


default search action
30th PRDC 2025: Seoul, Republic of Korea
- 30th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2025, Seoul, Republic of Korea, November 3-5, 2025. IEEE 2025, ISBN 979-8-3315-4513-0

- Tim Gonschorek, Frank Ortmeier:

Guided Importance Sampling for Safety and Reliability: A Pragmatic Comparison of Symbolic and Simulation-Based Approaches. 1-11 - Mehmet Cihan Sakman, Josef Spillner, Valerio Schiavoni:

Speeding Up the Development for the Computing Continuum with WebAssembly. 12-22 - Sheraz Mazhar, Abdur Rakib, Robin Doss, Adnan Anwar, Frank Jiang:

Integrating Threat Analysis and Formal Verification for Secure OTA Updates. 23-33 - Jae Yeon Lee, Huy Kang Kim:

GALAXY: Generalized Attention-Based LSTM Architecture with External Query for Intrusion Detection in UAV Communication. 34-44 - Fahad Ahmed KhoKhar, Tommaso Zoppi, Jamal Hussain Shah:

Orchestrating Fail-Safe, Black-Box Models Within Federated Learning Scenarios. 45-57 - Linh Nguyen-Thuy, Long Nguyen-Vu, Thien-Phuc Doan, Jungsoo Park, Souhwan Jung:

Towards Secure Containerized Applications with Seccomp Profile Refinement. 58-67 - Taiyo Sato, Kenichi Kourai:

TZmediator: Secure Cooperative Execution of Cloud Applications Using POSIX APIs on Arm TrustZone. 68-78 - Dvir Biton, Roy Friedman:

An Analysis of Sui's Transactions and Conflicts. 79-90 - Ankit Ravish, Yaron Hay, Manaswini Piduguralla, Rishabh Jain, Roy Friedman, Sathya Peri:

Efficient Scheduling of Smart Contract Transactions via Conflict Graph Coloring. 91-101 - Takahito Iwano, Kenichi Kourai:

Keyspector: Secure Monitoring of IoT Devices Using RISC-V Keystone. 102-112 - Paul L. R. Olivier, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Romain Cayre:

SIROCCO: A Dry Wind to Warn you from Bluetooth Attacks. 113-122 - Koichi Bando, Kenjiro Inaba, Sachiko Honda, Tetsuro Yumoto, Atsunobu Sagara, Kenji Tanaka:

Support System for Creating Medical Incident and Accident Reports Utilizing Two Types of Medical Accident Databases. 123-129 - Sunoh Ryu, Ryangsoo Kim, Hark Yoo, Hyuk Lim, Seunghyun Yoon:

Physics-Guided and Explainable Anomaly Detection for IEC 61850 Sampled Values. 130-131 - Yeongju Seong, Hyuk Lim, Seunghyun Yoon:

CLGuard: A Context-Aware Suppression Framework for Resilient Driving Control. 132-133 - Yufeng Lin, Sangmin Park, Hyunjae Kang, Huy Kang Kim, Dan Dongseong Kim:

Robustness Evaluation Under RGB-Camera Attacks in CARLA: A Systematic Evaluation of Color Modes and Attack Types. 134-139 - Minseo Ju, Hyung Kook Jun, Taeho Kim, Hyung-Jong Kim:

A Study on User Approval Criteria and User Interfaces for Dependability of AI-based Code Generation Tools. 140-145 - Junyeong Park, Sayeon Kim, Woohyun Jang, Yeon-Jae Kim, Shinwoo Shim, Olmi Lee, Ki-Woong Park:

A Self-Synchronizing Cyber Deception Framework via Infrastructure as Code Reflection. 146-151 - Hyo Sun Lee, Min Geun Song, Huy Kang Kim:

An Approach to Creating the Optimal Attack Path Based on Reinforcement Learning. 152-157 - Saehoon Oh, Sangbeom Park, Gang Min Kim, Huy Kang Kim:

Toward Dependability Simulation for Intelligent Transportation Systems in Connected Vehicle Environments. 158-163 - Chihiro Kado, Tatsuhiro Tsuchiya:

Automated Vulnerability Repair of Obfuscated and Non-Obfuscated Smart Contracts Using Large Language Models. 164-169 - Yongsik Kim, Saehee Jun, Junho Jang, Huy Kang Kim:

Automated Timeline-Based Forensic Report Generation with Anomaly Detection and LLM-Based CTI Mapping. 170-175 - Sungmin Han, Hyoungshick Kim, Hojoon Lee, Hyungon Moon, Yuseok Jeon, Ho Bae, Donghyun Yeo, Gail-Joon Ahn, Sangkyun Lee:

Dependable Code Repair with LLMs: AI-Driven Vulnerability Detection and Automated Patching. 176-181 - Leo Hyun Park, Yoonsik Kim, Eunbi Hwang, Sangsoo Han, Hyoungshick Kim, Taekyoung Kwon:

Toward an Autonomous Purple Teaming Framework for Security and Safety in Large Language Models. 182-187

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














