Login / Signup
SERE
2012
2014
2012
2014
Keyphrases
Publications
2014
Chung-Yi Lin
,
Wen-Guey Tzeng
Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems.
SERE
(2014)
Eighth International Conference on Software Security and Reliability, SERE 2014, San Francisco, California, USA, June 30 - July 2, 2014
SERE
(2014)
Mo Li
,
Shaoying Liu
Traceability-Based Formal Specification Inspection.
SERE
(2014)
Ang Li
,
Zishan Qin
,
Mingsong Chen
,
Jing Liu
ADAutomation: An Activity Diagram Based Automated GUI Testing Framework for Smartphone Applications.
SERE
(2014)
Jiaqiang Chen
,
Shulong Liu
,
Wangshu Liu
,
Xiang Chen
,
Qing Gu
,
Daoxu Chen
A Two-Stage Data Preprocessing Approach for Software Fault Prediction.
SERE
(2014)
Weifeng Xu
,
Tao Ding
,
Dianxiang Xu
Rule-Based Test Input Generation from Bytecode.
SERE
(2014)
Yingjun Zhang
,
Kai Chen
AppMark: A Picture-Based Watermark for Android Apps.
SERE
(2014)
Azadeh Jahanbanifar
,
Ferhat Khendek
,
Maria Toeroe
Providing Hardware Redundancy for Highly Available Services in Virtualized Environments.
SERE
(2014)
Haipeng Cai
,
Raúl A. Santelices
,
Tianyu Xu
Estimating the Accuracy of Dynamic Change-Impact Analysis Using Sensitivity Analysis.
SERE
(2014)
Charitha Hettiarachchi
,
Hyunsook Do
,
Byoungju Choi
Effective Regression Testing Using Requirements and Risks.
SERE
(2014)
Ting Su
,
Geguang Pu
,
Bin Fang
,
Jifeng He
,
Jun Yan
,
Siyuan Jiang
,
Jianjun Zhao
Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution.
SERE
(2014)
Wei-Tek Tsai
,
Guanqiu Qi
,
Lian Yu
,
Jerry Gao
TaaS (Testing-as-a-Service) Design for Combinatorial Testing.
SERE
(2014)
Peter Mell
,
Richard E. Harang
Using Network Tainting to Bound the Scope of Network Ingress Attacks.
SERE
(2014)
Mohammad R. Eletriby
,
Mohamed Sobh
,
Ayman M. Bahaa Eldin
,
Hossam M. A. Fahmy
High Performance Java Card Operating System.
SERE
(2014)
Yen Ju Liu
,
Chong Kuan Chen
,
Michael Cheng Yi Cho
,
Shiuhpyng Shieh
Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison.
SERE
(2014)
Tianyong Wu
,
Jun Yan
,
Jian Zhang
Automatic Test Data Generation for Unit Testing to Achieve MC/DC Criterion.
SERE
(2014)
Elizabeta Fourneret
,
Jérôme Cantenot
,
Fabrice Bouquet
,
Bruno Legeard
,
Julien Botella
SeTGaM: Generalized Technique for Regression Testing Based on UML/OCL Models.
SERE
(2014)
Lena Herscheid
,
Peter Tröger
Specification of Dynamic Fault Tree Concepts with Stochastic Petri Nets.
SERE
(2014)
Philipp Zech
,
Michael Felderer
,
Basel Katt
,
Ruth Breu
Security Test Generation by Answer Set Programming.
SERE
(2014)
Luping Chen
,
John H. R. May
A Diversity Model Based on Failure Distribution and Its Application in Safety Cases.
SERE
(2014)
Shuai Wei
,
Enyi Tang
,
Tianyu Liu
,
Norbert Th. Müller
,
Zhenyu Chen
Automatic Numerical Analysis Based on Infinite-Precision Arithmetic.
SERE
(2014)
Lian Yu
,
Wei-Tek Tsai
,
Yanbing Jiang
,
Jerry Gao
Generating Test Cases for Context-Aware Applications Using Bigraphs.
SERE
(2014)
Yangsong Wu
,
Yibiao Yang
,
Yangyang Zhao
,
Hongmin Lu
,
Yuming Zhou
,
Baowen Xu
The Influence of Developer Quality on Software Fault-Proneness Prediction.
SERE
(2014)
Hsiao-Ying Lin
,
Li-Ping Tung
,
Bao-Shuh Paul Lin
Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage Systems.
SERE
(2014)
Mohammad Reza Farhadi
,
Benjamin C. M. Fung
,
Philippe Charland
,
Mourad Debbabi
BinClone: Detecting Code Clones in Malware.
SERE
(2014)
Jang Jin Kwon
,
Doohwan Kim
,
Jae Jin Park
,
Jang-Eui Hong
Collision Analysis of Safety Devices to Prevent Hazards in Safety Critical Systems.
SERE
(2014)
Gerry Howser
,
Bruce M. McMillin
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust.
SERE
(2014)
2013
Hossain Shahriar
,
Komminist Weldemariam
,
Thibaud Lutellier
,
Mohammad Zulkernine
A Model-Based Detection of Vulnerable and Malicious Browser Extensions.
SERE
(2013)
Ahmed AlEroud
,
George Karabatis
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques.
SERE
(2013)
Liang Cheng
,
Yang Zhang
,
Zhihui Han
Quantitatively Measure Access Control Mechanisms across Different Operating Systems.
SERE
(2013)
Kai Chen
,
Yingjun Zhang
,
Yifeng Lian
Vulnerability-Based Backdoors: Threats from Two-step Trojans.
SERE
(2013)
Angelos Stavrou
Programming on Android: Best Practices for Security and Reliability.
SERE
(2013)
Chia-Wei Hsu
,
Fan-Syun Shih
,
Chi-Wei Wang
,
Shiuhpyng Winston Shieh
Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware.
SERE
(2013)
Cuiting Chen
,
Hans-Gerhard Gross
,
Andy Zaidman
Improving Service Diagnosis through Increased Monitoring Granularity.
SERE
(2013)
Shih-Kun Huang
,
Han-Lin Lu
,
Wai-Meng Leong
,
Huan Liu
CRAXweb: Automatic Web Application Testing and Attack Generation.
SERE
(2013)
Samir Ouchani
,
Otmane Aït Mohamed
,
Mourad Debbabi
A Security Risk Assessment Framework for SysML Activity Diagrams.
SERE
(2013)
Toshio Kaneishi
,
Tadashi Dohi
Software Reliability Modeling and Evaluation under Incomplete Knowledge on Fault Distribution.
SERE
(2013)
Jun Ai
,
Feng Zheng
,
Jingwei Shang
Shortening the Cycle of Software Reliability Testing with Fuzzy Discrimination.
SERE
(2013)
Yin-Chang Sung
,
Michael Cheng Yi Cho
,
Chi-Wei Wang
,
Chia-Wei Hsu
,
Shiuhpyng Winston Shieh
Light-Weight CSRF Protection by Labeling User-Created Contents.
SERE
(2013)
Pingjian Wang
,
Lei Wang
,
Ji Xiang
,
Peng Liu
,
Neng Gao
,
Jiwu Jing
MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker.
SERE
(2013)
IEEE 7th International Conference on Software Security and Reliability, SERE 2013, Gaithersburg, MD, USA, June 18-20, 2013
SERE
(2013)
Zebao Gao
,
Zhenyu Chen
,
Yang Feng
,
Bin Luo
Mining Sequential Patterns of Predicates for Fault Localization and Understanding.
SERE
(2013)
Birhanu Eshete
,
Adolfo Villafiorita
,
Komminist Weldemariam
,
Mohammad Zulkernine
Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications.
SERE
(2013)
Hsiao-Ying Lin
,
Li-Ping Tung
,
Bao-Shuh Paul Lin
An Empirical Study on Data Retrievability in Decentralized Erasure Code Based Distributed Storage Systems.
SERE
(2013)
Yanjun Zuo
Moving and Relocating: A Logical Framework of Service Migration for Software System Survivability.
SERE
(2013)
Qiuying Li
,
Lei Luo
,
Jun Ai
The Determination Method for Software Reliability Qualitative Indices.
SERE
(2013)
Patrick Kamongi
,
Srujan Kotikela
,
Krishna Kavi
,
Mahadevan Gomathisankaran
,
Anoop Singhal
VULCAN: Vulnerability Assessment Framework for Cloud Computing.
SERE
(2013)
Borting Chen
,
Chien-Yu Lai
,
Yu-Lun Huang
A Performance Mapping Model for Physical-to-Virtual Migration.
SERE
(2013)
Raymond Canzanese
,
Moshe Kam
,
Spiros Mancoridis
Multi-channel Change-Point Malware Detection.
SERE
(2013)
Christian Jung
,
Denis Feth
,
Christian Seise
Context-Aware Policy Enforcement for Android.
SERE
(2013)