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {229--230},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.22},
  doi          = {10.1109/SERE-C.2013.22},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/BosuC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/CanzaneseKM13,
  author       = {Raymond Canzanese and
                  Moshe Kam and
                  Spiros Mancoridis},
  title        = {Multi-channel Change-Point Malware Detection},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {70--79},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.20},
  doi          = {10.1109/SERE.2013.20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/CanzaneseKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChangBL13,
  author       = {Wei Chang and
                  Xiaohong Bao and
                  Xuefei Li},
  title        = {A Study on Airborne Software Safety Requirements Patterns},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {131--136},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.44},
  doi          = {10.1109/SERE-C.2013.44},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChangBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenGZ13,
  author       = {Cuiting Chen and
                  Hans{-}Gerhard Gross and
                  Andy Zaidman},
  title        = {Improving Service Diagnosis through Increased Monitoring Granularity},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {129--138},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.13},
  doi          = {10.1109/SERE.2013.13},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenGZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenLH13,
  author       = {Borting Chen and
                  Chien{-}Yu Lai and
                  Yu{-}Lun Huang},
  title        = {A Performance Mapping Model for Physical-to-Virtual Migration},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {90--98},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.29},
  doi          = {10.1109/SERE.2013.29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenZL13,
  author       = {Kai Chen and
                  Yingjun Zhang and
                  Yifeng Lian},
  title        = {Vulnerability-Based Backdoors: Threats from Two-step Trojans},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {169--177},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.19},
  doi          = {10.1109/SERE.2013.19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChengZH13,
  author       = {Liang Cheng and
                  Yang Zhang and
                  Zhihui Han},
  title        = {Quantitatively Measure Access Control Mechanisms across Different
                  Operating Systems},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {50--59},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.12},
  doi          = {10.1109/SERE.2013.12},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChengZH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DelaitreOF13,
  author       = {Aur{\'{e}}lien Delaitre and
                  Vadim Okun and
                  Elizabeth Fong},
  title        = {Of Massive Static Analysis Data},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {163--167},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.10},
  doi          = {10.1109/SERE-C.2013.10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/DelaitreOF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DingHWL13,
  author       = {Baozeng Ding and
                  Yeping He and
                  Yanjun Wu and
                  Yuqi Lin},
  title        = {HyperVerify: {A} VM-assisted Architecture for Monitoring Hypervisor
                  Non-control Data},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {26--34},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.20},
  doi          = {10.1109/SERE-C.2013.20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/DingHWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DingHZWW13,
  author       = {Baozeng Ding and
                  Yeping He and
                  Qiming Zhou and
                  Yanjun Wu and
                  JingZheng Wu},
  title        = {hGuard: {A} Framework to Measure Hypervisor Critical Files},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {176--181},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.21},
  doi          = {10.1109/SERE-C.2013.21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/DingHZWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/EsheteVWZ13,
  author       = {Birhanu Eshete and
                  Adolfo Villafiorita and
                  Komminist Weldemariam and
                  Mohammad Zulkernine},
  title        = {Confeagle: Automated Analysis of Configuration Vulnerabilities in
                  Web Applications},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {188--197},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.30},
  doi          = {10.1109/SERE.2013.30},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/EsheteVWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FengWY13,
  author       = {Xiang Feng and
                  Yonghe Wu and
                  Xueqiang Yan},
  title        = {Mobile Application Protection Solution Based on 3G Security Architecture
                  and OpenID},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.24},
  doi          = {10.1109/SERE-C.2013.24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/FengWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GaoCFL13,
  author       = {Zebao Gao and
                  Zhenyu Chen and
                  Yang Feng and
                  Bin Luo},
  title        = {Mining Sequential Patterns of Predicates for Fault Localization and
                  Understanding},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {109--118},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.33},
  doi          = {10.1109/SERE.2013.33},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/GaoCFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GouglidisMH13,
  author       = {Antonios Gouglidis and
                  Ioannis Mavridis and
                  Vincent C. Hu},
  title        = {Verification of Secure Inter-operation Properties in Multi-domain
                  {RBAC} Systems},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {35--44},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.25},
  doi          = {10.1109/SERE-C.2013.25},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/GouglidisMH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HeWZ13,
  author       = {Jiantao He and
                  Linzhang Wang and
                  Jianhua Zhao},
  title        = {Supporting Automatic Code Review via Design},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {211--218},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.37},
  doi          = {10.1109/SERE-C.2013.37},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HeWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HsuFCS13,
  author       = {Chia{-}Wei Hsu and
                  Fan{-}Syun Shih and
                  Chi{-}Wei Wang and
                  Shiuhpyng Winston Shieh},
  title        = {Divergence Detector: {A} Fine-Grained Approach to Detecting VM-Awareness
                  Malware},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {80--89},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.23},
  doi          = {10.1109/SERE.2013.23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HsuFCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuYLZL13,
  author       = {Xuan Hu and
                  Chunhui Yang and
                  Dong Li and
                  Yi Zhu and
                  Mengyue Liu},
  title        = {The Time/State-based Software-Intensive Systems Failure Mode Researches},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {116--124},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.32},
  doi          = {10.1109/SERE-C.2013.32},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuYLZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangLLL13,
  author       = {Shih{-}Kun Huang and
                  Han{-}Lin Lu and
                  Wai{-}Meng Leong and
                  Huan Liu},
  title        = {CRAXweb: Automatic Web Application Testing and Attack Generation},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {208--217},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.26},
  doi          = {10.1109/SERE.2013.26},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuangLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JungFS13,
  author       = {Christian Jung and
                  Denis Feth and
                  Christian Seise},
  title        = {Context-Aware Policy Enforcement for Android},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {40--49},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.15},
  doi          = {10.1109/SERE.2013.15},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/JungFS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KamongiKKGS13,
  author       = {Patrick Kamongi and
                  Srujan Kotikela and
                  Krishna Kavi and
                  Mahadevan Gomathisankaran and
                  Anoop Singhal},
  title        = {{VULCAN:} Vulnerability Assessment Framework for Cloud Computing},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {218--226},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.31},
  doi          = {10.1109/SERE.2013.31},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/KamongiKKGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KaneishiD13,
  author       = {Toshio Kaneishi and
                  Tadashi Dohi},
  title        = {Software Reliability Modeling and Evaluation under Incomplete Knowledge
                  on Fault Distribution},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {3--12},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.28},
  doi          = {10.1109/SERE.2013.28},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/KaneishiD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KansoTK13,
  author       = {Ali Kanso and
                  Maria Toeroe and
                  Ferhat Khendek},
  title        = {Automating Service Availability Analysis: An Application to a Highly
                  Available Media-Streaming Service},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {94--101},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.28},
  doi          = {10.1109/SERE-C.2013.28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KansoTK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KaramiENS13,
  author       = {Mohammad Karami and
                  Mohamed Elsabagh and
                  Parnian Najafiborazjani and
                  Angelos Stavrou},
  title        = {Behavioral Analysis of Android Applications Using Automated Instrumentation},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {182--187},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.35},
  doi          = {10.1109/SERE-C.2013.35},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/KaramiENS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LaiWC13,
  author       = {Hsu{-}Fang Lai and
                  Yu{-}Sung Wu and
                  Yu{-}Jui Cheng},
  title        = {Exploiting Neigborhood Similarity for Virtual Machine Migration over
                  Wide-Area Network},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {149--158},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.21},
  doi          = {10.1109/SERE.2013.21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LaiWC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LarsonL13,
  author       = {Dave Larson and
                  Jigang Liu},
  title        = {A New Security Metric for {SOA} Implementations},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {102--108},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.34},
  doi          = {10.1109/SERE-C.2013.34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LarsonL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiLA13,
  author       = {Qiuying Li and
                  Lei Luo and
                  Jun Ai},
  title        = {The Determination Method for Software Reliability Qualitative Indices},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {237--245},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.17},
  doi          = {10.1109/SERE.2013.17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiLA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinDWXW13,
  author       = {Yuqi Lin and
                  Liping Ding and
                  JingZheng Wu and
                  Yalong Xie and
                  Yongji Wang},
  title        = {Robust and Efficient Covert Channel Communications in Operating Systems:
                  Design, Implementation and Evaluation},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {45--52},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.12},
  doi          = {10.1109/SERE-C.2013.12},
  timestamp    = {Sat, 25 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinDWXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinTL13,
  author       = {Hsiao{-}Ying Lin and
                  Li{-}Ping Tung and
                  Bao{-}Shuh Paul Lin},
  title        = {An Empirical Study on Data Retrievability in Decentralized Erasure
                  Code Based Distributed Storage Systems},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {30--39},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.27},
  doi          = {10.1109/SERE.2013.27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Ling13,
  author       = {Xiang Ling},
  title        = {A Categorical Approach for Modeling and Verifying Dynamic Software
                  Architecture},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {168--175},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.38},
  doi          = {10.1109/SERE-C.2013.38},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Ling13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/McLeanSH13,
  author       = {Ryan K. McLean and
                  Mark D. Silvius and
                  Kenneth M. Hopkinson},
  title        = {Method for Evaluating k-Means Clustering for Increased Reliability
                  in Cognitive Radio Networks},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {99--108},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.25},
  doi          = {10.1109/SERE.2013.25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/McLeanSH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MeskiniNC13,
  author       = {Sonia Meskini and
                  Ali Bou Nassif and
                  Luiz Fernando Capretz},
  title        = {Reliability Models Applied to Mobile Applications},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {155--162},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.30},
  doi          = {10.1109/SERE-C.2013.30},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MeskiniNC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/OuchaniMD13,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi},
  title        = {A Security Risk Assessment Framework for SysML Activity Diagrams},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {227--236},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.11},
  doi          = {10.1109/SERE.2013.11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/OuchaniMD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/PonomarevDWA13,
  author       = {Stanislav Ponomarev and
                  Jan Durand and
                  Nathan Wallace and
                  Travis Atkison},
  title        = {Evaluation of Random Projection for Malware Classification},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {68--73},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.29},
  doi          = {10.1109/SERE-C.2013.29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/PonomarevDWA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RahmanHAA13,
  author       = {Farzana Rahman and
                  Md. Endadul Hoque and
                  Sheikh Iqbal Ahamed and
                  Mohammad Arif Ul Alam},
  title        = {Preserving User Privacy in Pervasive Environments with a Collaborative
                  Model},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {84--93},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.31},
  doi          = {10.1109/SERE-C.2013.31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/RahmanHAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SenP13,
  author       = {Tarun Sen and
                  Sateesh Kumar Peddoju},
  title        = {Hierarchal Identity Based Socket for Datacenters},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {63--67},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.26},
  doi          = {10.1109/SERE-C.2013.26},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SenP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ShahriarWLZ13,
  author       = {Hossain Shahriar and
                  Komminist Weldemariam and
                  Thibaud Lutellier and
                  Mohammad Zulkernine},
  title        = {A Model-Based Detection of Vulnerable and Malicious Browser Extensions},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {198--207},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.32},
  doi          = {10.1109/SERE.2013.32},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ShahriarWLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Stavrou13,
  author       = {Angelos Stavrou},
  title        = {Programming on Android: Best Practices for Security and Reliability},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.37},
  doi          = {10.1109/SERE.2013.37},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Stavrou13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SungCWHS13,
  author       = {Yin{-}Chang Sung and
                  Michael Cheng Yi Cho and
                  Chi{-}Wei Wang and
                  Chia{-}Wei Hsu and
                  Shiuhpyng Winston Shieh},
  title        = {Light-Weight {CSRF} Protection by Labeling User-Created Contents},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {60--69},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.22},
  doi          = {10.1109/SERE.2013.22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SungCWHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TrojahnO13,
  author       = {Matthias Trojahn and
                  Frank Ortmeier},
  title        = {Designing an Enterprise Security Strategy for Mobile Intranet Access},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {8--15},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.14},
  doi          = {10.1109/SERE-C.2013.14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/TrojahnO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TuXX13,
  author       = {Manghui Tu and
                  Liangliang Xiao and
                  Dianxiang Xu},
  title        = {Maximizing the Availability of Replicated Services in Widely Distributed
                  Systems Considering Network Availability},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {178--187},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.9},
  doi          = {10.1109/SERE.2013.9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/TuXX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangLW13,
  author       = {Yichen Wang and
                  Xinsheng Lan and
                  Yikun Wang},
  title        = {Modeling Embedded Software Test Requirement Based on {MARTE}},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {109--115},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.43},
  doi          = {10.1109/SERE-C.2013.43},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangWXLGJ13,
  author       = {Pingjian Wang and
                  Lei Wang and
                  Ji Xiang and
                  Peng Liu and
                  Neng Gao and
                  Jiwu Jing},
  title        = {MJBlocker: {A} Lightweight and Run-Time Malicious JavaScript Extensions
                  Blocker},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {119--128},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.14},
  doi          = {10.1109/SERE.2013.14},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangWXLGJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WeiH13,
  author       = {Zheng Wei and
                  Bai Han},
  title        = {Multiple-Bug Oriented Fault Localization: {A} Parameter-Based Combination
                  Approach},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {125--130},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.18},
  doi          = {10.1109/SERE-C.2013.18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WeiH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WuDGZ13,
  author       = {Xiaona Wu and
                  Yunwei Dong and
                  Yongqi Ge and
                  Hongbin Zhao},
  title        = {A High Reliable Communication Technology in Electric Vehicle Charging
                  Station},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {198--203},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.9},
  doi          = {10.1109/SERE-C.2013.9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WuDGZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WuWCDW13,
  author       = {Xueguang Wu and
                  Yanjun Wen and
                  Liqian Chen and
                  Wei Dong and
                  Ji Wang},
  title        = {Data Race Detection for Interrupt-Driven Programs via Bounded Model
                  Checking},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {204--210},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.33},
  doi          = {10.1109/SERE-C.2013.33},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WuWCDW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WuWWYW13,
  author       = {JingZheng Wu and
                  Yanjun Wu and
                  Zhifei Wu and
                  Mutian Yang and
                  Yongji Wang},
  title        = {Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {225--226},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.17},
  doi          = {10.1109/SERE-C.2013.17},
  timestamp    = {Sat, 25 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WuWWYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XuHV13,
  author       = {Haiyun Xu and
                  Jeroen Heijmans and
                  Joost Visser},
  title        = {A Practical Model for Rating Software Security},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {231--232},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.11},
  doi          = {10.1109/SERE-C.2013.11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/XuHV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YangLG13,
  author       = {Shunkun Yang and
                  Minyan Lu and
                  Lin Ge},
  title        = {Bayesian Network Based Software Reliability Prediction by Dynamic
                  Simulation},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {13--20},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.24},
  doi          = {10.1109/SERE.2013.24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YangLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YangWWW13,
  author       = {Mutian Yang and
                  JingZheng Wu and
                  Yanjun Wu and
                  Zhifei Wu},
  title        = {Policykeeper: Recommending Proper Security Mechanisms Based on the
                  Severity of Vulnerability Considering User Experience},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {227--228},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.19},
  doi          = {10.1109/SERE-C.2013.19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YangWWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZechFFB13,
  author       = {Philipp Zech and
                  Michael Felderer and
                  Matthias Farwick and
                  Ruth Breu},
  title        = {A Concept for Language-Oriented Security Testing},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {53--62},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.16},
  doi          = {10.1109/SERE-C.2013.16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZechFFB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangLYH13,
  author       = {Xiaotao Zhang and
                  Hui Li and
                  Shouwen Yang and
                  Shuangshuang Han},
  title        = {On a High-Performance and Balanced Method of Hardware Implementation
                  for {AES}},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {16--20},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.13},
  doi          = {10.1109/SERE-C.2013.13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangLYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangX13,
  author       = {Hong Zhang and
                  Lili Xu},
  title        = {Application of Software Safety Analysis Using Event-B},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {137--144},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.45},
  doi          = {10.1109/SERE-C.2013.45},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangZCZZ13,
  author       = {Lewen Zhang and
                  Yong Zhou and
                  Yixiang Chen and
                  Min Zhang and
                  Juyang Zhang},
  title        = {Stability of Software Trustworthiness Measurements Models},
  booktitle    = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  pages        = {219--224},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE-C.2013.23},
  doi          = {10.1109/SERE-C.2013.23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangZCZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Zuo13,
  author       = {Yanjun Zuo},
  title        = {Moving and Relocating: {A} Logical Framework of Service Migration
                  for Software System Survivability},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {139--148},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.10},
  doi          = {10.1109/SERE.2013.10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Zuo13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2013,
  title        = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6570841/proceeding},
  isbn         = {978-1-4799-0406-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2013c,
  title        = {Seventh International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion
                  Volume},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6615633/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2013c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AlomariM12,
  author       = {Firas B. Alomari and
                  Daniel A. Menasc{\'{e}}},
  title        = {An Autonomic Framework for Integrating Security and Quality of Service
                  Support in Databases},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {51--60},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.15},
  doi          = {10.1109/SERE.2012.15},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/AlomariM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BakerS12,
  author       = {Chase Baker and
                  Michael Shin},
  title        = {Mapping of Security Concerns in Design to Security Aspects in Code},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {102--110},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.20},
  doi          = {10.1109/SERE-C.2012.20},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/BakerS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BarbhuiyaGBN12,
  author       = {Ferdous A. Barbhuiya and
                  Vaibhav Gupta and
                  Santosh Biswas and
                  Sukumar Nandi},
  title        = {Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of
                  Service Attack},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {291--300},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.27},
  doi          = {10.1109/SERE.2012.27},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/BarbhuiyaGBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BelliBM12,
  author       = {Fevzi Belli and
                  Mutlu Beyazit and
                  Atif M. Memon},
  title        = {Testing is an Event-Centric Activity},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {198--206},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.24},
  doi          = {10.1109/SERE-C.2012.24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/BelliBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BlackburnH12,
  author       = {Mark R. Blackburn and
                  Benjamin Huddell},
  title        = {Hybrid Bayesian Network Models for Predicting Software Reliability},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {33--34},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.38},
  doi          = {10.1109/SERE-C.2012.38},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/BlackburnH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BuchlerOP12,
  author       = {Matthias B{\"{u}}chler and
                  Johan Oudinet and
                  Alexander Pretschner},
  title        = {Semi-Automatic Security Testing of Web Applications from a Secure
                  Model},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {253--262},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.38},
  doi          = {10.1109/SERE.2012.38},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/BuchlerOP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/CaiW12,
  author       = {Xuesong Cai and
                  Junwei Wu},
  title        = {Hazardous Chemicals Vehicles Rollover Pre-warning System Based on
                  {CPS}},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {184--187},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.37},
  doi          = {10.1109/SERE-C.2012.37},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/CaiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChangHL12,
  author       = {Jun{-}Ru Chang and
                  Chin{-}Yu Huang and
                  Po{-}Hsi Li},
  title        = {An Investigation of Classification-Based Algorithms for Modified Condition/Decision
                  Coverage Criteria},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {127--136},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.23},
  doi          = {10.1109/SERE-C.2012.23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChangHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenM12,
  author       = {Jie Chen and
                  Xiaoguang Mao},
  title        = {Bodhi: Detecting Buffer Overflows with a Game},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {168--173},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.35},
  doi          = {10.1109/SERE-C.2012.35},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenWGZZGW12,
  author       = {Liping Chen and
                  Xiaoping Wang and
                  Xiong Gong and
                  Hongchang Zhang and
                  Fanli Zhou and
                  Bin Gu and
                  Lei Wang},
  title        = {Modeling and Simulating CAN-Based Cyber-Physical Systems in Modelica},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.31},
  doi          = {10.1109/SERE-C.2012.31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenWGZZGW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChengLS12,
  author       = {Yun{-}Min Cheng and
                  Bing{-}Han Li and
                  Shiuhpyng Winston Shieh},
  title        = {Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {187--196},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.31},
  doi          = {10.1109/SERE.2012.31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChengLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChoiJB12,
  author       = {Jinho Choi and
                  Eunkyoung Jee and
                  Doo{-}Hwan Bae},
  title        = {Toward Systematic Construction of Timing Diagrams from {UML/MARTE}
                  Behavioral Models for Time-Triggered Embedded Software},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {118--127},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.24},
  doi          = {10.1109/SERE.2012.24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChoiJB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/CostaQC12,
  author       = {Rodrigo Alves Costa and
                  Ruy J. G. B. de Queiroz and
                  Elmano Ramalho Cavalcanti},
  title        = {A Proposal to Prevent Click-Fraud Using Clickable CAPTCHAs},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {62--67},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.13},
  doi          = {10.1109/SERE-C.2012.13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/CostaQC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DelahayeBGP12,
  author       = {Micka{\"{e}}l Delahaye and
                  Lionel C. Briand and
                  Arnaud Gotlieb and
                  Matthieu Petit},
  title        = {{\(\mathrm{\mu}\)}TIL: Mutation-based Statistical Test Inputs Generation
                  for Automatic Fault Localization},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {197--206},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.32},
  doi          = {10.1109/SERE.2012.32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/DelahayeBGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DingCJYBL12,
  author       = {Wenxu Ding and
                  Xin Chen and
                  Peng Jiang and
                  Nan Ye and
                  Lei Bu and
                  Xuandong Li},
  title        = {Path-oriented Test Data Generation Driven by Component Linear Fitting
                  Functions},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {37--38},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.40},
  doi          = {10.1109/SERE-C.2012.40},
  timestamp    = {Wed, 20 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/DingCJYBL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DingM12,
  author       = {Junhua Ding and
                  Lian Mo},
  title        = {Enforcement of Role Based Access Control in Social Network Environments},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {92--101},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.19},
  doi          = {10.1109/SERE-C.2012.19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/DingM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DongDC12,
  author       = {Longming Dong and
                  Wei Dong and
                  Liqian Chen},
  title        = {Invalid Pointer Dereferences Detection for {CPS} Software Based on
                  Extended Pointer Structures},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {144--151},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.30},
  doi          = {10.1109/SERE-C.2012.30},
  timestamp    = {Wed, 25 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/DongDC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Duncan12,
  author       = {Ishbel MacDonald Duncan},
  title        = {Intelligent Biological Security Testing Agents},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {41--42},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.42},
  doi          = {10.1109/SERE-C.2012.42},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Duncan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FethP12,
  author       = {Denis Feth and
                  Alexander Pretschner},
  title        = {Flexible Data-Driven Security for Android},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {41--50},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.14},
  doi          = {10.1109/SERE.2012.14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/FethP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GabrielsonL12,
  author       = {Anthony Gabrielson and
                  Haim Levkowitz},
  title        = {Integrating Network Cryptography into the Operating System},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {7--11},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.27},
  doi          = {10.1109/SERE-C.2012.27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/GabrielsonL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GuanWW12,
  author       = {Bei Guan and
                  Yanjun Wu and
                  Yongji Wang},
  title        = {A Novel Security Scheme for Online Banking Based on Virtual Machine},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {12--17},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.28},
  doi          = {10.1109/SERE-C.2012.28},
  timestamp    = {Sat, 25 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/GuanWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangCSL12,
  author       = {Yu{-}Lun Huang and
                  Borting Chen and
                  Ming{-}Wei Shih and
                  Chien{-}Yu Lai},
  title        = {Security Impacts of Virtualization on a Network Testbed},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {71--77},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.17},
  doi          = {10.1109/SERE.2012.17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuangCSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangHHLLL12,
  author       = {Shih{-}Kun Huang and
                  Min{-}Hsiang Huang and
                  Po{-}Yen Huang and
                  Chung{-}Wei Lai and
                  Han{-}Lin Lu and
                  Wai{-}Meng Leong},
  title        = {{CRAX:} Software Crash Analysis for Automatic Exploit Generation by
                  Modeling Attacks as Symbolic Continuations},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {78--87},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.20},
  doi          = {10.1109/SERE.2012.20},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuangHHLLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Hussein12,
  author       = {Sari Haj Hussein},
  title        = {A Precise Information Flow Measure from Imprecise Probabilities},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {128--137},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.25},
  doi          = {10.1109/SERE.2012.25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Hussein12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HwangHX12,
  author       = {JeeHyun Hwang and
                  Vincent C. Hu and
                  Tao Xie},
  title        = {Paradigm in Verification of Access Control},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {193},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.14},
  doi          = {10.1109/SERE-C.2012.14},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HwangHX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/InckiAS12,
  author       = {Koray In{\c{c}}ki and
                  Ismail Ari and
                  Hasan S{\"{o}}zer},
  title        = {A Survey of Software Testing in the Cloud},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {18--23},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.32},
  doi          = {10.1109/SERE-C.2012.32},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/InckiAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JiangDZY12,
  author       = {Jianchun Jiang and
                  Liping Ding and
                  Ennan Zhai and
                  Ting Yu},
  title        = {VRank: {A} Context-Aware Approach to Vulnerability Scoring and Ranking
                  in {SOA}},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {61--70},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.16},
  doi          = {10.1109/SERE.2012.16},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/JiangDZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JohnsonWGS12,
  author       = {Ryan Johnson and
                  Zhaohui Wang and
                  Corey Gagnon and
                  Angelos Stavrou},
  title        = {Analysis of Android Applications' Permissions},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {45--46},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.44},
  doi          = {10.1109/SERE-C.2012.44},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/JohnsonWGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KrugerL12,
  author       = {Benedikt Kruger and
                  Michael Linschulte},
  title        = {Cost Reduction through Combining Test Sequences with Input Data},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {207--216},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.25},
  doi          = {10.1109/SERE-C.2012.25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/KrugerL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KuoHL12,
  author       = {Chih{-}Song Kuo and
                  Chin{-}Yu Huang and
                  Shao{-}Pu Luan},
  title        = {A Study of Using Two-Parameter Generalized Pareto Model to Analyze
                  the Fault Distribution of Open Source Software},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {88--97},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.21},
  doi          = {10.1109/SERE.2012.21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/KuoHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LaranjeiraR12,
  author       = {Luiz A. Laranjeira and
                  Gena{\'{\i}}na Nunes Rodrigues},
  title        = {Extending the Reliability of Wireless Sensor Networks through Informed
                  Periodic Redeployment},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {167--176},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.29},
  doi          = {10.1109/SERE.2012.29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LaranjeiraR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LeT12,
  author       = {Michael Le and
                  Yuval Tamir},
  title        = {Applying Microreboot to System Software},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {11--20},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.11},
  doi          = {10.1109/SERE.2012.11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LeT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LemosM12,
  author       = {Gizelle Sandrini Lemos and
                  Eliane Martins},
  title        = {Specification-guided Golden Run for Analysis of Robustness Testing
                  Results},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {157--166},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.28},
  doi          = {10.1109/SERE.2012.28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LemosM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiWH12,
  author       = {Hailin Li and
                  Yadi Wang and
                  Jihong Han},
  title        = {A Novel Method for Modeling Complex Network of Software System Security},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {24--26},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.33},
  doi          = {10.1109/SERE-C.2012.33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinCLY12,
  author       = {Chien{-}Cheng Lin and
                  Chin{-}Chun Chang and
                  Deron Liang and
                  Ching{-}Han Yang},
  title        = {A New Non-Intrusive Authentication Method Based on the Orientation
                  Sensor for Smartphone Users},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {245--252},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.37},
  doi          = {10.1109/SERE.2012.37},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinCLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinKT12,
  author       = {Hsiao{-}Ying Lin and
                  John Kubiatowicz and
                  Wen{-}Guey Tzeng},
  title        = {A Secure Fine-Grained Access Control Mechanism for Networked Storage
                  Systems},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {225--234},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.35},
  doi          = {10.1109/SERE.2012.35},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinSL12,
  author       = {Hsiao{-}Ying Lin and
                  Shiuan{-}Tzuo Shen and
                  Bao{-}Shuh Paul Lin},
  title        = {A Privacy Preserving Smart Metering System Supporting Multiple Time
                  Granularities},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {119--126},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.22},
  doi          = {10.1109/SERE-C.2012.22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinckeKL12,
  author       = {Susan J. Lincke and
                  Timothy H. Knautz and
                  Misty D. Lowery},
  title        = {Designing System Security with {UML} Misuse Deployment Diagrams},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {57--61},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.12},
  doi          = {10.1109/SERE-C.2012.12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinckeKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LuD12,
  author       = {Gen Lu and
                  Saumya K. Debray},
  title        = {Automatic Simplification of Obfuscated JavaScript Code: {A} Semantics-Based
                  Approach},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {31--40},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.13},
  doi          = {10.1109/SERE.2012.13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LuD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MalekEKMMS12,
  author       = {Sam Malek and
                  Naeem Esfahani and
                  Thabet Kacem and
                  Riyadh Mahmood and
                  Nariman Mirzaei and
                  Angelos Stavrou},
  title        = {A Framework for Automated Security Testing of Android Applications
                  on the Cloud},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {35--36},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.39},
  doi          = {10.1109/SERE-C.2012.39},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MalekEKMMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/McLean12,
  author       = {Ryan K. McLean},
  title        = {Comparing Static Security Analysis Tools Using Open Source Software},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {68--74},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.16},
  doi          = {10.1109/SERE-C.2012.16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/McLean12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MohamedZ12,
  author       = {Atef Mohamed and
                  Mohammad Zulkernine},
  title        = {A Control Flow Representation for Component-Based Software Reliability
                  Analysis},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.33},
  doi          = {10.1109/SERE.2012.33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MohamedZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MohosinaZ12,
  author       = {Amatul Mohosina and
                  Mohammad Zulkernine},
  title        = {{DESERVE:} {A} Framework for Detecting Program Security Vulnerability
                  Exploitations},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {98--107},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.22},
  doi          = {10.1109/SERE.2012.22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MohosinaZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Muijnck-HughesD12,
  author       = {Jan de Muijnck{-}Hughes and
                  Ishbel Duncan},
  title        = {Thinking Towards a Pattern Language for Predicate Based Encryption
                  Crypto-Systems},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {27--32},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.34},
  doi          = {10.1109/SERE-C.2012.34},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Muijnck-HughesD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MurmuriaMSV12,
  author       = {Rahul Murmuria and
                  Jeffrey Medsger and
                  Angelos Stavrou and
                  Jeffrey M. Voas},
  title        = {Mobile Application and Device Power Usage Measurements},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {147--156},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.19},
  doi          = {10.1109/SERE.2012.19},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MurmuriaMSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Nishi12,
  author       = {Yasuharu Nishi},
  title        = {Viewpoint-based Test Architecture Design},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {194--197},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.15},
  doi          = {10.1109/SERE-C.2012.15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Nishi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/PanZC12,
  author       = {Haiyu Pan and
                  Min Zhang and
                  Yixiang Chen},
  title        = {Lattice-Valued Kripke Structures Based on Complete Residuated Lattice},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {137--143},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.29},
  doi          = {10.1109/SERE-C.2012.29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/PanZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ParkKSB12,
  author       = {Jinhee Park and
                  Hyeon{-}Jeong Kim and
                  Ju{-}Hwan Shin and
                  Jongmoon Baik},
  title        = {An Embedded Software Reliability Model with Consideration of Hardware
                  Related Software Failures},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {207--214},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.10},
  doi          = {10.1109/SERE.2012.10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ParkKSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RawatM12,
  author       = {Sanjay Rawat and
                  Laurent Mounier},
  title        = {Finding Buffer Overflow Inducing Loops in Binary Executables},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {177--186},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.30},
  doi          = {10.1109/SERE.2012.30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/RawatM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RyooLK12,
  author       = {Jungwoo Ryoo and
                  Phillip A. Laplante and
                  Rick Kazman},
  title        = {Revising a Security Tactics Hierarchy through Decomposition, Reclassification,
                  and Derivation},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {85--91},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.18},
  doi          = {10.1109/SERE-C.2012.18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/RyooLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SabasSWB12,
  author       = {Ars{\`{e}}ne Sabas and
                  Subash Shankar and
                  Virginie Wiels and
                  Michel Boyer},
  title        = {Undesirable Aspect Interactions: {A} Prevention Policy for Three Aspect
                  Fault Types},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {75--84},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.17},
  doi          = {10.1109/SERE-C.2012.17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SabasSWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SampathS12,
  author       = {Vijay Sampath and
                  Vipul Shah},
  title        = {Software Testing of Business Applications},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {192},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.48},
  doi          = {10.1109/SERE-C.2012.48},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SampathS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SibaiM12,
  author       = {Faisal M. Sibai and
                  Daniel A. Menasc{\'{e}}},
  title        = {Countering Network-Centric Insider Threats through Self-Protective
                  Autonomic Rule Generation},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {273--282},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.40},
  doi          = {10.1109/SERE.2012.40},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SibaiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SmithW12,
  author       = {Ben H. Smith and
                  Laurie A. Williams},
  title        = {On the Effective Use of Security Test Patterns},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {108--117},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.23},
  doi          = {10.1109/SERE.2012.23},
  timestamp    = {Mon, 07 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SmithW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SongDZHG12,
  author       = {Deming Song and
                  Yunwei Dong and
                  Fan Zhang and
                  Hong Huo and
                  Bin Gu},
  title        = {Study of Safety Analysis and Assessment Methodology for {AADL} Model},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {174--183},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.36},
  doi          = {10.1109/SERE-C.2012.36},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SongDZHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TangZDCXGY12,
  author       = {Junjie Tang and
                  Jianjun Zhao and
                  Jianwan Ding and
                  Liping Chen and
                  Gang Xie and
                  Bin Gu and
                  Mengfei Yang},
  title        = {Cyber-physical Systems Modeling Method Based on Modelica},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {188--191},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.49},
  doi          = {10.1109/SERE-C.2012.49},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TangZDCXGY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangCFLY12,
  author       = {Yabin Wang and
                  Zhenyu Chen and
                  Yang Feng and
                  Bin Luo and
                  Yijie Yang},
  title        = {Using Weighted Attributes to Improve Cluster Test Selection},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {138--146},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.18},
  doi          = {10.1109/SERE.2012.18},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangCFLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangS12,
  author       = {Zhaohui Wang and
                  Angelos Stavrou},
  title        = {Attestation {\&} Authentication for {USB} Communications},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {43--44},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.43},
  doi          = {10.1109/SERE-C.2012.43},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WongDLG12,
  author       = {W. Eric Wong and
                  Vidroha Debroy and
                  Yihao Li and
                  Ruizhi Gao},
  title        = {Software Fault Localization Using DStar (D*)},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {21--30},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.12},
  doi          = {10.1109/SERE.2012.12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/WongDLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XiaoD12,
  author       = {Xiao Xiao and
                  Tadashi Dohi},
  title        = {Robust Wavelet Shrinkage Estimation without Data Transform for Software
                  Reliability Assessment},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {215--224},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.34},
  doi          = {10.1109/SERE.2012.34},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/XiaoD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XuXBW12,
  author       = {Dianxiang Xu and
                  Weifeng Xu and
                  Bharath K. Bavikati and
                  W. Eric Wong},
  title        = {Mining Executable Specifications of Web Applications from Selenium
                  {IDE} Tests},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {263--272},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.39},
  doi          = {10.1109/SERE.2012.39},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/XuXBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YaseenP12,
  author       = {Qussai Yaseen and
                  Brajendra Panda},
  title        = {Mitigating Insider Threat without Limiting the Availability in Concurrent
                  Undeclared Tasks},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {235--244},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.36},
  doi          = {10.1109/SERE.2012.36},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YaseenP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YuZWZ12,
  author       = {Jiageng Yu and
                  Peng Zhou and
                  Yanjun Wu and
                  Chen Zhao},
  title        = {Virtual Machine Replay Update: Improved Implementation for Modern
                  Hardware Architecture},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.26},
  doi          = {10.1109/SERE-C.2012.26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YuZWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZechFB12,
  author       = {Philipp Zech and
                  Michael Felderer and
                  Ruth Breu},
  title        = {Towards a Model Based Security Testing Approach of Cloud Computing
                  Environments},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {47--56},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.11},
  doi          = {10.1109/SERE-C.2012.11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZechFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangJJSHG12,
  author       = {Hehua Zhang and
                  Yu Jiang and
                  Xun Jiao and
                  Xiaoyu Song and
                  William N. N. Hung and
                  Ming Gu},
  title        = {Reliability Analysis of {PLC} Systems by Bayesian Network},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {283--290},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.26},
  doi          = {10.1109/SERE.2012.26},
  timestamp    = {Mon, 16 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangJJSHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhouLZ12,
  author       = {Xiaoyu Zhou and
                  Qian Li and
                  Jianhua Zhao},
  title        = {A New Approach of Partial Order Reduction Technique for Parallel Timed
                  Automata Model Checking},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {158--167},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.45},
  doi          = {10.1109/SERE-C.2012.45},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhouLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Zouka12,
  author       = {Heshem A. El Zouka},
  title        = {Secure {PC} Platform Based on Dual-Bus Architecture},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  pages        = {111--118},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE-C.2012.21},
  doi          = {10.1109/SERE-C.2012.21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Zouka12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2012,
  title        = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6257299/proceeding},
  isbn         = {978-0-7695-4742-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2012c,
  title        = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion
                  Volume},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6257543/proceeding},
  isbn         = {978-0-7695-4743-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2012c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AmatoFLLST11,
  author       = {Flora Amato and
                  Massimo Felici and
                  Paola Lanzi and
                  Giulia Lotti and
                  Luca Save and
                  Alessandra Tedeschi},
  title        = {Trust Observations in Validation Exercises},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {216--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.26},
  doi          = {10.1109/SSIRI.2011.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/AmatoFLLST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AmstelBE11,
  author       = {M. F. van Amstel and
                  M. G. J. van den Brand and
                  Luc J. P. Engelen},
  title        = {Using a {DSL} and Fine-Grained Model Transformations to Explore the
                  Boundaries of Model Verification},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {120--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.26},
  doi          = {10.1109/SSIRI-C.2011.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/AmstelBE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ArissWX11,
  author       = {Omar el Ariss and
                  Jianfei Wu and
                  Dianxiang Xu},
  title        = {Towards an Enhanced Design Level Security: Integrating Attack Trees
                  with Statecharts},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.11},
  doi          = {10.1109/SSIRI.2011.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ArissWX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ArogundadeJY11,
  author       = {Oluwasefunmi 'Tale Arogundade and
                  Zhi Jin and
                  Xiaoguang Yang},
  title        = {Enhancing Use Cases with Subjective Risk Assessment},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {144--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.29},
  doi          = {10.1109/SSIRI-C.2011.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ArogundadeJY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AsrafiLK11,
  author       = {Mahmuda Asrafi and
                  Huai Liu and
                  Fei{-}Ching Kuo},
  title        = {On Testing Effectiveness of Metamorphic Relations: {A} Case Study},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {147--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.21},
  doi          = {10.1109/SSIRI.2011.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/AsrafiLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Bolotov11,
  author       = {Alexander Bolotov},
  title        = {Handling Periodic Properties: Deductive Verification for Quantified
                  Temporal Logic Specifications},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {179--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.41},
  doi          = {10.1109/SSIRI-C.2011.41},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Bolotov11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/CaoLXTWX11,
  author       = {Yan Cao and
                  Qiuzi Lu and
                  Tianhua Xu and
                  Tao Tang and
                  Haifeng Wang and
                  Yongcheng Xu},
  title        = {Integrating {DSL-CBI} and NuSMV for Modeling and Verifiying Interlocking
                  Systems},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {136--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.28},
  doi          = {10.1109/SSIRI-C.2011.28},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/CaoLXTWX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChangLKCYHHK11,
  author       = {Chih{-}Hung Chang and
                  Chih{-}Wei Lu and
                  Kuo{-}Fong Kao and
                  William C. Chu and
                  Chao{-}Tung Yang and
                  Nien{-}Lin Hsueh and
                  Pao{-}Ann Hsiung and
                  Chorng{-}Shiuh Koong},
  title        = {A SysML-Based Requirement Supporting Tool for Embedded Software},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {202--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.34},
  doi          = {10.1109/SSIRI-C.2011.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChangLKCYHHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenGDGY11,
  author       = {Rui Chen and
                  Xiangying Guo and
                  Yonghao Duan and
                  Bin Gu and
                  Mengfei Yang},
  title        = {Static Data Race Detection for Interrupt-Driven Embedded Software},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {47--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.18},
  doi          = {10.1109/SSIRI-C.2011.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenGDGY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenYJBL11,
  author       = {Xin Chen and
                  Nan Ye and
                  Peng Jiang and
                  Lei Bu and
                  Xuandong Li},
  title        = {Feedback-Directed Test Case Generation Based on {UML} Activity Diagrams},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {9--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.12},
  doi          = {10.1109/SSIRI-C.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenYJBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenZBL11,
  author       = {Huajie Chen and
                  Tian Zhang and
                  Lei Bu and
                  Xuandong Li},
  title        = {An Instrumentation Tool for Program Dynamic Analysis in Java},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {60--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.20},
  doi          = {10.1109/SSIRI-C.2011.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenZBL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChoB11,
  author       = {DongSeok Cho and
                  Doo{-}Hwan Bae},
  title        = {Case Study on Installing a Porting Process for Embedded Operating
                  System in a Small Team},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {19--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.14},
  doi          = {10.1109/SSIRI-C.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChoB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Chou11,
  author       = {Shih{-}Chien Chou},
  title        = {Using Partial Ordered Numbers to Control Information Flows},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {60--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.27},
  doi          = {10.1109/SSIRI.2011.27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/Chou11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/CiraciSAH11,
  author       = {Selim Ciraci and
                  Hasan S{\"{o}}zer and
                  Mehmet Aksit and
                  Wilke Havinga},
  title        = {Execution Constraint Verification of Exception Handling on {UML} Sequence
                  Diagrams},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {31--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.13},
  doi          = {10.1109/SSIRI.2011.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/CiraciSAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DaiB11,
  author       = {Lirong Dai and
                  Yan Bai},
  title        = {An Organization-Driven Approach for Enterprise Security Development
                  and Management},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {208--215},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.25},
  doi          = {10.1109/SSIRI.2011.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/DaiB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FletcherL11,
  author       = {Kenneth K. Fletcher and
                  Xiaoqing (Frank) Liu},
  title        = {Security Requirements Analysis, Specification, Prioritization and
                  Policy Development in Cyber-Physical Systems},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {106--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.25},
  doi          = {10.1109/SSIRI-C.2011.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/FletcherL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FuLL11,
  author       = {Xianjin Fu and
                  Wanwei Liu and
                  Jing Li},
  title        = {Approximating Quantified SMT-Solving with {SAT}},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {114--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.40},
  doi          = {10.1109/SSIRI-C.2011.40},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/FuLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Garlan11,
  author       = {David Garlan},
  title        = {Invited Talk - Engineering Self-Healing and Self-Improving Systems},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {207},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.35},
  doi          = {10.1109/SSIRI-C.2011.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Garlan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HamdaqaT11,
  author       = {Mohammad Hamdaqa and
                  Ladan Tahvildari},
  title        = {ReLACK: {A} Reliable VoIP Steganography Approach},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {189--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.24},
  doi          = {10.1109/SSIRI.2011.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HamdaqaT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HanHD11,
  author       = {Wei Han and
                  Yeping He and
                  Liping Ding},
  title        = {Verifying the Safety of Xen Security Modules},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {30--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.37},
  doi          = {10.1109/SSIRI-C.2011.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HanHD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HazeyamaS11,
  author       = {Atsuo Hazeyama and
                  Hiroto Shimizu},
  title        = {A Learning Environment for Software Security Education},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {7--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.11},
  doi          = {10.1109/SSIRI-C.2011.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HazeyamaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HerboldGW11,
  author       = {Steffen Herbold and
                  Jens Grabowski and
                  Stephan Waack},
  title        = {A Model for Usage-Based Testing of Event-Driven Software},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {172--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.32},
  doi          = {10.1109/SSIRI-C.2011.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HerboldGW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HongGB11,
  author       = {Daeeui Hong and
                  Taewan Gu and
                  Jongmoon Baik},
  title        = {A {UML} Model Based White Box Reliability Prediction to Identify Unreliable
                  Components},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {152--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.30},
  doi          = {10.1109/SSIRI-C.2011.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HongGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KimBDW11,
  author       = {HyeonJeong Kim and
                  Doo{-}Hwan Bae and
                  Vidroha Debroy and
                  W. Eric Wong},
  title        = {Deriving Data Dependence from/for {UML} State Machine Diagrams},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {118--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.19},
  doi          = {10.1109/SSIRI.2011.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KimBDW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KimC11,
  author       = {Sunghun Kim and
                  Ning Chen},
  title        = {Challenges in Automatic Testing},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {84},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.43},
  doi          = {10.1109/SSIRI-C.2011.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KimC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KimH11,
  author       = {Jong{-}Phil Kim and
                  Jang{-}Eui Hong},
  title        = {Dynamic Service Replacement to Improve Composite Service Reliability},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {182--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.23},
  doi          = {10.1109/SSIRI.2011.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KimH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KimKLPK11,
  author       = {Sangsig Kim and
                  Dae{-}Kyoo Kim and
                  Lunjin Lu and
                  Sooyong Park and
                  Suntae Kim},
  title        = {A Feature-Based Modeling Approach for Building Hybrid Access Control
                  Systems},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {88--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.16},
  doi          = {10.1109/SSIRI.2011.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KimKLPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KimYCPS11,
  author       = {H. Kim and
                  H. Yoon and
                  Y. Cho and
                  Sooyong Park and
                  Vijayan Sugumaran},
  title        = {Multi-layered Adaptive Monitoring in Service Robots},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {76--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.22},
  doi          = {10.1109/SSIRI-C.2011.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KimYCPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KomotoTMYF11,
  author       = {Takafumi Komoto and
                  Kenji Taguchi and
                  Haralambos Mouratidis and
                  Nobukazu Yoshioka and
                  Kokichi Futatsugi},
  title        = {A Modelling Framework to Support Internal Control},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {187--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.33},
  doi          = {10.1109/SSIRI-C.2011.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KomotoTMYF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KuhlmannSG11,
  author       = {Mirco Kuhlmann and
                  Karsten Sohr and
                  Martin Gogolla},
  title        = {Comprehensive Two-Level Analysis of Static and Dynamic {RBAC} Constraints
                  with {UML} and {OCL}},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {108--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.18},
  doi          = {10.1109/SSIRI.2011.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KuhlmannSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Lee11,
  author       = {Seok{-}Won Lee},
  title        = {Probabilistic Risk Assessment for Security Requirements: {A} Preliminary
                  Study},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.12},
  doi          = {10.1109/SSIRI.2011.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Lee11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LeeK11,
  author       = {Jae Yoo Lee and
                  Soo Dong Kim},
  title        = {A Scalability Framework for Reliable Services},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {95--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.42},
  doi          = {10.1109/SSIRI-C.2011.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LeeK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LeeL11,
  author       = {Ki{-}Seong Lee and
                  Chan{-}Gun Lee},
  title        = {Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented
                  Programming},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {80--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.15},
  doi          = {10.1109/SSIRI.2011.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LeeL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiS11,
  author       = {Bing{-}Han Li and
                  Shiuhpyng Shieh},
  title        = {{RELEASE:} Generating Exploits Using Loop-Aware Concolic Execution},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {165--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.31},
  doi          = {10.1109/SSIRI.2011.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiaoDW11,
  author       = {Xiaofeng Liao and
                  Liping Ding and
                  Yongji Wang},
  title        = {Secure Machine Learning, a Brief Overview},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {26--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.15},
  doi          = {10.1109/SSIRI-C.2011.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiaoDW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuWLZW11,
  author       = {Si Liu and
                  Xiaofeng Wu and
                  Qin Li and
                  Huibiao Zhu and
                  Qian Wang},
  title        = {Formal Approaches to Wireless Sensor Networks},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {11--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.13},
  doi          = {10.1109/SSIRI-C.2011.13},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuWLZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuYYL11,
  author       = {Yanbin Liu and
                  Ye Yang and
                  Qiusong Yang and
                  Mingshu Li},
  title        = {DRiVeR: Diagnosing Runtime Property Violations Based on Dependency
                  Rules},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {194--201},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.38},
  doi          = {10.1109/SSIRI-C.2011.38},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuYYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MitschingWFGK11,
  author       = {Ralf Mitsching and
                  Carsten Weise and
                  Dominik Franke and
                  Thomas Gerlitz and
                  Stefan Kowalewski},
  title        = {Coping with Complexity of Testing Models for Real-Time Embedded Systems},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {128--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.27},
  doi          = {10.1109/SSIRI-C.2011.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/MitschingWFGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/OmerovicSS11,
  author       = {Aida Omerovic and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Evaluation of Experiences from Applying the {PREDIQT} Method in an
                  Industrial Case Study},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {137--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.20},
  doi          = {10.1109/SSIRI.2011.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/OmerovicSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/PanZC11,
  author       = {Haiyu Pan and
                  Min Zhang and
                  Yixiang Chen},
  title        = {Approximate Simulation for Metric Hybrid Input/Output Automata},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {53--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.19},
  doi          = {10.1109/SSIRI-C.2011.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/PanZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/QiaoYGYL11,
  author       = {Lei Qiao and
                  Mengfei Yang and
                  Bin Gu and
                  Hua Yang and
                  Bo Liu},
  title        = {An Embedded Operating System Design for the Lunar Exploration Rover},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {160--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.39},
  doi          = {10.1109/SSIRI-C.2011.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/QiaoYGYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RestrepoW11,
  author       = {Andy Restrepo and
                  W. Eric Wong},
  title        = {Validation of SDL-Based Architectural Design Models: New Coverage
                  Criteria},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {51--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.29},
  doi          = {10.1109/SSIRI.2011.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/RestrepoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RooSA11,
  author       = {Arjan J. de Roo and
                  Hasan S{\"{o}}zer and
                  Mehmet Aksit},
  title        = {Runtime Verification of Domain-Specific Models of Physical Characteristics
                  in Control Software},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.14},
  doi          = {10.1109/SSIRI.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/RooSA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SchneidewindH11,
  author       = {Norman F. Schneidewind and
                  Mike Hinchey},
  title        = {A Reliability Model for Complex Systems},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {85--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.23},
  doi          = {10.1109/SSIRI-C.2011.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SchneidewindH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ShinSP11,
  author       = {Michael Eonsuk Shin and
                  Snehadeep Sethia and
                  Nipul Patel},
  title        = {Component-Based Malicious Software Engineer Intrusion Detection},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {21--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.33},
  doi          = {10.1109/SSIRI.2011.33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ShinSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TadanoXKM11,
  author       = {Kumiko Tadano and
                  Jianwen Xiang and
                  Masahiro Kawato and
                  Yoshiharu Maeno},
  title        = {Synthesizing {SRN} Models from System Operations with SysML Diagrams
                  for Availability Analysis},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {5--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.44},
  doi          = {10.1109/SSIRI-C.2011.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TadanoXKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TuglularG11,
  author       = {Tugkan Tuglular and
                  Gurcan Gercek},
  title        = {Mutation-Based Evaluation of Weighted Test Case Selection for Firewall
                  Testing},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {157--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.22},
  doi          = {10.1109/SSIRI.2011.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TuglularG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WongDDS11,
  author       = {W. Eric Wong and
                  Andrea Demel and
                  Vidroha Debroy and
                  Michael F. Siok},
  title        = {Safe Software: Does It Cost More to Develop?},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {198--207},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.28},
  doi          = {10.1109/SSIRI.2011.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WongDDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WuDWH11,
  author       = {JingZheng Wu and
                  Liping Ding and
                  Yongji Wang and
                  Wei Han},
  title        = {A Practical Covert Channel Identification Approach in Source Code
                  Based on Directed Information Flow Graph},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {98--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.17},
  doi          = {10.1109/SSIRI.2011.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WuDWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XiangYMT11,
  author       = {Jianwen Xiang and
                  Kazuo Yanoo and
                  Yoshiharu Maeno and
                  Kumiko Tadano},
  title        = {Automatic Synthesis of Static Fault Trees from System Models},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {127--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.32},
  doi          = {10.1109/SSIRI.2011.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/XiangYMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XieATN11,
  author       = {Guo Xie and
                  Akira Asano and
                  Sei Takahashi and
                  Hideo Nakamura},
  title        = {Study on Formal Specification of Automatic Train Protection and Block
                  System for Local Line},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {35--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.16},
  doi          = {10.1109/SSIRI-C.2011.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/XieATN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YeCJDL11,
  author       = {Nan Ye and
                  Xin Chen and
                  Peng Jiang and
                  Wenxu Ding and
                  Xuandong Li},
  title        = {Automatic Regression Test Selection Based on Activity Diagrams},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {166--171},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.31},
  doi          = {10.1109/SSIRI-C.2011.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/YeCJDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YoonJY11,
  author       = {Sanghyun Yoon and
                  Jae Yeon Jo and
                  Junbeom Yoo},
  title        = {A Domain-Specific Safety Analysis for Digital Nuclear Plant Protection
                  Systems},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {68--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.21},
  doi          = {10.1109/SSIRI-C.2011.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/YoonJY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YuM11,
  author       = {Dan Yu and
                  Shilong Ma},
  title        = {A Method of Analysis and Verification for Safety-Critical Software
                  Based on Modelling and Testing},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {3--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.36},
  doi          = {10.1109/SSIRI-C.2011.36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/YuM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhaiDQ11,
  author       = {Ennan Zhai and
                  Liping Ding and
                  Sihan Qing},
  title        = {Towards a Reliable Spam-Proof Tagging System},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {174--181},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.30},
  doi          = {10.1109/SSIRI.2011.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhaiDQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangD11,
  author       = {Chen Zhang and
                  Zhenhua Duan},
  title        = {Specification and Verification of {UML2.0} Sequence Diagrams Using
                  Event Deterministic Finite Automata},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {41--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.17},
  doi          = {10.1109/SSIRI-C.2011.17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhaoDLQ11,
  author       = {Changzhi Zhao and
                  Wei Dong and
                  Martin Leucker and
                  Zhichang Qi},
  title        = {Security Goals Assurance Based on Software Active Monitoring},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {70--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.34},
  doi          = {10.1109/SSIRI.2011.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhaoDLQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhuDMZ11,
  author       = {Yufeng Zhu and
                  Yunwei Dong and
                  Chunyan Ma and
                  Fan Zhang},
  title        = {A Methodology of Model-Based Testing for {AADL} Flow Latency in {CPS}},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {99--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.24},
  doi          = {10.1109/SSIRI-C.2011.24},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhuDMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhuZLG11,
  author       = {Han Zhu and
                  Huibiao Zhu and
                  Si Liu and
                  Jian Guo},
  title        = {Towards Denotational Semantics for Verilog in {PVS}},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.10},
  doi          = {10.1109/SSIRI-C.2011.10},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhuZLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2011,
  title        = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5991610/proceeding},
  isbn         = {978-0-7695-4453-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2011c,
  title        = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6003672/proceeding},
  isbn         = {978-0-7695-4454-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2011c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AnZ10,
  author       = {Jinxia An and
                  Jihong Zhu},
  title        = {Software Reliability Modeling with Integrated Test Coverage},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {106--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.16},
  doi          = {10.1109/SSIRI.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/AnZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/AyavTB10,
  author       = {Tolga Ayav and
                  Tugkan Tuglular and
                  Fevzi Belli},
  title        = {Towards Test Case Generation for Synthesizable {VHDL} Programs Using
                  Model Checker},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {46--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.22},
  doi          = {10.1109/SSIRI-C.2010.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/AyavTB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BelliB10,
  author       = {Fevzi Belli and
                  Mutlu Beyazit},
  title        = {A Formal Framework for Mutation Testing},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {121--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.23},
  doi          = {10.1109/SSIRI.2010.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BelliB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BelliGL10,
  author       = {Fevzi Belli and
                  Nevin G{\"{u}}ler and
                  Michael Linschulte},
  title        = {Are Longer Test Sequences Always Better? - {A} Reliability Theoretical
                  Analysis},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {78--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.26},
  doi          = {10.1109/SSIRI-C.2010.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BelliGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BelliHW10,
  author       = {Fevzi Belli and
                  Axel Hollmann and
                  W. Eric Wong},
  title        = {Towards Scalable Robustness Testing},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {208--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.14},
  doi          = {10.1109/SSIRI.2010.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BelliHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BudnikST10,
  author       = {Christof J. Budnik and
                  Rajesh Subramanyan and
                  Raj Tanikella},
  title        = {Scalable V{\&}V Effort Estimation for Ultra-Large-Scale Systems},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {60--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.33},
  doi          = {10.1109/SSIRI.2010.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BudnikST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/CaoN10,
  author       = {Jing Cao and
                  Albert Nymeyer},
  title        = {The 'Best' Valid Safe Protocol Converter},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {237--243},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.21},
  doi          = {10.1109/SSIRI.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/CaoN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChandranDP10,
  author       = {Senthil Kumar Chandran and
                  Aleksandar Dimov and
                  Sasikumar Punnekkat},
  title        = {Modeling Uncertainties in the Estimation of Software Reliability},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {227--236},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.22},
  doi          = {10.1109/SSIRI.2010.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChandranDP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Chen10,
  author       = {Chunqing Chen},
  title        = {Formal Analysis for Stateflow Diagrams},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {102--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.29},
  doi          = {10.1109/SSIRI-C.2010.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DingWLH10,
  author       = {Junhua Ding and
                  Tong Wu and
                  Jun Q. Lu and
                  Xin{-}Hua Hu},
  title        = {Self-Checked Metamorphic Testing of an Image Processing Program},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {190--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.25},
  doi          = {10.1109/SSIRI.2010.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/DingWLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/EndoLSS10,
  author       = {Andr{\'{e}} Takeshi Endo and
                  Michael Linschulte and
                  Adenilso da Silva Sim{\~{a}}o and
                  Simone do R{\'{o}}cio Senger de Souza},
  title        = {Event- and Coverage-Based Testing of Web Services},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {62--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.24},
  doi          = {10.1109/SSIRI-C.2010.24},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/EndoLSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FengLLZ10,
  author       = {Yuzhang Feng and
                  Yang Liu and
                  Yuan{-}Fang Li and
                  Daqing Zhang},
  title        = {Discovering Anomalies in Semantic Web Rules},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {33--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.26},
  doi          = {10.1109/SSIRI.2010.26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/FengLLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FongKRB10,
  author       = {Elizabeth Fong and
                  Michael Kass and
                  Thomas Rhodes and
                  Frederick Boland},
  title        = {Structured Assurance Case Methodology for Assessing Software Trustworthiness},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {32--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.18},
  doi          = {10.1109/SSIRI-C.2010.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/FongKRB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GePM10,
  author       = {Xiaocheng Ge and
                  Richard F. Paige and
                  John A. McDermid},
  title        = {Analysing System Failure Behaviours with {PRISM}},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {130--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.32},
  doi          = {10.1109/SSIRI-C.2010.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/GePM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JiangASHF10,
  author       = {Zhen Ming Jiang and
                  Alberto Avritzer and
                  Emad Shihab and
                  Ahmed E. Hassan and
                  Parminder Flora},
  title        = {An Industrial Case Study on Speeding Up User Acceptance Testing by
                  Mining Execution Logs},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {131--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.15},
  doi          = {10.1109/SSIRI.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/JiangASHF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KhanhT10,
  author       = {Truong Khanh Nguyen and
                  Quan Thanh Tho},
  title        = {Using Multi Decision Diagram in Model Checking},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {126--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.31},
  doi          = {10.1109/SSIRI-C.2010.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KhanhT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KimY10,
  author       = {Dae{-}Yeob Kim and
                  Cheong Youn},
  title        = {Traceability Enhancement Technique through the Integration of Software
                  Configuration Management and Individual Working Environment},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {163--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.27},
  doi          = {10.1109/SSIRI.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KimY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KoltuksuzKO10,
  author       = {Ahmet Koltuksuz and
                  Burcu Kulahcioglu and
                  Murat Ozkan},
  title        = {Utilization of Timed Automata as a Verification Tool for Security
                  Protocols},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {86--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.27},
  doi          = {10.1109/SSIRI-C.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KoltuksuzKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KoltuksuzOK10,
  author       = {Ahmet Koltuksuz and
                  Murat Ozkan and
                  Burcu Kulahcioglu},
  title        = {Modeling Efficient Multi-chained Stream Signature Protocol Using Communicating
                  Sequential Processes},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {54--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.23},
  doi          = {10.1109/SSIRI-C.2010.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KoltuksuzOK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LauerGP10,
  author       = {Christoph Lauer and
                  Reinhard German and
                  Jens Pollmer},
  title        = {Modeling and Analysis of Advanced Automotive {ECU} Architectures at
                  Early Design Stages Using {EMF} and Model Transformation},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {18--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.37},
  doi          = {10.1109/SSIRI-C.2010.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LauerGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuN10,
  author       = {Shaoying Liu and
                  Shin Nakajima},
  title        = {A Decompositional Approach to Automatic Test Case Generation Based
                  on Formal Specifications},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {147--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.11},
  doi          = {10.1109/SSIRI.2010.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LuoW10,
  author       = {Xiangyu Luo and
                  Yun Wang},
  title        = {Recoverability of Erasure Codes Based and Intensively Written Storage
                  Systems},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {173--179},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.20},
  doi          = {10.1109/SSIRI.2010.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LuoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Luu10,
  author       = {Anh Tuan Luu},
  title        = {Modeling and Verifying Security Protocols Using {PAT} Approach},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {157--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.34},
  doi          = {10.1109/SSIRI-C.2010.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Luu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MarijanTPT10,
  author       = {Dusica Marijan and
                  Nikola Teslic and
                  Vukota Pekovic and
                  Tarkan Tekcan},
  title        = {An Approach to Achieving the Reliability in {TV} Embedded System},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {13--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.13},
  doi          = {10.1109/SSIRI-C.2010.13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/MarijanTPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MitschingWK10,
  author       = {Ralf Mitsching and
                  Carsten Weise and
                  Stefan Kowalewski},
  title        = {Design Patterns for Integrating Variability in Timed Automata},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {38--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.21},
  doi          = {10.1109/SSIRI-C.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/MitschingWK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MohamedZ10,
  author       = {Atef Mohamed and
                  Mohammad Zulkernine},
  title        = {Failure Type-Aware Reliability Assessment with Component Failure Dependency},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {98--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.12},
  doi          = {10.1109/SSIRI.2010.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/MohamedZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MyintT10,
  author       = {May Tar Hla Myint and
                  Thandar Thein},
  title        = {Availability Improvement in Virtualized Multiple Servers with Software
                  Rejuvenation and Virtualization},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {156--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.19},
  doi          = {10.1109/SSIRI.2010.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/MyintT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/OuedraogoMKD10,
  author       = {Moussa Ouedraogo and
                  Haralambos Mouratidis and
                  Djamel Khadraoui and
                  Eric Dubois},
  title        = {An Agent-Based System to Support Assurance of Security Requirements},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {78--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.32},
  doi          = {10.1109/SSIRI.2010.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/OuedraogoMKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/PedrosaM10,
  author       = {Lehilton Lelis Chaves Pedrosa and
                  Arnaldo Vieira Moura},
  title        = {Generalized Partial Test Case Generation Method},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {70--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.25},
  doi          = {10.1109/SSIRI-C.2010.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/PedrosaM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/PengHNX10,
  author       = {Rui Peng and
                  Q. P. Hu and
                  Szu Hui Ng and
                  Min Xie},
  title        = {Testing Effort Dependent Software {FDP} and {FCP} Models with Consideration
                  of Imperfect Debugging},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {141--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.13},
  doi          = {10.1109/SSIRI.2010.13},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/PengHNX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/QuanHNNTNBDHDHNNN10,
  author       = {Tho T. Quan and
                  Duc L. N. Hoang and
                  B. Tam T. Nguyen and
                  An N. Nguyen and
                  Quan D. Tran and
                  Phung H. Nguyen and
                  Thang H. Bui and
                  Anh T. Do and
                  Linh V. Huynh and
                  Nam T. Doan and
                  Nguyen T. Huynh and
                  Thien D. Nguyen and
                  Binh T. T. Nguyen and
                  Vu H. Nguyen},
  title        = {{MAFSE:} {A} Model-Based Framework for Software Verification},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {150--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.36},
  doi          = {10.1109/SSIRI-C.2010.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/QuanHNNTNBDHDHNNN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RabbiWM10,
  author       = {Fazle Rabbi and
                  Hao Wang and
                  Wendy MacCaull},
  title        = {{YAWL2DVE:} An Automated Translator for Workflow Verification},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {53--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.31},
  doi          = {10.1109/SSIRI.2010.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/RabbiWM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ShahriarZ10,
  author       = {Hossain Shahriar and
                  Mohammad Zulkernine},
  title        = {PhishTester: Automatic Testing of Phishing Attacks},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {198--207},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.17},
  doi          = {10.1109/SSIRI.2010.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ShahriarZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ShahriarZ10a,
  author       = {Hossain Shahriar and
                  Mohammad Zulkernine},
  title        = {Classification of Static Analysis-Based Buffer Overflow Detectors},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {94--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.28},
  doi          = {10.1109/SSIRI-C.2010.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ShahriarZ10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ShiL10,
  author       = {Ling Shi and
                  Yan Liu},
  title        = {Modeling and Verification of Transmission Protocols: {A} Case Study
                  on {CSMA/CD} Protocol},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {143--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.33},
  doi          = {10.1109/SSIRI-C.2010.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ShiL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SilvaCCJ10,
  author       = {Odair Jacinto da Silva and
                  Adalberto Nobiato Crespo and
                  Marcos Lordello Chaim and
                  M{\'{a}}rio Jino},
  title        = {Sensitivity of Two Coverage-Based Software Reliability Models to Variations
                  in the Operational Profile},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.24},
  doi          = {10.1109/SSIRI.2010.24},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SilvaCCJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Song10,
  author       = {Songzheng Song},
  title        = {An Efficient Method of Probabilistic Model Checking},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {24--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.14},
  doi          = {10.1109/SSIRI-C.2010.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Song10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Srikanth10,
  author       = {G. Umarani Srikanth},
  title        = {Parallel Lexical Analyzer on the Cell Processor},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {28--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.16},
  doi          = {10.1109/SSIRI-C.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Srikanth10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SubramanianLLP10,
  author       = {Deepak Subramanian and
                  Ha{-}Thanh Le and
                  Peter Kok Keong Loh and
                  Annamalai Benjamin Premkumar},
  title        = {Quantitative Evaluation of Related Web-Based Vulnerabilities},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {118--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.30},
  doi          = {10.1109/SSIRI-C.2010.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SubramanianLLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TaguchiYTK10,
  author       = {Kenji Taguchi and
                  Nobukazu Yoshioka and
                  Takayuki Tobita and
                  Hiroyuki Kaneko},
  title        = {Aligning Security Requirements and Security Assurance Using the Common
                  Criteria},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {69--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.30},
  doi          = {10.1109/SSIRI.2010.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TaguchiYTK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Tan10,
  author       = {Tian Huat Tan},
  title        = {Towards Verification of a Service Orchestration Language},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {36--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.20},
  doi          = {10.1109/SSIRI-C.2010.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Tan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TianCZL10,
  author       = {Kun Tian and
                  Kendra M. L. Cooper and
                  Kang Zhang and
                  Siyuan Liu},
  title        = {Towards a New Understanding of Advice Interference},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {180--189},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.18},
  doi          = {10.1109/SSIRI.2010.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TianCZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TuanZT10,
  author       = {Anh Tuan Luu and
                  Man Chun Zheng and
                  Thanh Tho Quan},
  title        = {Modeling and Verification of Safety Critical Systems: {A} Case Study
                  on Pacemaker},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {23--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.28},
  doi          = {10.1109/SSIRI.2010.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TuanZT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TunYHN10,
  author       = {Thein Than Tun and
                  Yijun Yu and
                  Charles B. Haley and
                  Bashar Nuseibeh},
  title        = {Model-Based Argument Analysis for Evolving Security Requirements},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {88--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.36},
  doi          = {10.1109/SSIRI.2010.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TunYHN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WongDSKS10,
  author       = {W. Eric Wong and
                  Vidroha Debroy and
                  Adithya Surampudi and
                  HyeonJeong Kim and
                  Michael F. Siok},
  title        = {Recent Catastrophic Accidents: Investigating How Software was Responsible},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {14--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.38},
  doi          = {10.1109/SSIRI.2010.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WongDSKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WoodcockOBW10,
  author       = {Jim Woodcock and
                  Marcel Oliveira and
                  Alan Burns and
                  Kun Wei},
  title        = {Modelling and Implementing Complex Systems with Timebands},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {1--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.7},
  doi          = {10.1109/SSIRI.2010.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WoodcockOBW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WuY10,
  author       = {Yongzheng Wu and
                  Roland H. C. Yap},
  title        = {The Problem of Usable Binary Authentication},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {34--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.19},
  doi          = {10.1109/SSIRI-C.2010.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WuY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XiaoWPG10,
  author       = {Hao Xiao and
                  Zheng Wang and
                  Geguang Pu and
                  Bin Gu},
  title        = {Constraint Checking for XML-Based Language Specification by {SAT}
                  Solver},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {26--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.15},
  doi          = {10.1109/SSIRI-C.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/XiaoWPG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Zhang10,
  author       = {Xian Zhang},
  title        = {Job-Shop Scheduling Problems Using Timed Planning},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {110--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.35},
  doi          = {10.1109/SSIRI-C.2010.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Zhang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangL10,
  author       = {Shao Jie Zhang and
                  Yang Liu},
  title        = {Model Checking a Lazy Concurrent List-Based Set Algorithm},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {43--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.37},
  doi          = {10.1109/SSIRI.2010.37},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangL10a,
  author       = {Shao Jie Zhang and
                  Yang Liu},
  title        = {An Automatic Approach to Model Checking {UML} State Machines},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.11},
  doi          = {10.1109/SSIRI-C.2010.11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangL10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangLA10,
  author       = {Xian Zhang and
                  Yang Liu and
                  Mikhail Auguston},
  title        = {Modeling and Analyzing Timed Security Protocols Using Extended Timed
                  {CSP}},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {217--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.29},
  doi          = {10.1109/SSIRI.2010.29},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangLA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Zhao10,
  author       = {WenDi Zhao},
  title        = {Yet Another Model Checker for {PROMELA} - The Transformation Approach},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {137--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.38},
  doi          = {10.1109/SSIRI-C.2010.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Zhao10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Zheng10,
  author       = {Man Chun Zheng},
  title        = {An Automatic Approach to Verify Sensor Network Systems},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.12},
  doi          = {10.1109/SSIRI-C.2010.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Zheng10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Zhu10,
  author       = {Huiquan Zhu},
  title        = {Model Checking C{\#} Code: {A} Translation Approach},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  pages        = {30--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI-C.2010.17},
  doi          = {10.1109/SSIRI-C.2010.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Zhu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2010,
  title        = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5502777/proceeding},
  isbn         = {978-0-7695-4086-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2010c,
  title        = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010
                  - Companion Volume},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5521350/proceeding},
  isbn         = {978-0-7695-4087-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2010c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BarylskiK09,
  author       = {Marcin Barylski and
                  Henryk Krawczyk},
  title        = {Multidimensional Approach to Quality Analysis of IPSec and {HTTPS}
                  Applications},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {425--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.17},
  doi          = {10.1109/SSIRI.2009.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BarylskiK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BassoBG09,
  author       = {Alessandro Basso and
                  Alexander Bolotov and
                  Vladimir Getov},
  title        = {Temporal Specification and Deductive Verification of a Distributed
                  Component Model and Its Environment},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {379--386},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.61},
  doi          = {10.1109/SSIRI.2009.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BassoBG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Basu09,
  author       = {Uttiya Basu},
  title        = {Position Statement: Evolving Software Models for Global Organizations},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {320},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.69},
  doi          = {10.1109/SSIRI.2009.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Basu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BelliHK09,
  author       = {Fevzi Belli and
                  Axel Hollmann and
                  Markus Kleinselbeck},
  title        = {A Graph-Model-Based Testing Method Compared with the Classification
                  Tree Method for Test Case Generation},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {193--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.40},
  doi          = {10.1109/SSIRI.2009.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BelliHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BelliHP09,
  author       = {Fevzi Belli and
                  Axel Hollmann and
                  Sascha Padberg},
  title        = {Communication Sequence Graphs for Mutation-Oriented Integration Testing},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {387--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.50},
  doi          = {10.1109/SSIRI.2009.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BelliHP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BokilDSV09,
  author       = {Prasad Bokil and
                  Priyanka Darke and
                  Ulka Shrotri and
                  R. Venkatesh},
  title        = {Automatic Test Data Generation for {C} Programs},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {359--368},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.53},
  doi          = {10.1109/SSIRI.2009.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BokilDSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/BoudaliSS09,
  author       = {Hichem Boudali and
                  Hasan S{\"{o}}zer and
                  Mari{\"{e}}lle Stoelinga},
  title        = {Architectural Availability Analysis of Software Decomposition for
                  Local Recovery},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {14--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.10},
  doi          = {10.1109/SSIRI.2009.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/BoudaliSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Boying09,
  author       = {Mao Boying},
  title        = {Position Statement: Evolving Software Models for Global Organizations},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {318--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.68},
  doi          = {10.1109/SSIRI.2009.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Boying09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/CapeMPT09,
  author       = {David A. Cape and
                  Bruce M. McMillin and
                  Benjamin W. Passer and
                  Mayur Thakur},
  title        = {Recursive Decomposition of Progress Graphs},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {23--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.19},
  doi          = {10.1109/SSIRI.2009.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/CapeMPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Dai09,
  author       = {Lirong Dai},
  title        = {Security Variability Design and Analysis in an Aspect Oriented Software
                  Architecture},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {275--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.47},
  doi          = {10.1109/SSIRI.2009.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Dai09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DengWWY09,
  author       = {Xiaolong Deng and
                  Bai Wang and
                  Bin Wu and
                  Shengqi Yang},
  title        = {Research and Evaluation on Modularity Modeling in Community Detecting
                  of Complex Network Based on Information Entropy},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {297--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.15},
  doi          = {10.1109/SSIRI.2009.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/DengWWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DiaoW09,
  author       = {Lili Diao and
                  Hao Wang},
  title        = {A Safe Approach to Shrink Email Sample Set while Keeping Balance between
                  Spam and Normal},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {329--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.66},
  doi          = {10.1109/SSIRI.2009.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/DiaoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DingJ09,
  author       = {Zuohua Ding and
                  Mingyue Jiang},
  title        = {Reliability Computing for Service Composition},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {449--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.56},
  doi          = {10.1109/SSIRI.2009.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/DingJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DuYW09,
  author       = {Jing Du and
                  Ye Yang and
                  Qing Wang},
  title        = {An Analysis for Understanding Software Security Requirement Methodologies},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {141--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.14},
  doi          = {10.1109/SSIRI.2009.14},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/DuYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HamdiM09,
  author       = {H{\'{e}}di Hamdi and
                  Mohamed Mosbah},
  title        = {A {DSL} Framework for Policy-Based Security of Distributed Systems},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {150--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.43},
  doi          = {10.1109/SSIRI.2009.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HamdiM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HankinsUL09,
  author       = {Ryan Q. Hankins and
                  Tetsutaro Uehara and
                  Jigang Liu},
  title        = {A Comparative Study of Forensic Science and Computer Forensics},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {230--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.42},
  doi          = {10.1109/SSIRI.2009.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HankinsUL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HankinsUL09a,
  author       = {Ryan Q. Hankins and
                  Tetsutaro Uehara and
                  Jigang Liu},
  title        = {A Turing Machine-Based Model for Computer Forensic Reconstruction},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {289--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.41},
  doi          = {10.1109/SSIRI.2009.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HankinsUL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/He09,
  author       = {Jifeng He},
  title        = {Probabilistic Programming With Coordination and Compensation},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.73},
  doi          = {10.1109/SSIRI.2009.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/He09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuDP09,
  author       = {Jueliang Hu and
                  Zuohua Ding and
                  Geguang Pu},
  title        = {Path-Based Approach to Integration Testing},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {445--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.48},
  doi          = {10.1109/SSIRI.2009.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuDP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangHH09,
  author       = {Chin{-}Yu Huang and
                  Tsui{-}Ying Hung and
                  Chao{-}Jung Hsu},
  title        = {Software Reliability Prediction and Analysis Using Queueing Models
                  with Multiple Change-Points},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {212--221},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.11},
  doi          = {10.1109/SSIRI.2009.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuangHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangSSWL09,
  author       = {Yu{-}Lun Huang and
                  Chih{-}Ya Shen and
                  Shiuhpyng Shieh and
                  Hung{-}Jui Wang and
                  Cheng{-}Chun Lin},
  title        = {Provable Secure {AKA} Scheme with Reliable Key Delegation in {UMTS}},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {243--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.62},
  doi          = {10.1109/SSIRI.2009.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuangSSWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HwangXH09,
  author       = {JeeHyun Hwang and
                  Tao Xie and
                  Vincent C. Hu},
  title        = {Detection of Multiple-Duty-Related Security Leakage in Access Control
                  Policies},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {65--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.63},
  doi          = {10.1109/SSIRI.2009.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HwangXH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JiangLG09,
  author       = {Michael Jiang and
                  Yaping Liu and
                  Xinzheng Gu},
  title        = {An Approach to Improving Reliability for Distributed Video-Based Monitoring
                  Systems},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {293--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.34},
  doi          = {10.1109/SSIRI.2009.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/JiangLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JiangLHZ09,
  author       = {Ying Jiang and
                  Ying{-}Na Li and
                  Shan{-}Shan Hou and
                  Lu Zhang},
  title        = {Test-Data Generation for Web Services Based on Contract Mutation},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {281--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.49},
  doi          = {10.1109/SSIRI.2009.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/JiangLHZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KammlerGALM09,
  author       = {David Kammler and
                  Junqing Guan and
                  Gerd Ascheid and
                  Rainer Leupers and
                  Heinrich Meyr},
  title        = {A Fast and Flexible Platform for Fault Injection and Evaluation in
                  Verilog-Based Simulations},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {309--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.38},
  doi          = {10.1109/SSIRI.2009.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KammlerGALM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KilariHJ09,
  author       = {Madhu Kilari and
                  Qiyu Huang and
                  Tongdan Jin},
  title        = {Six-Sigma Based Performance Verification in Early Development of Automatic
                  Test Equipment},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {187--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.13},
  doi          = {10.1109/SSIRI.2009.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KilariHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KimCW09,
  author       = {Heejin Kim and
                  Byoungju Choi and
                  W. Eric Wong},
  title        = {Performance Testing of Mobile Applications at the Unit Test Level},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {171--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.28},
  doi          = {10.1109/SSIRI.2009.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KimCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LeeJ09,
  author       = {Ching{-}Fan Lee and
                  Justie Su{-}tzu Juan},
  title        = {An Efficient and Secure Multi-secret Image Sharing Scheme with General
                  Access Structure},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {253--259},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.22},
  doi          = {10.1109/SSIRI.2009.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LeeJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiCJ09,
  author       = {Ming{-}Jheng Li and
                  Ying{-}Hsuan Chang and
                  Justie Su{-}tzu Juan},
  title        = {Efficient Multi-secret Sharing Scheme Using Room Square},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {260--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.23},
  doi          = {10.1109/SSIRI.2009.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiCJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiZCF09,
  author       = {Yong Li and
                  Yu Zhang and
                  Yiyun Chen and
                  Ming Fu},
  title        = {On the Verification of Strong Atomicity in Programs Using {STM}},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {123--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.8},
  doi          = {10.1109/SSIRI.2009.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiZCF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LimMCCP09,
  author       = {Sung Jin Lim and
                  Hae{-}Min Moon and
                  Seung{-}Hoon Chae and
                  Yongwha Chung and
                  Sung Bum Pan},
  title        = {{JPEG} 2000 and Digital Watermarking Technique Using in Medical Image},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {413--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.45},
  doi          = {10.1109/SSIRI.2009.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LimMCCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinCCC09,
  author       = {Jin{-}Cherng Lin and
                  Jan{-}Min Chen and
                  Chou{-}Chuan Chen and
                  Yu{-}Shu Chien},
  title        = {A Game Theoretic Approach to Decision and Analysis in Strategies of
                  Attack and Defense},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {75--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.27},
  doi          = {10.1109/SSIRI.2009.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinCCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuZM09,
  author       = {Qin Liu and
                  Wenqiang Zheng and
                  JunFei Ma},
  title        = {Improving Test Quality by a Test Type Analysis Based Method},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {325--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.65},
  doi          = {10.1109/SSIRI.2009.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuZM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LoinigSWH09,
  author       = {Johannes Loinig and
                  Christian Steger and
                  Reinhold Weiss and
                  Ernst Haselsteiner},
  title        = {Java Card Performance Optimization of Secure Transaction Atomicity
                  Based on Increasing the Class Field Locality},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {342--347},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.39},
  doi          = {10.1109/SSIRI.2009.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LoinigSWH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LunD09,
  author       = {Lijun Lun and
                  Xuemei Ding},
  title        = {Analyzing Relation between Software Architecture Testing Criteria
                  on Test Sequences},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {181--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.51},
  doi          = {10.1109/SSIRI.2009.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LunD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LvYWJZ09,
  author       = {Jia Lv and
                  Jing Ying and
                  Minghui Wu and
                  Tao Jiang and
                  Fanwei Zhu},
  title        = {Verifying Aspect-Oriented Programs Using Open Temporal Logic},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {85--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.20},
  doi          = {10.1109/SSIRI.2009.20},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LvYWJZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/MoonP09,
  author       = {Hae{-}Min Moon and
                  Sung Bum Pan},
  title        = {Implementation of the Privacy Protection in Video Surveillance System},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {291--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.44},
  doi          = {10.1109/SSIRI.2009.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/MoonP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Offutt09,
  author       = {Jeff Offutt},
  title        = {Automatic Test Data Generation : Who, When and Where ?},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {4},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.75},
  doi          = {10.1109/SSIRI.2009.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Offutt09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/OmerovicS09,
  author       = {Aida Omerovic and
                  Ketil St{\o}len},
  title        = {Simplifying Parametrization of Bayesian Networks in Prediction of
                  System Quality},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {447--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.36},
  doi          = {10.1109/SSIRI.2009.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/OmerovicS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/PangT09,
  author       = {Jun Pang and
                  Bao Tang},
  title        = {Message from {T4CIA} Workshop Co-chairs},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {323},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.5},
  doi          = {10.1109/SSIRI.2009.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/PangT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Paulisch09,
  author       = {Frances Paulisch},
  title        = {Reliability for Software-Based Systems},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {5},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.76},
  doi          = {10.1109/SSIRI.2009.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Paulisch09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/PinagapaniXK09,
  author       = {Sathish Pinagapani and
                  Dianxiang Xu and
                  Jun Kong},
  title        = {A Comparative Study of Access Control Languages},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {407--412},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.18},
  doi          = {10.1109/SSIRI.2009.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/PinagapaniXK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/QuHXL09,
  author       = {Binbin Qu and
                  Yin Huang and
                  Xiaodong Xie and
                  Yansheng Lu},
  title        = {A Developed Dynamic Environment Fault Injection Tool for Component
                  Security Testing},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {417--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.9},
  doi          = {10.1109/SSIRI.2009.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/QuHXL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RP09,
  author       = {Naganathan E. R and
                  Eugene X. P},
  title        = {Software Stability Model {(SSM)} for Building Reliable Real Time Computing
                  Systems},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {431--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.35},
  doi          = {10.1109/SSIRI.2009.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/RP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RenGQC09,
  author       = {Yingxin Ren and
                  Qing Gu and
                  Jingxian Qi and
                  Daoxu Chen},
  title        = {Reliability Prediction of Web Service Composition Based on {DTMC}},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {369--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.30},
  doi          = {10.1109/SSIRI.2009.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/RenGQC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SalehiKTHG09,
  author       = {Pejman Salehi and
                  Ferhat Khendek and
                  Maria Toeroe and
                  Abdelwahab Hamou{-}Lhadj and
                  Abdelouahed Gherbi},
  title        = {Checking Service Instance Protection for {AMF} Configurations},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {269--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.25},
  doi          = {10.1109/SSIRI.2009.25},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SalehiKTHG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Schnelte09,
  author       = {Matthias Schnelte},
  title        = {Generating Test Cases for Timed Systems from Controlled Natural Language
                  Specifications},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {348--353},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.58},
  doi          = {10.1109/SSIRI.2009.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Schnelte09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Siebenhofer09,
  author       = {Rudolf Siebenhofer},
  title        = {Complexity - Interoperability - Deployment of Software},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.77},
  doi          = {10.1109/SSIRI.2009.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Siebenhofer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Siebenhofer09a,
  author       = {Rudolf Siebenhofer},
  title        = {Systematic Cooperation between Industry and Universities},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {324},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.64},
  doi          = {10.1109/SSIRI.2009.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Siebenhofer09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SrividyaMV09,
  author       = {Ajit Srividya and
                  Kovur Krishna Mohan and
                  Ajit Kumar Verma},
  title        = {Improvement of QoS in Process Centric Software Development Using {ANP}},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {451--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.59},
  doi          = {10.1109/SSIRI.2009.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SrividyaMV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Subramanyan09,
  author       = {Rajesh Subramanyan},
  title        = {Panel Description: Evolving Software Models for Global Organizations},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {317},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.67},
  doi          = {10.1109/SSIRI.2009.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Subramanyan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SunFGHVDB09,
  author       = {Hong Sun and
                  Vincenzo De Florio and
                  Ning Gui and
                  Raf Hens and
                  Bert Vankeirsbilck and
                  Bart Dhoedt and
                  Chris Blondia},
  title        = {Adaptation Strategies for Performance Failure Avoindance},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {337--341},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.54},
  doi          = {10.1109/SSIRI.2009.54},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SunFGHVDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Tang09,
  author       = {Bao Tang},
  title        = {Panel: Increase Industry and Academy Cooperation in Testing Technologies
                  and Tools for Critical Industry Applications},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {376},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.79},
  doi          = {10.1109/SSIRI.2009.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Tang09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TangS09,
  author       = {Xucheng Tang and
                  Beijun Shen},
  title        = {Extending Model Driven Architecture with Software Security Assessment},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {436--441},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.21},
  doi          = {10.1109/SSIRI.2009.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TangS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TangSYC09,
  author       = {Xinhuai Tang and
                  Sizhe Sun and
                  Xiaozhou Yuan and
                  Delai Chen},
  title        = {Automated Web Service Composition System on Enterprise Service Bus},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {9--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.24},
  doi          = {10.1109/SSIRI.2009.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TangSYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Thuraisingham09,
  author       = {Bhavani Thuraisingham},
  title        = {Security Engineering: Developments and Directions},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {2--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.74},
  doi          = {10.1109/SSIRI.2009.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Thuraisingham09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TianCZY09,
  author       = {Kun Tian and
                  Kendra M. L. Cooper and
                  Kang Zhang and
                  Huiqun Yu},
  title        = {A Classification of Aspect Composition Problems},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {101--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.33},
  doi          = {10.1109/SSIRI.2009.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TianCZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TuglularKMB09,
  author       = {Tugkan Tuglular and
                  {\"{O}}zg{\"{u}}r Kaya and
                  Can Arda Muftuoglu and
                  Fevzi Belli},
  title        = {Directed Acyclic Graph Modeling of Security Policies for Firewall
                  Testing},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {393--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.52},
  doi          = {10.1109/SSIRI.2009.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TuglularKMB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Varma09,
  author       = {Pradeep Varma},
  title        = {Anchored Text for Software Weaving and Merging},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {93--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.16},
  doi          = {10.1109/SSIRI.2009.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Varma09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/VarmaN09,
  author       = {Pradeep Varma and
                  Vijay K. Naik},
  title        = {Scheduling and Controlling Semantics for Distributed Resource Based
                  Computing Engines},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {47--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.29},
  doi          = {10.1109/SSIRI.2009.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/VarmaN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangGWXZ09,
  author       = {Ju An Wang and
                  Minzhe Guo and
                  Hao Wang and
                  Min Xia and
                  Linfeng Zhou},
  title        = {Environmental Metrics for Software Security Based on a Vulnerability
                  Ontology},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {159--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.60},
  doi          = {10.1109/SSIRI.2009.60},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangGWXZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XieCWCH09,
  author       = {Anmin Xie and
                  Guodong Chen and
                  Yonggang Wang and
                  Zhong Chen and
                  Jian{-}bin Hu},
  title        = {A New Method to Generate Attack Graphs},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {401--406},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.32},
  doi          = {10.1109/SSIRI.2009.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/XieCWCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XuGLLG09,
  author       = {Chao Xu and
                  Jinghui Gu and
                  Ling Lin and
                  Alei Liang and
                  Haibing Guan},
  title        = {CacheBit: {A} Multisource-Multitarget Cache Instrumentation Tool},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {35--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.72},
  doi          = {10.1109/SSIRI.2009.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/XuGLLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/XuWQZH09,
  author       = {Chunxiang Xu and
                  Hanpin Wang and
                  Wanling Qu and
                  Meixia Zhu and
                  Yu Huang},
  title        = {A New Method to Model and Analyze the {WS-BPEL} Process under the
                  Dead-Path-Elimination Semantics},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {203--211},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.37},
  doi          = {10.1109/SSIRI.2009.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/XuWQZH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YingSFWYL09,
  author       = {Lingyun Ying and
                  Purui Su and
                  Dengguo Feng and
                  Xianggen Wang and
                  Yi Yang and
                  Yu Liu},
  title        = {ReconBin: Reconstructing Binary File from Execution for Software Analysis},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {222--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.46},
  doi          = {10.1109/SSIRI.2009.46},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/YingSFWYL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YuMA09,
  author       = {Haibo Yu and
                  Tsunenori Mine and
                  Makoto Amamiya},
  title        = {Semantic {ACP2P} Information Retrieval Method},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {303--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.57},
  doi          = {10.1109/SSIRI.2009.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/YuMA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangLWL09,
  author       = {Qiang Zhang and
                  Yuan Luo and
                  Chuliang Weng and
                  Minglu Li},
  title        = {A Trust-Based Detecting Mechanism against Profile Injection Attacks
                  in Recommender Systems},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {59--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.12},
  doi          = {10.1109/SSIRI.2009.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangLWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhangQGLYZ09,
  author       = {Fuyuan Zhang and
                  Zhengwei Qi and
                  Haibing Guan and
                  Xuezheng Liu and
                  Mao Yang and
                  Zheng Zhang},
  title        = {FiLM: {A} Runtime Monitoring Tool for Distributed Systems},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {40--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.55},
  doi          = {10.1109/SSIRI.2009.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhangQGLYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhaoZHW09,
  author       = {Chunying Zhao and
                  Kang Zhang and
                  Jie Hao and
                  W. Eric Wong},
  title        = {Visualizing Multiple Program Executions to Assist Behavior Verification},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {113--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.26},
  doi          = {10.1109/SSIRI.2009.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhaoZHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhouCJL09,
  author       = {Conghua Zhou and
                  Li Chen and
                  Shiguang Ju and
                  Zhifeng Liu},
  title        = {State Space Reduction for Verifying Noninterference},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {132--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.31},
  doi          = {10.1109/SSIRI.2009.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhouCJL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2009,
  title        = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5325010/proceeding},
  isbn         = {978-0-7695-3758-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Anghel08,
  author       = {Vasile Anghel},
  title        = {Conception for Integrated Availability in Design for the Nuclear Systems},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {217--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.33},
  doi          = {10.1109/SSIRI.2008.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Anghel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChangLC08,
  author       = {Chih{-}Hung Chang and
                  Chih{-}Wei Lu and
                  William C. Chu},
  title        = {Improving Software Integration from Requirement Process with a Model-Based
                  Object-Oriented Approach},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {175--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.39},
  doi          = {10.1109/SSIRI.2008.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChangLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChangWHLC08,
  author       = {Kun{-}Chun Chang and
                  Yi{-}Chinag Wang and
                  Chung{-}Hsien Hsu and
                  Kuen{-}Long Leu and
                  Yung{-}Yuan Chen},
  title        = {System-Bus Fault Injection Framework in SystemC Design Platform},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {211--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.11},
  doi          = {10.1109/SSIRI.2008.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChangWHLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenHL08,
  author       = {Yung{-}Yuan Chen and
                  Shu{-}Hao Hsu and
                  Kuen{-}Long Leu},
  title        = {An Estimation Model of Vulnerability for Embedded Microprocessors},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {224--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.12},
  doi          = {10.1109/SSIRI.2008.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChenSC08,
  author       = {Woei{-}Kae Chen and
                  Zheng{-}Wen Shen and
                  Che{-}Ming Chang},
  title        = {{GUI} Test Script Organization with Component Abstraction},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {128--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.16},
  doi          = {10.1109/SSIRI.2008.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChenSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChienCL08,
  author       = {Shih{-}En Chien and
                  I{-}Ta Cherng and
                  Chih{-}Wen Liu},
  title        = {Automation of Look-Up Tables for System Integrity Protection Systems
                  in Taiwan Power System},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {228--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.42},
  doi          = {10.1109/SSIRI.2008.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChienCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DamleK08,
  author       = {Nikhil Damle and
                  Avinash G. Keskar},
  title        = {Co-Simulation of Networked Embedded System: Verification Approach},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {187--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.43},
  doi          = {10.1109/SSIRI.2008.43},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/DamleK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/DrusinskyMOS08,
  author       = {Doron Drusinsky and
                  James Bret Michael and
                  Thomas W. Otani and
                  Man{-}tak Shing},
  title        = {Validating {UML} Statechart-Based Assertions Libraries for Improved
                  Reliability and Assurance},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {47--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.54},
  doi          = {10.1109/SSIRI.2008.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/DrusinskyMOS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/FujiharaOM08,
  author       = {Yasuhiro Fujihara and
                  Hitomi Oikawa and
                  Yuko Murayama},
  title        = {Towards an Interface causing Discomfort for Security: {A} User Survey
                  on the Factors of Discomfort},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {173--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.44},
  doi          = {10.1109/SSIRI.2008.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/FujiharaOM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Fukuda08,
  author       = {Shuichi Fukuda},
  title        = {Detecting Emotions and Dangerous Actions for Better Human-System Team
                  Working},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {205--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.55},
  doi          = {10.1109/SSIRI.2008.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Fukuda08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GuilleySDGM08,
  author       = {Sylvain Guilley and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Tarik Graba and
                  Yves Mathieu},
  title        = {Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic
                  Applications in FPGAs},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.31},
  doi          = {10.1109/SSIRI.2008.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/GuilleySDGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/InoueY08,
  author       = {Shinji Inoue and
                  Shigeru Yamada},
  title        = {Two-Dimensional Software Reliability Assessment with Testing-Coverage},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {150--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.21},
  doi          = {10.1109/SSIRI.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/InoueY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/JuanME08,
  author       = {Clifford C. Juan and
                  James Bret Michael and
                  Christopher S. Eagle},
  title        = {Vulnerability Analysis of {HD} Photo Image Viewer Applications},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.50},
  doi          = {10.1109/SSIRI.2008.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/JuanME08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Keene08,
  author       = {Samuel Keene},
  title        = {Design of Experiments is the "Sweet Spot" of Six Sigma},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {199--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.58},
  doi          = {10.1109/SSIRI.2008.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Keene08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KimotoTK08,
  author       = {Shin Kimoto and
                  Tatsuhiro Tsuchiya and
                  Tohru Kikuno},
  title        = {Pairwise Testing in the Presence of Configuration Change Cost},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {32--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.27},
  doi          = {10.1109/SSIRI.2008.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KimotoTK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KohinataAF08,
  author       = {Hideo Kohinata and
                  Masayuki Arai and
                  Satoshi Fukumoto},
  title        = {An Experimental Study on Latch Up Failure of {CMOS} {LSI}},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {215--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.28},
  doi          = {10.1109/SSIRI.2008.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KohinataAF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KumarM08,
  author       = {K. Saravana Kumar and
                  R. B. Misra},
  title        = {An Enhanced Model for Early Software Reliability Prediction Using
                  Software Engineering Metrics},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {177--178},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.32},
  doi          = {10.1109/SSIRI.2008.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KumarM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KumarMG08,
  author       = {K. Saravana Kumar and
                  Ravindra Babu Misra and
                  Neeraj Kumar Goyal},
  title        = {Development of Fuzzy Software Operational Profile},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {195--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.60},
  doi          = {10.1109/SSIRI.2008.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KumarMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LeeJB08,
  author       = {Wangbong Lee and
                  Boo{-}Geum Jung and
                  Jongmoon Baik},
  title        = {Early Reliability Prediction: An Approach to Software Reliability
                  Assessment in Open Software Adoption Stage},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {226--227},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.46},
  doi          = {10.1109/SSIRI.2008.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LeeJB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinSL08,
  author       = {Warren W. Lin and
                  Shiuhpyng Shieh and
                  Jia{-}Chun Lin},
  title        = {A Pollution Attack Resistant Multicast Authentication Scheme Tolerant
                  to Packet Loss},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {8--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.29},
  doi          = {10.1109/SSIRI.2008.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinSL08a,
  author       = {Che{-}Cheng Lin and
                  Shiuhpyng Shieh and
                  Jia{-}Chun Lin},
  title        = {Lightweight, Distributed Key Agreement Protocol for Wireless Sensor
                  Networks},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {96--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.30},
  doi          = {10.1109/SSIRI.2008.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinSL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinWH08,
  author       = {Wei{-}Hung Lin and
                  Yuh{-}Rau Wang and
                  Shi{-}Jinn Horng},
  title        = {A Blind Watermarking Scheme Based on Wavelet Tree Quantization},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {89--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.37},
  doi          = {10.1109/SSIRI.2008.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinWH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinYYL08,
  author       = {Hwei{-}Jen Lin and
                  Shwu{-}Huey Yen and
                  Jih Pin Yeh and
                  Meng{-}Ju Lin},
  title        = {Face Detection Based on Skin Color Segmentation and {SVM} Classification},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {230--231},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.23},
  doi          = {10.1109/SSIRI.2008.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinYYL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuZ08,
  author       = {Yu Liu and
                  Hong Zhu},
  title        = {An Experimental Evaluation of the Reliability of Adaptive Random Testing
                  Methods},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {24--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.18},
  doi          = {10.1109/SSIRI.2008.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Nagatsuka08,
  author       = {Hideki Nagatsuka},
  title        = {A Study of Estimation for the Three-Parameter Weibull Distribution
                  Based on Doubly Type-II Censored Data Using a Least Squares Method},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {158--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.45},
  doi          = {10.1109/SSIRI.2008.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Nagatsuka08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/NakaoE08,
  author       = {Haruka Nakao and
                  Robert Eschbach},
  title        = {Strategic Usage of Test Case Generation by Combining Two Test Case
                  Generation Approaches},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {213--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.17},
  doi          = {10.1109/SSIRI.2008.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/NakaoE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/NishiuchiYB08,
  author       = {Nobuyuki Nishiuchi and
                  Kimihiro Yamanaka and
                  Kunie Beppu},
  title        = {A Study of Visibility Evaluation for the Combination of Character
                  Color and Background Color on a Web Page},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {191--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.19},
  doi          = {10.1109/SSIRI.2008.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/NishiuchiYB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ParkRB08,
  author       = {Hyuncheol Park and
                  Hoyeon Ryu and
                  Jongmoon Baik},
  title        = {Historical Value-Based Approach for Cost-Cognizant Test Case Prioritization
                  to Improve the Effectiveness of Regression Testing},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.52},
  doi          = {10.1109/SSIRI.2008.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ParkRB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/RanganathanR08,
  author       = {Subramanyam Ranganathan and
                  Cvetan Redzic},
  title        = {Application of Design for Six Sigma in Third Party Intensive Programs},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {181--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.53},
  doi          = {10.1109/SSIRI.2008.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/RanganathanR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Ryu08,
  author       = {Sang{-}Moon Ryu},
  title        = {Reliability Improvement of Real-Time Embedded System Using Checkpointing},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {67--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.15},
  doi          = {10.1109/SSIRI.2008.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Ryu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SantiagoSV08,
  author       = {Valdivino Alexandre de Santiago Jr. and
                  Wendell Pereira da Silva and
                  Nandamudi L. Vijaykumar},
  title        = {Shortening Test Case Execution Time for Embedded Software},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {81--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.49},
  doi          = {10.1109/SSIRI.2008.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SantiagoSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SatoUM08,
  author       = {Koichiro Sato and
                  Yoshiki Ujiie and
                  Yoshiyuki Matsuoka},
  title        = {Application to Artificial Hip Stem Design of an Emergent Design System
                  Applicable in the Early Process of Design},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {179--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.20},
  doi          = {10.1109/SSIRI.2008.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SatoUM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SchneidewindH08,
  author       = {Norman F. Schneidewind and
                  Michael G. Hinchey},
  title        = {Risk-Driven Software Reliability and Testing},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {183--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.34},
  doi          = {10.1109/SSIRI.2008.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SchneidewindH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SelimGC08,
  author       = {Mohammad Reza Selim and
                  Yuichi Goto and
                  Jingde Cheng},
  title        = {Ensuring Reliability and Availability of Soft System Bus},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {52--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.51},
  doi          = {10.1109/SSIRI.2008.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SelimGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SeoKCL08,
  author       = {Jooyoung Seo and
                  Yuhoon Ki and
                  Byoungju Choi and
                  Kwanghyun La},
  title        = {Which Spot Should {I} Test for Effective Embedded Software Testing?},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {135--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.38},
  doi          = {10.1109/SSIRI.2008.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SeoKCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ShibutaniYS08,
  author       = {Tadahiro Shibutani and
                  Qiang Yu and
                  Masaki Shiratori},
  title        = {Effect of Creep Properties on Pressure Induced Tin Whisker Formation},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {197--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.25},
  doi          = {10.1109/SSIRI.2008.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ShibutaniYS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/Shokrolah-ShiraziM08,
  author       = {Mohammad Shokrollah{-}Shirazi and
                  Seyed Ghassem Miremadi},
  title        = {FPGA-Based Fault Injection into Synthesizable Verilog {HDL} Models},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {143--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.47},
  doi          = {10.1109/SSIRI.2008.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/Shokrolah-ShiraziM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SongR08,
  author       = {Eunjee Song and
                  Nathan V. Roberts},
  title        = {Verifiable Aspect Composition in {UML} Models},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {201--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.61},
  doi          = {10.1109/SSIRI.2008.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SongR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SunWZ08,
  author       = {Ruoying Sun and
                  Xingfen Wang and
                  Gang Zhao},
  title        = {An Ant Colony Optimization Approach to Multi-Objective Supply Chain
                  Model},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {193--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.35},
  doi          = {10.1109/SSIRI.2008.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SunWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SuzukiAYY08,
  author       = {Kazuyuki Suzuki and
                  Mesbahul Alam and
                  Takuji Yoshikawa and
                  Wataru Yamamoto},
  title        = {Two Methods for Estimating Product Lifetimes from only Warranty Claims
                  Data},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {111--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.59},
  doi          = {10.1109/SSIRI.2008.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/SuzukiAYY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TamuraY08,
  author       = {Yoshinobu Tamura and
                  Shigeru Yamada},
  title        = {A Method of Reliability Assessment Based on Deterministic Chaos Theory
                  for an Open Source Software},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {60--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.14},
  doi          = {10.1109/SSIRI.2008.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TamuraY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TamuraYY08,
  author       = {Nobuyuki Tamura and
                  Tetsushi Yuge and
                  Shigeru Yanagi},
  title        = {Estimation of the Change Point for Failure-Censored Data via Bayesian
                  Information Criterion},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {207--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.40},
  doi          = {10.1109/SSIRI.2008.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TamuraYY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TokunoY08,
  author       = {Koichi Tokuno and
                  Shigeru Yamada},
  title        = {Dynamic Performance Analysis for Software System Considering Real-Time
                  Property in Case of {NHPP} Task Arrival},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {73--80},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.13},
  doi          = {10.1109/SSIRI.2008.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TokunoY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TsengSHGH08,
  author       = {Pei{-}Chen Tseng and
                  Jiun{-}Kuei Shiung and
                  Chun{-}Ting Huang and
                  Shih{-}Mine Guo and
                  Wen{-}Shyang Hwang},
  title        = {Adaptive Car Plate Recognition in QoS-Aware Security Network},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {120--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.41},
  doi          = {10.1109/SSIRI.2008.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TsengSHGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/UwajimaSTA08,
  author       = {Masato Uwajima and
                  Toru Sasaki and
                  Chisa Takano and
                  Masaki Aida},
  title        = {Proposal for a Communication Link Model Based on Resonance Frequency
                  of Network Users},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {166--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.36},
  doi          = {10.1109/SSIRI.2008.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/UwajimaSTA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WolfA08,
  author       = {Nico Wolf and
                  Jan C. Aurich},
  title        = {Dependable Mechatronic Products: Closing the Intelligence Gap},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {209--210},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.10},
  doi          = {10.1109/SSIRI.2008.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WolfA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/YenWYLL08,
  author       = {Shwu{-}Huey Yen and
                  Chun{-}Wei Wang and
                  Jih Pin Yeh and
                  Meng{-}Ju Lin and
                  Hwei{-}Jen Lin},
  title        = {Text Extraction in Video Images},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {189--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.26},
  doi          = {10.1109/SSIRI.2008.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/YenWYLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZhouYW08,
  author       = {Yongbin Zhou and
                  Jun Yang and
                  Yueke Wang},
  title        = {A New Method for Measuring Single Event Effect Susceptibility of {L1}
                  Cache Unit},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {203--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.22},
  doi          = {10.1109/SSIRI.2008.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZhouYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZoeteweijPAFG08,
  author       = {Peter Zoeteweij and
                  Jurryt Pietersma and
                  Rui Abreu and
                  Alexander Feldman and
                  Arjan J. C. van Gemund},
  title        = {Automated Fault Diagnosis in Embedded Systems},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {103--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.48},
  doi          = {10.1109/SSIRI.2008.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZoeteweijPAFG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ZouD08,
  author       = {Fengzhong Zou and
                  Joseph G. Davis},
  title        = {A Model of Bug Dynamics for Open Source Software},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {185--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.24},
  doi          = {10.1109/SSIRI.2008.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/ZouD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ssiri/2008,
  title        = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4579773/proceeding},
  isbn         = {978-0-7695-3266-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics