


default search action
24th PRDC 2019: Kyoto, Japan
- 24th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2019, Kyoto, Japan, December 1-3, 2019. IEEE 2019, ISBN 978-1-7281-4961-5

Session 1A: Security I
- Thomas Rosenstatter

, Christian Sandberg, Tomas Olovsson:
Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in Vehicles. 1-10 - Huichen Lin, Dong Seong Kim

, Neil W. Bergmann:
SAGA: Secure Auto-Configurable Gateway Architecture for Smart Home. 11-20
Session 1B: Fast Abstracts I
- Shinji Inoue, Takaji Fujiwara, Shigeru Yamada:

Estimation of Target Failure Measures for E/E/PE Safety-Related Software. 21-22 - Toshinori Sato

, Tomoaki Ukezono
:
Evaluation on Configurable Approximate Circuit for Aging-Induced Timing Violation Tolerance. 23-24 - David William Honorio Araujo da Silva

, Carlos Paz de Araujo, C. Edward Chow:
Fully Homomorphic Key Update and Key Exchange Over Exterior Product Spaces For Cloud Computing Applications. 25-26 - Chien-Fu Cheng, Chu-Chiao Hsu:

A Fault-Tolerant Consensus Protocol for Software-Defined Networks. 27-28 - Tomohiko Takagi, Ryo Kurozumi, Tetsuro Katayama:

State Transition Tuple Coverage Criterion for Extended Place/Transition Net-Based Testing. 29-30 - Shuhei Ota, Mitsuhiro Kimura:

Reliability Modeling of Coherent Systems with Dependent Components Due to Common Factors. 31-32
Session 2A: Cloud System
- Satoshi Konno, Xavier Défago

:
Approximate QoS Rule Derivation Based on Root Cause Analysis for Cloud Computing. 33-42 - Adriano Serckumecka

, Ibéria Medeiros
, Bernardo Ferreira
, Alysson Bessani
:
SLICER: Safe Long-Term Cloud Event Archival. 43-52
Session 2B: Fast Abstracts II
- Naoki Torii, Masato Kitakami:

A Method for Stable Block Generation Time in Proof of Work. 53-54 - Tao Wang, Jianhui Jiang, Zhen Wang:

Reliability Estimation of Approximate Circuits Based on Probabilistic Gate Model. 55-56 - Koichi Bando, Kenji Tanaka:

Attempt to Extract Similar Cases by Applying Multilayer Perceptron to a Failure Database. 57-58 - Toshiyuki Fujikura, Ryo Kurachi:

An Attack Scenario Generation Method Using the Behavior Model. 59-60 - Xuheng Duan, Haochen Pan, Lewis Tseng, Yingjian Wu:

BBB: Make Benchmarking Blockchains Configurable and Extensible. 61-62 - Xiao Cao:

Uniform Consensus Prone to Omission Failures with Fault Knowledge. 63-64
Session 3A: Software I
- Keita Suzuki, Takafumi Kubota, Kenji Kono:

Detecting and Analyzing Year 2038 Problem Bugs in User-Level Applications. 65-74 - Ulrich Thomas Gabor, Daniel Ferdinand Siegert, Olaf Spinczyk:

High-Accuracy Software Fault Injection in Source Code with Clang. 75-84
Session 3B: Fast Abstracts III
- Li Xin Tan, Jing Wei Shannen Wee, Jun Rong Chan, Wei Jie Soh, Chern Nam Yap:

Integrate Dragonfly Key Exchange (IETF - RFC 7664) into Arithmetic Circuit Homomorphic Encryption. 85-86 - Joon Kuy Han, Dennis Wong:

SNudge: A Slidebar Nudge for Users to Practice Better Habits For Mobile Fingerprint Authentication. 87-88 - Yutaro Yoshikawa, Masayuki Arai:

A Fine-Grained SDN Rule Table Partitioning and Distribution. 89-90 - Qian Wang, Jianhui Jiang, Long Li:

A Reliability Automatic Assessment Framework for Open Source Software. 91-92 - Xuze Xia, Wei Zhang

, Jianhui Jiang:
Ensemble Methods for Anomaly Detection Based on System Log. 93-94
Session 4A: Dependable Network
- Lewis Tseng, Zezhi Wang, Yajie Zhao:

Resilient Distributed Causal Memory in Client-Server Model. 95-104 - Kenta Hanada, Tatsuhiro Tsuchiya

, Yasumasa Fujisaki:
Satisfiability-Based Analysis of Cascading Failures in Systems of Interdependent Networks. 105-113
Session 4B: Fast Abstracts IV
- Xueling Zhang, Rocky Slavin

, Xiaoyin Wang, Jianwei Niu:
Privacy Assurance for Android Augmented Reality Apps. 114-115 - Mamoru Ohara:

A Study on Checkpointing for Distributed Applications Using Blockchain-Based Data Storage. 116-117 - Rodney Rodriguez, Xiaoyin Wang:

Static Analysis of File Manipulation Scripts. 118-119 - Jiahao Zhang, Junjun Zheng

, Hiroyuki Okamura, Tadashi Dohi:
Moment-Based Approximation for Uncertainty Propagation in Fault Trees. 120-121 - Muhammad Alfian Amrizal, Luis Guillen

, Takuo Suganuma:
An Analytical Approach for Optimizing Data Transfer Rate in a Faulty Wireless Sensor Network. 122-123
Session 5A: Dependable Hardware
- Stefan Holst, Shiling Shi, Xiaoqing Wen:

Targeted Partial-Shift For Mitigating Shift Switching Activity Hot-Spots During Scan Test. 124-129 - Yousuke Miyake

, Yasuo Sato, Seiji Kajihara:
On-Chip Delay Measurement for In-Field Test of FPGAs. 130-137 - Oskar Pusz, Daniel Kiechle, Christian Dietrich

, Daniel Lohmann:
Program-Structure-Guided Approximation of Large Fault Spaces. 138-147
Session 5B: Software II
- Xiao-Yi Zhang, Zheng Zheng:

A Visualization Analytical Framework for Software Fault Localization Metrics. 148-157 - Jiantao Zhang, Zheng Zheng, Beibei Yin, Kun Qiu, Yang Liu:

Testing Graph Searching Based Path Planning Algorithms by Metamorphic Testing. 158-167 - Elder Rodrigues Jr., Leonardo Montecchi

:
Towards a Structured Specification of Coding Conventions. 168-177
Session 6A: Security II
- Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche:

Implementation of a Host-Based Intrusion Detection System for Avionic Applications. 178-187 - Pratyush Kr. Deka

, Monowar H. Bhuyan, Youki Kadobayashi, Erik Elmroth:
Adversarial Impact on Anomaly Detection in Cloud Datacenters. 188-197 - Szu-Chuang Li, Bo-Chen Tai, Yennun Huang

:
Evaluating Variational Autoencoder as a Private Data Release Mechanism for Tabular Data. 198-206
Session 6B: Distributed System
- Achour Mostéfaoui, Matthieu Perrin, Michel Raynal:

A New Insight into Local Coin-Based Randomized Consensus. 207-216 - Brahim Hamid

, Quentin Rouland
, Jason Jaskolka
:
Distributed Maintenance of a Spanning Tree of k-Connected Graphs. 217-226 - Sara Alhajaili, Arshad Jhumka:

Auditability: An Approach to Ease Debugging of Reliable Distributed Systems. 227-235
Session 7A: Machine Learning
- Koki Kato, Fuyuki Ishikawa:

Learning-Based Falsification for Model Families of Cyber-Physical Systems. 236-245 - Jusop Choi, Dongsoon Shin, Hyoungshick Kim, Jason Seotis, Jin B. Hong

:
AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning. 246-255 - Mengmeng Ge, Xiping Fu, Naeem Firdous Syed

, Zubair A. Baig
, Gideon Teo, Antonio Robles-Kelly:
Deep Learning-Based Intrusion Detection for IoT Networks. 256-265
Session 7B: Reliability Modeling
- Shahid Khan

, Joost-Pieter Katoen, Matthias Volk
, Marc Bouissou
:
Synergizing Reliability Modeling Languages: BDMPs without Repairs and DFTs. 266-275 - Fumio Machida:

On the Diversity of Machine Learning Models for System Reliability. 276-285

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














