Login / Signup
SSIRI
2008
2011
2008
2011
Keyphrases
Publications
2011
Changzhi Zhao
,
Wei Dong
,
Martin Leucker
,
Zhichang Qi
Security Goals Assurance Based on Software Active Monitoring.
SSIRI
(2011)
JingZheng Wu
,
Liping Ding
,
Yongji Wang
,
Wei Han
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph.
SSIRI
(2011)
Jong-Phil Kim
,
Jang-Eui Hong
Dynamic Service Replacement to Improve Composite Service Reliability.
SSIRI
(2011)
Mahmuda Asrafi
,
Huai Liu
,
Fei-Ching Kuo
On Testing Effectiveness of Metamorphic Relations: A Case Study.
SSIRI
(2011)
Mirco Kuhlmann
,
Karsten Sohr
,
Martin Gogolla
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL.
SSIRI
(2011)
Bing-Han Li
,
Shiuhpyng Shieh
RELEASE: Generating Exploits Using Loop-Aware Concolic Execution.
SSIRI
(2011)
Flora Amato
,
Massimo Felici
,
Paola Lanzi
,
Giulia Lotti
,
Luca Save
,
Alessandra Tedeschi
Trust Observations in Validation Exercises.
SSIRI
(2011)
Seok-Won Lee
Probabilistic Risk Assessment for Security Requirements: A Preliminary Study.
SSIRI
(2011)
Andy Restrepo
,
W. Eric Wong
Validation of SDL-Based Architectural Design Models: New Coverage Criteria.
SSIRI
(2011)
Selim Ciraci
,
Hasan Sözer
,
Mehmet Aksit
,
Wilke Havinga
Execution Constraint Verification of Exception Handling on UML Sequence Diagrams.
SSIRI
(2011)
Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea
SSIRI
(2011)
HyeonJeong Kim
,
Doo-Hwan Bae
,
Vidroha Debroy
,
W. Eric Wong
Deriving Data Dependence from/for UML State Machine Diagrams.
SSIRI
(2011)
Aida Omerovic
,
Bjørnar Solhaug
,
Ketil Stølen
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study.
SSIRI
(2011)
Jianwen Xiang
,
Kazuo Yanoo
,
Yoshiharu Maeno
,
Kumiko Tadano
Automatic Synthesis of Static Fault Trees from System Models.
SSIRI
(2011)
Mohammad Hamdaqa
,
Ladan Tahvildari
ReLACK: A Reliable VoIP Steganography Approach.
SSIRI
(2011)
W. Eric Wong
,
Andrea Demel
,
Vidroha Debroy
,
Michael F. Siok
Safe Software: Does It Cost More to Develop?
SSIRI
(2011)
Arjan J. de Roo
,
Hasan Sözer
,
Mehmet Aksit
Runtime Verification of Domain-Specific Models of Physical Characteristics in Control Software.
SSIRI
(2011)
Omar el Ariss
,
Jianfei Wu
,
Dianxiang Xu
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts.
SSIRI
(2011)
Shih-Chien Chou
Using Partial Ordered Numbers to Control Information Flows.
SSIRI
(2011)
Ennan Zhai
,
Liping Ding
,
Sihan Qing
Towards a Reliable Spam-Proof Tagging System.
SSIRI
(2011)
Michael Eonsuk Shin
,
Snehadeep Sethia
,
Nipul Patel
Component-Based Malicious Software Engineer Intrusion Detection.
SSIRI
(2011)
Lirong Dai
,
Yan Bai
An Organization-Driven Approach for Enterprise Security Development and Management.
SSIRI
(2011)
Ki-Seong Lee
,
Chan-Gun Lee
Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming.
SSIRI
(2011)
Sangsig Kim
,
Dae-Kyoo Kim
,
Lunjin Lu
,
Sooyong Park
,
Suntae Kim
A Feature-Based Modeling Approach for Building Hybrid Access Control Systems.
SSIRI
(2011)
Tugkan Tuglular
,
Gurcan Gercek
Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing.
SSIRI
(2011)
2010
Hossain Shahriar
,
Mohammad Zulkernine
PhishTester: Automatic Testing of Phishing Attacks.
SSIRI
(2010)
Rui Peng
,
Q. P. Hu
,
Szu Hui Ng
,
Min Xie
Testing Effort Dependent Software FDP and FCP Models with Consideration of Imperfect Debugging.
SSIRI
(2010)
Dae-Yeob Kim
,
Cheong Youn
Traceability Enhancement Technique through the Integration of Software Configuration Management and Individual Working Environment.
SSIRI
(2010)
May Tar Hla Myint
,
Thandar Thein
Availability Improvement in Virtualized Multiple Servers with Software Rejuvenation and Virtualization.
SSIRI
(2010)
Fevzi Belli
,
Mutlu Beyazit
A Formal Framework for Mutation Testing.
SSIRI
(2010)
Christof J. Budnik
,
Rajesh Subramanyan
,
Raj Tanikella
Scalable V&V Effort Estimation for Ultra-Large-Scale Systems.
SSIRI
(2010)
Xiangyu Luo
,
Yun Wang
Recoverability of Erasure Codes Based and Intensively Written Storage Systems.
SSIRI
(2010)
Moussa Ouedraogo
,
Haralambos Mouratidis
,
Djamel Khadraoui
,
Eric Dubois
An Agent-Based System to Support Assurance of Security Requirements.
SSIRI
(2010)
Atef Mohamed
,
Mohammad Zulkernine
Failure Type-Aware Reliability Assessment with Component Failure Dependency.
SSIRI
(2010)
Fevzi Belli
,
Axel Hollmann
,
W. Eric Wong
Towards Scalable Robustness Testing.
SSIRI
(2010)
Odair Jacinto da Silva
,
Adalberto Nobiato Crespo
,
Marcos Lordello Chaim
,
Mario Jino
Sensitivity of Two Coverage-Based Software Reliability Models to Variations in the Operational Profile.
SSIRI
(2010)
Jing Cao
,
Albert Nymeyer
The 'Best' Valid Safe Protocol Converter.
SSIRI
(2010)
Thein Than Tun
,
Yijun Yu
,
Charles B. Haley
,
Bashar Nuseibeh
Model-Based Argument Analysis for Evolving Security Requirements.
SSIRI
(2010)
Fazle Rabbi
,
Hao Wang
,
Wendy MacCaull
YAWL2DVE: An Automated Translator for Workflow Verification.
SSIRI
(2010)
Zhen Ming Jiang
,
Alberto Avritzer
,
Emad Shihab
,
Ahmed E. Hassan
,
Parminder Flora
An Industrial Case Study on Speeding Up User Acceptance Testing by Mining Execution Logs.
SSIRI
(2010)
Shaoying Liu
,
Shin Nakajima
A Decompositional Approach to Automatic Test Case Generation Based on Formal Specifications.
SSIRI
(2010)
Jinxia An
,
Jihong Zhu
Software Reliability Modeling with Integrated Test Coverage.
SSIRI
(2010)
Shao Jie Zhang
,
Yang Liu
Model Checking a Lazy Concurrent List-Based Set Algorithm.
SSIRI
(2010)
Kun Tian
,
Kendra M. L. Cooper
,
Kang Zhang
,
Siyuan Liu
Towards a New Understanding of Advice Interference.
SSIRI
(2010)
Jim Woodcock
,
Marcel Oliveira
,
Alan Burns
,
Kun Wei
Modelling and Implementing Complex Systems with Timebands.
SSIRI
(2010)
Junhua Ding
,
Tong Wu
,
Jun Q. Lu
,
Xin-Hua Hu
Self-Checked Metamorphic Testing of an Image Processing Program.
SSIRI
(2010)
W. Eric Wong
,
Vidroha Debroy
,
Adithya Surampudi
,
HyeonJeong Kim
,
Michael F. Siok
Recent Catastrophic Accidents: Investigating How Software was Responsible.
SSIRI
(2010)
Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010
SSIRI
(2010)
Kenji Taguchi
,
Nobukazu Yoshioka
,
Takayuki Tobita
,
Hiroyuki Kaneko
Aligning Security Requirements and Security Assurance Using the Common Criteria.
SSIRI
(2010)
Xian Zhang
,
Yang Liu
,
Mikhail Auguston
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP.
SSIRI
(2010)