


default search action
51th DSN 2021: Taipei, Taiwan - Supplemental Volume
- 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021, Taipei, Taiwan, June 21-24, 2021 - Supplemental Volume. IEEE 2021, ISBN 978-1-6654-3566-6
- Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. 1-2 - Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar
, Rhongho Jang, DaeHun Nyang, David Mohaisen:
Systemically Evaluating the Robustness of ML-based IoT Malware Detectors. 3-4 - Xingyu Zhao
, Wei Huang, Sven Schewe
, Yi Dong
, Xiaowei Huang:
Detecting Operational Adversarial Examples for Reliable Deep Learning. 5-6 - Long Wang:
Iteratively Checking Program Properties Involving Non-Boolean Values. 7-8 - Kris Shrishak, Haya Schulmann:
Negotiating PQC for DNSSEC. 9-10 - Joongheon Kim, Seunghoon Park, Soyi Jung
, Seehwan Yoo:
Spatio-Temporal Split Learning. 11-12 - Franco Oberti, Ernesto Sánchez, Alessandro Savino
, Filippo Parisi, Stefano Di Carlo
:
Mitigation of Automotive Control Modules Hardware Replacement-based Attacks Through Hardware Signature. 13-14 - Haya Schulmann, Shujie Zhao:
Machine Learning Analysis of IP ID Applications. 15-16 - Kai-Yuan Cai, Kishor S. Trivedi, Beibei Yin:
S-ADA: Software as an Autonomous, Dependable and Affordable System. 17-18 - João Caseirito, Ibéria Medeiros
:
Finding Web Application Vulnerabilities with an Ensemble Fuzzing. 19-20 - Xiujing Guo:
Towards Automated Software Testing with Generative Adversarial Networks. 21-22 - Siqiao Li
:
A Useful Parametric Family to Characterize NHPP-based Software Reliability Models. 23-24 - Kuen-Long Lu, Yung-Yuan Chen:
Model-based design, analysis and assessment framework for safety-critical systems. 25-26 - Jiahao Zhang:
On The Local Sensitivity Analysis for Phase Expansion. 27-28 - Hemant Rathore, Sanjay K. Sahay, Jasleen Dhillon, Mohit Sewak:
Designing Adversarial Attack and Defence for Robust Android Malware Detection Models. 29-32 - Cristian Constantinescu:
AMD EPYC™ 7002 Series - A Processor with Improved Soft Error Resilience. 33-36 - Fan Fred Lin, Bhargav Bolla, Eric Pinkham, Neil Kodner, Daniel Moore, Amol Desai, Sriram Sankar:
Near-Realtime Server Reboot Monitoring and Root Cause Analysis in a Large-Scale System. 37-40 - Milda Zizyte, Casidhe Hutchison, Raewyn Duvall, Claire Le Goues
, Philip Koopman:
The Importance of Safety Invariants in Robustness Testing Autonomy Systems. 41-44 - Herson Esquivel-Vargas
, Marco Caselli, Andreas Peter:
BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol. 45-48 - Tim Alberdingk Thijm
, Gary Atkinson, Lalita Jagadeesan, Marina Thottan:
A Matter of Trust: Verification of Security and Performance for Network Platform as a Service. 49-52 - Richard Hite, Abhi Rajagopala, Smitha Gautham, Christopher J. Deloglos, Athira V. Jayakumar, Aidan G. Collins, Carl R. Elks
, Matt Gibson:
SymPLe: Complexity-Aware Design for Safety Critical I&C Systems. 53-56 - Rick Boivie, Gururaj Saileshwar, Tong Chen, Benjamin Segal, Alper Buyuktosunoglu:
Hardware Support for Low-Cost Memory Safety. 57-60 - Karthik Swaminathan, Ramon Bertran
, Hans M. Jacobson, Pradip Bose, Matthias Pflanz, Doug Balazich:
SERMiner : A Framework for Early-stage Reliability Estimation for IBM Processors. 61-64 - Betis Baheri
, Daniel Chen, Bo Fang, Samuel Alexander Stein, Vipin Chaudhary, Ying Mao, Shuai Xu, Ang Li, Qiang Guan:
TQEA: Temporal Quantum Error Analysis. 65-67 - Majid Sabbagh, Yunsi Fei
, David R. Kaeli:
Overdrive Fault Attacks on GPUs. 68-69 - Mehdi Maleki, Behrooz Sangchoolie:
Simulation-based Fault Injection in Advanced Driver Assistance Systems Modelled in SUMO. 70-71

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.