Stop the war!
Остановите войну!
for scientists:
default search action
SERE 2012: Gaithersburg, Maryland, USA
- Sixth International Conference on Software Security and Reliability, SERE 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion Volume. IEEE 2012, ISBN 978-0-7695-4743-5
- Jiageng Yu, Peng Zhou, Yanjun Wu, Chen Zhao:
Virtual Machine Replay Update: Improved Implementation for Modern Hardware Architecture. 1-6 - Anthony Gabrielson, Haim Levkowitz:
Integrating Network Cryptography into the Operating System. 7-11 - Bei Guan, Yanjun Wu, Yongji Wang:
A Novel Security Scheme for Online Banking Based on Virtual Machine. 12-17 - Koray Inçki, Ismail Ari, Hasan Sözer:
A Survey of Software Testing in the Cloud. 18-23 - Hailin Li, Yadi Wang, Jihong Han:
A Novel Method for Modeling Complex Network of Software System Security. 24-26 - Jan de Muijnck-Hughes, Ishbel Duncan:
Thinking Towards a Pattern Language for Predicate Based Encryption Crypto-Systems. 27-32 - Mark R. Blackburn, Benjamin Huddell:
Hybrid Bayesian Network Models for Predicting Software Reliability. 33-34 - Sam Malek, Naeem Esfahani, Thabet Kacem, Riyadh Mahmood, Nariman Mirzaei, Angelos Stavrou:
A Framework for Automated Security Testing of Android Applications on the Cloud. 35-36 - Wenxu Ding, Xin Chen, Peng Jiang, Nan Ye, Lei Bu, Xuandong Li:
Path-oriented Test Data Generation Driven by Component Linear Fitting Functions. 37-38 - Ishbel MacDonald Duncan:
Intelligent Biological Security Testing Agents. 41-42 - Zhaohui Wang, Angelos Stavrou:
Attestation & Authentication for USB Communications. 43-44 - Ryan Johnson, Zhaohui Wang, Corey Gagnon, Angelos Stavrou:
Analysis of Android Applications' Permissions. 45-46 - Philipp Zech, Michael Felderer, Ruth Breu:
Towards a Model Based Security Testing Approach of Cloud Computing Environments. 47-56 - Susan J. Lincke, Timothy H. Knautz, Misty D. Lowery:
Designing System Security with UML Misuse Deployment Diagrams. 57-61 - Rodrigo Alves Costa, Ruy J. G. B. de Queiroz, Elmano Ramalho Cavalcanti:
A Proposal to Prevent Click-Fraud Using Clickable CAPTCHAs. 62-67 - Ryan K. McLean:
Comparing Static Security Analysis Tools Using Open Source Software. 68-74 - Arsène Sabas, Subash Shankar, Virginie Wiels, Michel Boyer:
Undesirable Aspect Interactions: A Prevention Policy for Three Aspect Fault Types. 75-84 - Jungwoo Ryoo, Phillip A. Laplante, Rick Kazman:
Revising a Security Tactics Hierarchy through Decomposition, Reclassification, and Derivation. 85-91 - Junhua Ding, Lian Mo:
Enforcement of Role Based Access Control in Social Network Environments. 92-101 - Chase Baker, Michael Shin:
Mapping of Security Concerns in Design to Security Aspects in Code. 102-110 - Heshem A. El Zouka:
Secure PC Platform Based on Dual-Bus Architecture. 111-118 - Hsiao-Ying Lin, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin:
A Privacy Preserving Smart Metering System Supporting Multiple Time Granularities. 119-126 - Jun-Ru Chang, Chin-Yu Huang, Po-Hsi Li:
An Investigation of Classification-Based Algorithms for Modified Condition/Decision Coverage Criteria. 127-136 - Haiyu Pan, Min Zhang, Yixiang Chen:
Lattice-Valued Kripke Structures Based on Complete Residuated Lattice. 137-143 - Longming Dong, Wei Dong, Liqian Chen:
Invalid Pointer Dereferences Detection for CPS Software Based on Extended Pointer Structures. 144-151 - Liping Chen, Xiaoping Wang, Xiong Gong, Hongchang Zhang, Fanli Zhou, Bin Gu, Lei Wang:
Modeling and Simulating CAN-Based Cyber-Physical Systems in Modelica. 152-157 - Xiaoyu Zhou, Qian Li, Jianhua Zhao:
A New Approach of Partial Order Reduction Technique for Parallel Timed Automata Model Checking. 158-167 - Jie Chen, Xiaoguang Mao:
Bodhi: Detecting Buffer Overflows with a Game. 168-173 - Deming Song, Yunwei Dong, Fan Zhang, Hong Huo, Bin Gu:
Study of Safety Analysis and Assessment Methodology for AADL Model. 174-183 - Xuesong Cai, Junwei Wu:
Hazardous Chemicals Vehicles Rollover Pre-warning System Based on CPS. 184-187 - Junjie Tang, Jianjun Zhao, Jianwan Ding, Liping Chen, Gang Xie, Bin Gu, Mengfei Yang:
Cyber-physical Systems Modeling Method Based on Modelica. 188-191 - Vijay Sampath, Vipul Shah:
Software Testing of Business Applications. 192 - JeeHyun Hwang, Vincent C. Hu, Tao Xie:
Paradigm in Verification of Access Control. 193 - Yasuharu Nishi:
Viewpoint-based Test Architecture Design. 194-197 - Fevzi Belli, Mutlu Beyazit, Atif M. Memon:
Testing is an Event-Centric Activity. 198-206 - Benedikt Kruger, Michael Linschulte:
Cost Reduction through Combining Test Sequences with Input Data. 207-216
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.