


default search action
23rd PRDC 2018: Taipei, Taiwan
- 23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, December 4-7, 2018. IEEE 2018, ISBN 978-1-5386-5700-3

Hardware Reliability
- Georg von der Brüggen

, Lea Schönberger
, Jian-Jia Chen
:
Do Nothing, But Carefully: Fault Tolerance with Timing Guarantees for Multiprocessor Systems Devoid of Online Adaptation. 1-10 - Itsuo Takanami, Masaru Fukushi:

Degradable Restructuring of Mesh-Connected Processor Arrays with Spares on Orthogonal Sides. 11-14 - Ravikiran Yeleswarapu, Arun K. Somani:

SSCMSD - Single-Symbol Correction Multi-symbol Detection for DRAM Subsystem. 15-24
Information Security
- Bo-Chen Tai, Szu-Chuang Li, Yennun Huang

, Neeraj Suri
, Pang-Chieh Wang:
Exploring the Relationship Between Dimensionality Reduction and Private Data Release. 25-33 - Jyh-haw Yeh, Srisarguru Sridhar, Gaby G. Dagher

, Hung-Min Sun, Ning Shen, Kathleen Dakota White:
A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption. 34-43 - Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang

, Neeraj Suri
:
InfoLeak: Scheduling-Based Information Leakage. 44-53
Cyber-Physical Systems I
- Abu Hasnat Mohammad Rubaiyat, Yongming Qin, Homa Alemzadeh

:
Experimental Resilience Assessment of an Open-Source Driving Agent. 54-63 - Matthew Wagner, Bruce M. McMillin:

Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains. 64-73 - Prashanth Palaniswamy, Bruce M. McMillin:

Cyber-Physical Security of an Electric Microgrid. 74-83
Modeling I
- Nadia Patricia Da Silva Medeiros, Naghmeh Ramezani Ivaki

, Pedro Costa
, Marco Vieira
:
An Approach for Trustworthiness Benchmarking Using Software Metrics. 84-93 - Hyojung Lee, Kiwoon Sung, Kyusang Lee, Jaeseok Lee, Seungjai Min:

Economic Analysis of Blockchain Technology on Digital Platform Market. 94-103 - Simin Cai

, Barbara Gallina, Dag Nyström, Cristina Seceleanu
:
Specification and Formal Verification of Atomic Concurrent Real-Time Transactions. 104-114
Cyber-Physical Systems II
- Sai Sidharth Patlolla, Bruce M. McMillin, Sridhar Adepu, Aditya Mathur:

An Approach for Formal Analysis of the Security of a Water Treatment Testbed. 115-124 - Carmen Cheh

, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen
, William G. Temple, William H. Sanders:
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems. 125-134
Modeling II
- Zhengguo Yang, Toshiaki Aoki

, Yasuo Tan:
Modeling the Required Indoor Temperature Change by Hybrid Automata for Detecting Thermal Problems. 135-144 - Yunlu Zhao, Tadashi Dohi, Hiroyuki Okamura:

Software Test-Run Reliability Modeling with Non-homogeneous Binomial Processes. 145-154
Internet of Things
- Daniel Mendes, Naghmeh Ramezani Ivaki

, Henrique Madeira:
Effects of GPS Spoofing on Unmanned Aerial Vehicles. 155-160 - Mehdi Karimibiuki, Ekta Aggarwal, Karthik Pattabiraman, André Ivanov:

DynPolAC: Dynamic Policy-Based Access Control for IoT Systems. 161-170 - Amelia Samandari

, Mengmeng Ge, Jin Bum Hong
, Dong Seong Kim
:
Evaluating the Security of IoT Networks with Mobile Devices. 171-180
Fast Abstracts + Posters I
- Itsuo Takanami, Masaru Fukushi:

Restructuring Mesh-Connected Processor Arrays with Spares on Four Sides by Orthogonal Side Rotation. 181-182 - Shu Nagai, Tatsuhiro Tsuchiya

:
Applying Metamorphic Testing to e-Commerce Product Search Engines. 183-184 - Tsvetoslava Vateva-Gurova, Neeraj Suri

:
On the Detection of Side-Channel Attacks. 185-186 - Tianyi Zhang, Masato Kitakami:

Research on Convolutional Codes are Used in RAID. 187-188 - Ilsun You, Kangbin Yim, Vishal Sharma

, Gaurav Choudhary
, Ing-Ray Chen, Jin-Hee Cho:
On IoT Misbehavior Detection in Cyber Physical Systems. 189-190 - Ryota Ogasawara, Masayuki Arai:

A SAT-Based Approach for SDN Rule Table Distribution. 191-192
Dependable Software I
- Oliver Schwahn

, Nicolas Coppik, Stefan Winter, Neeraj Suri
:
FastFI: Accelerating Software Fault Injections. 193-202 - Zhiqi Zhu, Joseph Callenes-Sloan, Benjamin Carrión Schäfer:

Control Flow Checking Optimization Based on Regular Patterns Analysis. 203-212 - Venu Babu Thati

, Jens Vankeirsbilck
, Niels Penneman, Davy Pissoort
, Jeroen Boydens
:
An Improved Data Error Detection Technique for Dependable Embedded Software. 213-220
Fast Abstracts + Posters II
- Jianhui Jiang, Guangming Lu, Zhen Wang:

Methods for Approximate Adders Reliability Estimation Based on PTM Model. 221-222 - Hossain Shahriar

, Kai Qian, Md Arabin Islam Talukder
, Dan Chia-Tien Lo, Nidhibahen Patel
:
Mobile Software Security with Dynamic Analysis. 223-224 - Koichi Bando, Kenji Tanaka:

Attempt to Apply Machine Learning to a Failure Database - A Case Study on Communications Networks. 225-226 - Masato Kitakami, Kazuki Matsuoka:

An Attack-Tolerant Agreement Algorithm for Block Chain. 227-228 - Junsik Seo, Jaehyun Nam, Seungwon Shin:

Towards a Security-Enhanced Cloud Platform. 229-230 - Christian M. Fuchs, Nadia M. Murillo, Aske Plaat

, Erik van der Kouwe, Daniel Harsono
, Peng Wang:
Software-Defined Dependable Computing for Spacecraft. 231-232
Dependable Software II
- Hao Jin, Tatsuhiro Tsuchiya

:
Deriving Fault Locating Test Cases from Constrained Covering Arrays. 233-240 - Angelos Oikonomopoulos, Remco Vermeulen, Cristiano Giuffrida

, Herbert Bos
:
On the Effectiveness of Code Normalization for Function Identification. 241-251
Industrial
- Li-Sheng Chen, Wei-Ho Chung

, Ing-Yi Chen, Sy-Yen Kuo:
Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT. 252-256 - Shun-Chieh Chang, Yeali S. Sun, Wu-Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi:

ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family. 257-262 - Pang-Yang Chu, Wei-Huan Lu, Jun-Wei Lin, Yu-Sung Wu:

Enforcing Enterprise Mobile Application Security Policy with Plugin Framework. 263-268
Dependable Network I
- Pedro Marques, Zayani Dabbabi, Miruna-Mihaela Mironescu, Olivier Thonnard, Alysson Bessani

, Frances V. Buontempo, Ilir Gashi
:
Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors. 269-278 - Tommaso Zoppi

, Andrea Ceccarelli
, Andrea Bondavalli
:
On Algorithms Selection for Unsupervised Anomaly Detection. 279-288
Dependable Network II
- Nesrine Berjab

, Hieu Hanh Le
, Chia-Mu Yu, Sy-Yen Kuo, Haruo Yokota
:
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks. 289-298 - Shu-Wen Hsueh, Tung-Yueh Lin, Weng-Ian Lei, Chi-Leung Patrick Ngai, Yu-Hang Sheng, Yu-Sung Wu:

Semantic Failover in Software-Defined Networking. 299-308

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














