Login / Signup
SERE (Companion)
2012
2014
2012
2014
Keyphrases
Publications
2014
Hung Yu Chien
New Gen2v2-Based Mutual Authentication Schemes.
SERE (Companion)
(2014)
Dhyanesh Chaudhari
,
Mohammad Zulkernine
,
Komminist Weldemariam
FRanC: A Ranking Framework for the Prioritization of Software Maintenance.
SERE (Companion)
(2014)
Kang Yu
,
Zhenbang Chen
,
Wei Dong
A Predictive Runtime Verification Framework for Cyber-Physical Systems.
SERE (Companion)
(2014)
Dianxiang Xu
,
Yunpeng Zhang
Specification and Analysis of Attribute-Based Access Control Policies: An Overview.
SERE (Companion)
(2014)
Sizhao Li
,
Shan Lin
,
Deming Chen
,
W. Eric Wong
,
Donghui Guo
Analysis of System Reliability for Cache Coherence Scheme in Multi-processor.
SERE (Companion)
(2014)
Awad A. Younis
,
Yashwant K. Malaiya
Using Software Structure to Predict Vulnerability Exploitation Potential.
SERE (Companion)
(2014)
J. Jenny Li
,
Patricia Morreale
,
John Douglas Palframan
Diagnosis-Guided Regression Test Refinement.
SERE (Companion)
(2014)
Siyuan Jiang
,
Raúl A. Santelices
,
Haipeng Cai
,
Mark Grechanik
How Accurate Is Dynamic Program Slicing? An Empirical Approach to Compute Accuracy Bounds.
SERE (Companion)
(2014)
Zheng Wang
,
Xiao Wu
,
Hongbin Zhao
A Load Scheduling Strategy for Electric Vehicles Charging System.
SERE (Companion)
(2014)
Xiaolei Li
,
Guangdong Bai
,
Benjamin Thian
,
Zhenkai Liang
,
Heng Yin
A Light-Weight Software Environment for Confining Android Malware.
SERE (Companion)
(2014)
J. Jenny Li
,
Tony Savor
Detecting DoS Attacks on Notification Services.
SERE (Companion)
(2014)
Peizhong Liu
,
Minghang Wang
,
Ping Li
Robustness and Fragility of a New Local-World Dynamical Network Model.
SERE (Companion)
(2014)
Borting Chen
,
Ming-Wei Shih
,
Yu-Lun Huang
An Anomaly Detection Module for Firefox OS.
SERE (Companion)
(2014)
Wiem Tounsi
,
Benjamin Justus
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
,
Joaquín García-Alfaro
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm.
SERE (Companion)
(2014)
Amira Zammali
,
Agnan de Bonneval
,
Yves Crouzet
A Multi-function Error Detection Policy to Enhance Communication Integrity in Critical Embedded Systems.
SERE (Companion)
(2014)
Xun Zhan
,
Tao Zheng
,
Shixiang Gao
Defending ROP Attacks Using Basic Block Level Randomization.
SERE (Companion)
(2014)
Amna Saeed
,
Asad Raza
,
Haider Abbas
A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks.
SERE (Companion)
(2014)
Kuo-Fong Kao
,
Wen-Ching Chen
,
Jui-Chi Chang
,
Heng-Te Chu
An Accurate Fake Access Point Detection Method Based on Deviation of Beacon Time Interval.
SERE (Companion)
(2014)
Anthony Thyron Rivers
,
Mladen A. Vouk
,
Laurie A. Williams
On Coverage-Based Attack Profiles.
SERE (Companion)
(2014)
Hua-Ching Chen
,
Hsuan-Ming Feng
,
Benbin Chen
,
Donghui Guo
A Parameters Tuning Algorithm in Wireless Networks.
SERE (Companion)
(2014)
Jun Ai
,
Hanyu Pei
,
Liang Yan
Software Reliability Virtual Testing for Reliability Assessment.
SERE (Companion)
(2014)
Chao-Chun Yeh
,
Han-Lin Lu
,
Chun-Yen Chen
,
Kee Kiat Khor
,
Shih-Kun Huang
CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution.
SERE (Companion)
(2014)
IEEE Eighth International Conference on Software Security and Reliability, SERE 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume
SERE (Companion)
(2014)
Benbin Chen
,
Lin Li
,
Yiyang Li
,
Hongyin Luo
,
Donghui Guo
Compiler Assisted Instruction Relocation for Performance Improvement of Cache Hit Rate and System Reliability.
SERE (Companion)
(2014)
Bin Gu
,
Yunwei Dong
,
Xiaomin Wei
A Qualitative Safety Analysis Method for AADL Model.
SERE (Companion)
(2014)
Yen-Chun Hsu
,
Yu-Sung Wu
,
Tsung-Han Tsai
,
Yi Pin Chiu
,
Chih-Hung Lin
,
Zhi-Wei Chen
MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment.
SERE (Companion)
(2014)
Niansheng Liu
,
Huaiyu Dai
,
Donghui Guo
Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS.
SERE (Companion)
(2014)
Chao Yang
,
Tao Zheng
,
Zhitian Lin
A-R Exploit: An Automatic ROP Exploit Based on Long Sequence.
SERE (Companion)
(2014)
Curtis C. R. Busby Earle
,
Robert B. France
,
Indrakshi Ray
Analysing Requirements to Detect Latent Security Vulnerabilities.
SERE (Companion)
(2014)
Juan Zhai
,
Hanfei Wang
,
Jianhua Zhao
Post-condition-Directed Invariant Inference for Loops over Data Structures.
SERE (Companion)
(2014)
W. Eric Wong
,
Tej Gidvani
,
Alfonso Lopez
,
Ruizhi Gao
,
Matthew Horn
Evaluating Software Safety Standards: A Systematic Review and Comparison.
SERE (Companion)
(2014)
Goce Anastasovski
,
Katerina Goseva-Popstojanova
Classification of Partially Labeled Malicious Web Traffic in the Presence of Concept Drift.
SERE (Companion)
(2014)
Mariem Graa
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
,
Ana R. Cavalli
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
SERE (Companion)
(2014)
Esra N. Yolacan
,
Jennifer G. Dy
,
David R. Kaeli
System Call Anomaly Detection Using Multi-HMMs.
SERE (Companion)
(2014)
Rajendran Swamidurai
,
David A. Umphress
The Impact of Static and Dynamic Pairs on Pair Programming.
SERE (Companion)
(2014)
Farzana Rahman
,
Md. Osman Gani
,
Golam Mushih Tanimul Ahsan
,
Sheikh Iqbal Ahamed
Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices.
SERE (Companion)
(2014)
Long Zheng
,
Yangbing Wu
,
Dan Zhang
,
Liwei Lin
,
Donghui Guo
Multiphysics Modeling and Characterization of MicroCVD Chip for Growing Carbon Nanomaterials.
SERE (Companion)
(2014)
Yixiang Chen
,
Yuanrui Zhang
A Hybrid Clock System Related to STeC Language.
SERE (Companion)
(2014)
Xinghua Yao
,
Yixiang Chen
A Proof System in Process Algebra for Demand and Supply.
SERE (Companion)
(2014)
Stefan Groesbrink
Virtual Machine Migration as a Fault Tolerance Technique for Embedded Real-Time Systems.
SERE (Companion)
(2014)
2013
Baozeng Ding
,
Yeping He
,
Yanjun Wu
,
Yuqi Lin
HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data.
SERE (Companion)
(2013)
Amiangshu Bosu
,
Jeffrey C. Carver
Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation.
SERE (Companion)
(2013)
Stanislav Ponomarev
,
Jan Durand
,
Nathan Wallace
,
Travis Atkison
Evaluation of Random Projection for Malware Classification.
SERE (Companion)
(2013)
Sonia Meskini
,
Ali Bou Nassif
,
Luiz Fernando Capretz
Reliability Models Applied to Mobile Applications.
SERE (Companion)
(2013)
Zheng Wei
,
Bai Han
Multiple-Bug Oriented Fault Localization: A Parameter-Based Combination Approach.
SERE (Companion)
(2013)
Ryan Johnson
,
Angelos Stavrou
Forced-Path Execution for Android Applications on x86 Platforms.
SERE (Companion)
(2013)
JingZheng Wu
,
Yanjun Wu
,
Zhifei Wu
,
Mutian Yang
,
Yongji Wang
Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing.
SERE (Companion)
(2013)
Antonios Gouglidis
,
Ioannis Mavridis
,
Vincent C. Hu
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems.
SERE (Companion)
(2013)
Tarun Sen
,
Sateesh Kumar Peddoju
Hierarchal Identity Based Socket for Datacenters.
SERE (Companion)
(2013)
Yichen Wang
,
Xinsheng Lan
,
Yikun Wang
Modeling Embedded Software Test Requirement Based on MARTE.
SERE (Companion)
(2013)