


default search action
20th EDCC 2025: Lisboa, Portugal
- 20th European Dependable Computing Conference, EDCC 2025, Lisboa, Portugal, April 8-11, 2025. IEEE 2025, ISBN 979-8-3315-1280-4

- Aghiles Ait Messaoud, Sonia Ben Mokhtar, Anthony Simonet-Boulogne:

TruShare: Confidential Key-Value Store for Untrusted Environments. 1-9 - Tiago Miguel Gomes Antão, Hasan Heydari, Alysson Bessani:

Towards a Simple and Practical Blockchain Consensus Protocol. 10-17 - Igor Zavalvshyn, Axel Legay, Annanda Rath, Etienne Rivière:

Local-First Smart Home Applications with HubOS. 18-26 - Josh Hunter

, John A. McDermid
, Simon Burton:
Insights from Railway Professionals: Rethinking Railway Assumptions Regarding Safety and Autonomy. 27-35 - Asma Smaoui, Morayo Adedjouma, Check Koutame, Nadira Boudjani, Gabin Nizan, Yechao Sun:

A Domain Specific Language to Define ODD: Textual and Graphical Notations. 36-44 - Omid Asghari, Anamta Khan, Naghmeh Ivaki, Henrique Madeira:

On Metrics for U-Space Safety Risk Assessment. 45-53 - Marcello Cinque, Luigi De Simone, Giorgio Farina, Daniele Ottaviano, Francesco Pizzo

:
BUBBLE: an FPGA-Based Timing Fault Injector. 54-62 - Steven Schwarz, Robin Thunig, Horst Schirmeier

:
Fault Tolerance of Sorting Algorithms Under Varying Input Characteristics. 63-71 - Pedro Alexandre Sousa, Nuno Faria, José Pereira

, Ana Nunes Alonso:
Towards Efficient Client-Side Transactions for Heterogeneous Cloud Data Stores. 72-76 - Kohei Senga, Shoei Nashimoto:

Denial-of-Service Attacks on Wi-Fi Protected Management Frames Preventing Reconnection. 77-85 - Joel Samper

, Bernardo Ferreira:
Leveraging Remote Attestation APIs for Secure Image Sharing in Messaging Apps. 86-92 - Julian Krieger

, Tobias Hilbig
, Thomas Schreck
:
Device Identity Bootstrapping in Constrained Environments: A BLE-Based BRSKI Extension. 93-99 - Ana Consuelo Portilho Paixão, Gisele de Fátima Lima Camargo

, Alexandre Melo Braga:
Testing Open-Source Libraries for Private Counts and Averages on Energy Metering Time Series. 100-104 - Silvia Bonomi, Emilio Coppa, Simone Lenti, Claudia Ruggiero:

Position Paper: Toward a (Semi-)Automatic Framework for Smart Contract Security Audit. 105-109 - Marta Catillo, Antonio Pecchia, Antonio Repola

, Umberto Villano:
A Critique on the (Mis)Use of Feature-Space Attacks for Adversarial Machine Learning in NIDS. 110-115 - Patrik Omland, Michael Paulitsch, Gereon Hinz, Alois Knoll:

Towards an Understanding of Deep Neural Network Resiliency to Hardware Faults. 116-124 - Attila Brozik, Ilir Gashi, Kizito Salako:

Explaining Black-Box Malware Detectors: A Machine Learning Approach for Behaviour Analysis. 125-131 - Benjamin Herd

, Andreas Kreutz
, Mario Trapp
:
SOTIF-Analysis Using Fuzzy Cause Trees. 132-140 - Benjamin Herd, Jessica Kelly, João-Vitor Zacchi, Clarissa Heinemann, Simon Diemert:

Integrating Defeaters into Subjective Logic-Based Quantitative Assurance Arguments. 141-149

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














