![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
HASE 2014: Miami Beach, FL, USA
- 15th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2014, Miami Beach, FL, USA, January 9-11, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3465-2
- Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:
Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability. 1-8 - Zahid A. Syed
, Sean Banerjee, Bojan Cukic
:
Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems. 9-16 - Farid Molazem Tabrizi, Karthik Pattabiraman:
A Model-Based Intrusion Detection System for Smart Meters. 17-24 - Erik van der Kouwe, Cristiano Giuffrida
, Andrew S. Tanenbaum
:
Evaluating Distortion in Fault Injection Experiments. 25-32 - Martin Hoffmann, Peter Ulbrich
, Christian Dietrich
, Horst Schirmeier, Daniel Lohmann
, Wolfgang Schröder-Preikschat:
A Practitioner's Guide to Software-Based Soft-Error Mitigation Using AN-Codes. 33-40 - Amanda Sávio Nascimento, Cecília M. F. Rubira
, Fernando Castor
:
ArCMAPE: A Software Product Line Infrastructure to Support Fault-Tolerant Composite Services. 41-48 - Anneliese Amschler Andrews, Salwa Elakeili, Salah Boukhris:
Fail-Safe Test Generation in Safety Critical Systems. 49-56 - Mahnaz Malekzadeh, Iain Bate:
Making an ALARP Decision of Sufficient Testing. 57-64 - Linbin Yu, Feng Duan, Yu Lei, Raghu Kacker, D. Richard Kuhn:
Combinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples. 65-72 - Yujian Fu, Steven Drager:
Modeling and Verification of Humanoid Robot Task Coordination. 73-80 - Jiri Barnat, Petr Bauch, Vojtech Havel:
Temporal Verification of Simulink Diagrams. 81-88 - Faqing Yang, Jean-Pierre Jacquot, Jeanine Souquières:
Proving the Fidelity of Simulations of Event-B Models. 89-96 - Hiroyuki Okamura
, Tadashi Dohi
:
A Novel Framework of Software Reliability Evaluation with Software Reliability Growth Models and Software Metrics. 97-104 - Koosha Marashi
, Sahra Sedigh Sarvestani
:
Towards Comprehensive Modeling of Reliability for Smart Grids: Requirements and Challenges. 105-112 - Peter Garraghan
, Paul Townend, Jie Xu:
An Empirical Failure-Analysis of a Large-Scale Cloud Computing Environment. 113-120 - Philippa Conmy
, Iain Bate:
Assuring Safety for Component Based Software Engineering. 121-128 - Panayiotis Steele, John Knight:
Analysis of Critical Systems Certification. 129-136 - Victor L. Winter, Carl Reinke, Jonathan Guerrero:
Using Program Transformation, Annotation, and Reflection to Certify a Java Type Resolution Function. 137-145 - Abdulrahman Almutairi, Tawfeeq A. Shawly
, Saleh M. Basalamah
, Arif Ghafoor:
Policy-Driven High Assurance Cyber Infrastructure-Based Systems. 146-153 - Tadashi Koga, Xiaodong Lu, Kinji Mori:
Autonomous Decentralized High-Assurance Surveillance System for Air Traffic Control. 154-157 - Jerry Gao, Wei-Tek Tsai, Raymond A. Paul, Xiaoying Bai, Tadahiro Uehara:
Mobile Testing-as-a-Service (MTaaS) - Infrastructures, Issues, Solutions and Needs. 158-167 - Regina Moraes
, Hélène Waeselynck, Jérémie Guiochet:
UML-Based Modeling of Robustness Testing. 168-175 - Hossain Shahriar
, Sarah North, Edward Mawangi:
Testing of Memory Leak in Android Applications. 176-183 - Anneliese Amschler Andrews, Hyunsook Do:
Trade-Off Analysis for Selective versus Brute-Force Regression Testing in FSMWeb. 184-192 - Pei Luo
, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky:
Hardware Implementation of Secure Shamir's Secret Sharing Scheme. 193-200 - Takao Okubo, Nobukazu Yoshioka
, Haruhiko Kaiya:
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View. 201-205 - Jawwad A. Shamsi, Sufian Hameed
, Waleed Rahman, Farooq Zuberi, Kaiser Altaf, Ammar Amjad
:
Clicksafe: Providing Security against Clickjacking Attacks. 206-210 - Jesse Musgrove, Bojan Cukic
, Vittorio Cortellessa:
Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System. 211-215 - Ivano Irrera, João Durães
, Marco Vieira
:
On the Need for Training Failure Prediction Algorithms in Evolving Software Systems. 216-223 - Alexandre Petrenko
, Nina Yevtushenko:
Adaptive Testing of Nondeterministic Systems with FSM. 224-228 - Amel Mammar, Marc Frappier:
Verifying the Precedence Property Pattern Using the B Method. 229-233 - Zheng Chen, Allen McBride:
Using Flash to Tolerate Track Failures in RAID. 234-235 - Farzana Rahman, Drew Williams
, Sheikh Iqbal Ahamed, Ji-Jiang Yang, Qing Wang:
PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare Services. 236-242 - Curtis Rasmussen, Rozita Dara:
Recommender Systems for Privacy Management: A Framework. 243-244 - Patrick J. Graydon, Iain Bate:
On the Nature and Content of Safety Contracts. 245-246 - Krishna K. Venkatasubramanian, Eugene Y. Vasserman
, Oleg Sokolsky, Insup Lee:
Functional Alarms for Systems of Interoperable Medical Devices. 247-248 - Alexandre Petrenko
, Keqin Li, Roland Groz, Karim Hossen, Catherine Oriat:
Inferring Approximated Models for Systems Engineering. 249-253 - Claudio A. Ardagna
, Ernesto Damiani
, Kouessi A. R. Sagbo, Fulvio Frati:
Zero-Knowledge Evaluation of Service Performance Based on Simulation. 254-258 - Ali Davoudian, Ferhat Khendek
, Maria Toeroe:
Ordering Upgrade Changes for Highly Available Component Based Systems. 259-260 - Yuki Matsui, Hideharu Kojima
, Tatsuhiro Tsuchiya
:
Modeling the Interaction of Power Line and SCADA Networks. 261-262
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.