


default search action
33rd ISSRE 2022: Charlotte, NC, USA - Workshops
- IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE 2022 - Workshops, Charlotte, NC, USA, October 31 - Nov. 3, 2022. IEEE 2022, ISBN 978-1-6654-7679-9

- Luigi De Simone, Nuno Laranjeiro

:
Message from the WoSoCer 2022 Chairs. xxvi - Dan Kim:

Moving Target Defense (MTD): Recent Advances and Future Research Challenges. xxxi - Zheng Zheng, Hadi Hemmati:

Message from the Doctoral Symposium Chairs. xvii - Katerina Goseva-Popstojanova, Bojan Cukic:

Message from the ISSRE 2022 General Co-Chairs. xiv - Yan-Fu Li, Yinxing Xue, Lei Ma, Shengjian Guo, Guozhu Meng:

Message from the RAIS 2022 Chairs. xxxviii - Philip Koopman:

Keynote 1: How Safe Is Safe Enough for Autonomous Vehicles? xxviii - Junwei Zhou:

Message from the SSSML 2022 Workshop Organization Committee. xxxvi - Raffaele Della Corte, Marta Catillo, João F. Ferreira, Guanpeng Li:

Message from the RSDA 2022 Workshop Chairs. xxix - Alberto Avritzer, Michael Grottke, Ricardo M. Czekster

, Raffaele Romagnoli:
Message from the WoSAR 2022 Chairs. xxi - Junwei Zhou, Antonio Ken Iannillo:

Message from the ISSRE 2022 Fast Abstract Co-Chairs. xix - Uttam Thakore, Muntasir Rahman, Xin Xia, Keun Soo Yim:

Message from the ISSRE 2022 Industry Track Committee Chairs. xv - Phil Laplante, Ben Amaba, Rick Kuhn:

Message from the WAAM 2022 Chairs. 1 - Marcello Cinque, Raffaele Della Corte, Giorgio Farina, Stefano Rosiello:

An unsupervised approach to discover filtering rules from diagnostic logs. 1-6 - Kangjin Wang, Chuanjia Hou, Ying Li, Yaoyong Dou, Cheng Wang, Yang Wen, Jie Yao, Liping Zhang:

Cache Antagonists Identification: A Practice from Alibaba Colocation Datacenter. 7-12 - Jung-Hoon Kim

, Young-Sik Lee:
A Page-mapping Consistency Protecting Method for Soft Error Damage in Flash-based Storage. 13-18 - Austin Ketterer, Asha Shekar, Edgardo Barsallo Yi, Saurabh Bagchi, Abraham A. Clements:

An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies. 19-24 - Cihan Tunc, James Durflinger, Charif Mahmoudi

, Valerio Formicola
:
Autonomic ZTA-based Network Management Engine (AZNME). 25-30 - Gunnar Kudrjavets, Jeff Thomas, Aditya Kumar, Nachiappan Nagappan, Ayushi Rastogi

:
When malloc() Never Returns NULL - Reliability as an Illusion. 31-36 - James M. Willenbring

, Gursimran Singh Walia:
Using Complexity Metrics with Hotspot Analysis to Support Software Sustainability. 37-42 - Kazuhira Okumoto:

Early Software Defect Prediction: Right-Shifting Software Effort Data into a Defect Curve. 43-48 - Anushri Jana, Bharti Chimdyalwar, Shrawan Kumar, R. Venkatesh:

Fast Analysis of Evolving Software Systems. 49-54 - Advaita Datar, Amey Zare, Asia A, R. Venkatesh, Shrawan Kumar, Ulka Shrotri:

Automated Validation of Insurance Applications against Calculation Specifications. 55-60 - Han Fu, Sigrid Eldh

, Kristian Wiklund, Andreas Ermedahl, Cyrille Artho:
Prevalence of continuous integration failures in industrial systems with hardware-in-the-loop testing. 61-66 - Tianyi Yang, Baitong Li, Jiacheng Shen

, Yuxin Su, Yongqiang Yang, Michael R. Lyu:
Managing Service Dependency for Cloud Reliability: The Industrial Practice. 67-68 - Soolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:

VulDeBERT: A Vulnerability Detection System Using BERT. 69-74 - Shun Wang, Chao Ni, Jianbo Wang, Changhai Nie:

Detecting and Defending CSRF at API-Level. 75-80 - Haowei Quan, Jiawei Wang, Bo Li, Xiaoning Du, Kui Liu, Li Li

:
Characterizing Python Method Evolution with PyMevol: An Essential Step Towards Enabling Reliable Software Systems. 81-86 - Oussama Jebbar, Ferhat Khendek

, Maria Toeroe:
A Method for Component Evaluation for Live Testing of Cloud Systems. 87-92 - James J. Cusick

, Alberto Avritzer, Allen Tse, Andrea Janes:
Automated Dependability Assessment in DevOps Environments. 93-98 - Noah Lee, Rui Abreu

, Nachiappan Nagappan:
Code Quality Prediction Under Super Extreme Class Imbalance. 99-104 - Diaeddin Rimawi

:
Green Resilience of Cyber-Physical Systems. 105-109 - Tiancheng Li, Xiaohui Wan

, Muhammed Murat Özbek:
AgentFuzz: Fuzzing for Deep Reinforcement Learning Systems. 110-113 - Sushovan Bhadra:

A Stochastic Petri net Model of Continuous Integration and Continuous Delivery. 114-117 - Lukás Cerný

:
Towards automatic validation of composite heterogeneous systems in edge situations. 118-121 - Mengyuan Hou, Hui Xu:

LegoAI: Towards Building Reliable AI Software for Real-world Applications. 122-123 - Yintong Huo

, Yuxin Su, Michael R. Lyu:
LogVm: Variable Semantics Miner for Log Messages. 124-125 - Marek R. Ogiela, Urszula Ogiela:

DNA-based Secret Sharing and Hiding in Dispersed Computing. 126-127 - Yiqun Chen, Matthew Bradbury

, Neeraj Suri
:
Towards Effective Performance Fuzzing. 128-129 - Matthew Siu-Hin Tang

, T. H. Tse
, Zhi Quan Zhou:
A Disjoint-Partitioning Approach to Enhancing Metamorphic Testing of DBMS. 130-131 - Wenxi Zhang, Kazunori Sakamoto, Hironori Washizaki, Yoshiaki Fukazawa:

Improving Fuzzing Coverage with Execution Path Length Selection. 132-133 - Marco Barletta, Marcello Cinque, Luigi De Simone

, Raffaele Della Corte, Giorgio Farina, Daniele Ottaviano
:
RunPHI: Enabling Mixed-criticality Containers via Partitioning Hypervisors in Industry 4.0. 134-135 - Sebastian Frank

, M. Alireza Hakamian, Lion Wagner, Jóakim von Kistowski, André van Hoorn:
Towards Continuous and Data-driven Specification and Verification of Resilience Scenarios. 136-137 - Laura Carnevali, Marco Paolieri

, Riccardo Reali, Leonardo Scommegna, Enrico Vicario:
A Markov Regenerative Model of Software Rejuvenation Beyond the Enabling Restriction. 138-145 - Leonardo Miranda, Cabral Lima, Daniel Sadoc Menasché, Guilherme de Melo Baptista Domingues:

Sequential Performance Analysis of Systems that Age and Rejuvenate. 146-153 - Takeru Wada, Hiroshi Yamada:

Towards Making Unikernels Rejuvenatable. 154-161 - Alessandro Fantechi, Gloria Gori, Marco Papini

:
Software rejuvenation and runtime reliability monitoring. 162-169 - Douglas Dias, Fumio Machida, Ermeson Carneiro de Andrade:

Analysis of Software Aging in a Blockchain Platform. 170-177 - Soichiro Sakamoto, Keita Suzuki, Kenji Kono:

Crash Injection to Persistent Memory for Recovery Code Validation. 178-184 - Yancai Zhou, Chen Zhang, Kai Jia, Dongdong Zhao, Jianwen Xiang:

A Software Aging-Related Bug Prediction Framework Based on Deep Learning and Weakly Supervised Oversampling. 185-192 - Carmine Cesarano, Domenico Cotroneo, Luigi De Simone

:
Towards Assessing Isolation Properties in Partitioning Hypervisors. 193-200 - Thomas Hastings, Kristen R. Walcott:

Continuous Verification of Open Source Components in a World of Weak Links. 201-207 - Philipp Schleiss

, Yuki Hagiwara, Iwo Kurzidem
, Francesco Carella:
Towards the Quantitative Verification of Deep Learning for Safe Perception. 208-215 - Qingyang Zhang, Fumio Machida, Ermeson Carneiro de Andrade:

Performance Bottleneck Analysis of Drone Computation Offloading to a Shared Fog Node. 216-221 - Joaquim Manuel Silva Cardoso Rodrigues, J. Eduardo Ferreira Ribeiro

, Ademar Aguiar
:
Improving Documentation Agility in Safety-Critical Software Systems Development For Aerospace. 222-229 - Rob Ashmore, Andrew Howe, Rhiannon Chilton, Shamal Faily:

Programming Language Evaluation Criteria for Safety-Critical Software in the Air Domain. 230-237 - Ikram Darif

, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo:
A Domain Specific Language for the ARINC 653 Specification. 238-245 - Sabuj Laskar, Md Hasanur Rahman

, Guanpeng Li:
TensorFI+: A Scalable Fault Injection Framework for Modern Deep Learning Neural Networks. 246-251 - Alastair Nottingham, Molly Buchanan, Mark Gardner, Jason Hiser, Jack W. Davidson:

Sentinel: A Multi-institution Enterprise Scale Platform for Data-driven Cybersecurity Research. 252-257 - Tianyu Li, Xiuwen Lu, Hui Xu:

Automated Test Case Generation from Input Specification in Natural Language. 258-261 - Bohan Zhang, Yafan Huang

, Rachael Chen, Guanpeng Li:
D2MoN: Detecting and Mitigating Real-Time Safety Violations in Autonomous Driving Systems. 262-267 - Li Huang, Bertrand Meyer, Manuel Oriol:

Improving Counterexample Quality from Failed Program Verification. 268-273 - Bahareh Afshinpour, Roland Groz, Massih-Reza Amini:

Correlating Test Events With Monitoring Logs For Test Log Reduction And Anomaly Prediction. 274-280 - Wanjin Zhou, Feifei Hu, Junyan Ma:

Improving Flexibility in Embedded System Runtime Verification with Python. 281-282 - Md. Jobair Hossain Faruk, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman

, Fan Wu:
Investigating Novel Approaches to Defend Software Supply Chain Attacks. 283-288 - Junwei Zhou, Botian Lei, Huile Lang:

Homomorphic multi-label classification of virus strains. 289-294 - Iwo Kurzidem

, Adam Misik, Philipp Schleiss
, Simon Burton:
Safety Assessment: From Black-Box to White-Box. 295-300 - Jixiang Zhou, Yi Zhang, Shengjian Guo, Yan Guo:

A Survey on Autonomous Driving System Simulators. 301-306 - Robab Aghazadeh Chakherlou, Kizito Salako

, Lorenzo Strigini:
Arguing safety of an improved autonomous vehicle from safe operation before the change: new results. 307-312 - Pei Yang, Jing Wang, Huan Wang:

Colour Space Defence: Simple, Intuitive, but Effective. 313-317 - Guangshuang Ge, Liangliang Sun, Yan-Fu Li:

A systematic approach to develop an autopilot sensor monitoring system for autonomous delivery vehicles based on the STPA method. 318-325 - Alwyn E. Goodloe:

Assuring Safety-Critical Machine Learning Enabled Systems: Challenges and Promise. 326-332 - Doron Drusinsky, James Bret Michael, Matthew Litton

:
Machine-Learned Specifications for the Verification and Validation of Autonomous Cyberphysical Systems. 333-341 - Joanna F. DeFranco, Mohamad Kassab, Phil Laplante:

A Taxonomy of Critical AI System Characteristics for Use in Proxy System Testing. 342-346 - Bart Kemper

:
AI and Stochastic Terrorism - Should it be done? 347-356 - Rick Kuhn, M. S. Raunak, Raghu Kacker:

Combinatorial Coverage for Assured Autonomy. 357-358 - Sayandev Mukherjee, Jason W. Rupe, Jingjie Zhu:

XAI for Communication Networks. 359-364 - Mohamad Kassab, Joanna F. DeFranco, Phillip A. Laplante:

Investigating Bugs in AI-Infused Systems: Analysis and Proposed Taxonomy. 365-370 - Simon Diemert

, Jens H. Weber
:
Safety-Critical Adaptation in Self-Adaptive Systems. 371-380 - Boyi Hu, Yue Luo

, Yuhao Chen:
Evaluating Human Locomotion Safety in Mobile Robots Populated Environments. 381-386 - Shamanth Manjunath, Ethan Wescoat

, Vinita Gangaram Jansari
, Matthew Krugh, Laine Mears:
Classification Analysis of Bearing Contrived Dataset under Different Levels of Contamination. 387-393 - Martin S. Feather, Philip C. Slingerland, Steven Guerrini, Max Spolaor:

Assurance Guidance for Machine Learning in a Safety-Critical System. 394-401

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














