


default search action
SERE 2012: Gaithersburg, Maryland, USA
- Sixth International Conference on Software Security and Reliability, SERE 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion Volume. IEEE 2012, ISBN 978-0-7695-4743-5

- Jiageng Yu, Peng Zhou, Yanjun Wu, Chen Zhao:

Virtual Machine Replay Update: Improved Implementation for Modern Hardware Architecture. 1-6 - Anthony Gabrielson, Haim Levkowitz:

Integrating Network Cryptography into the Operating System. 7-11 - Bei Guan, Yanjun Wu, Yongji Wang:

A Novel Security Scheme for Online Banking Based on Virtual Machine. 12-17 - Koray Inçki, Ismail Ari

, Hasan Sözer:
A Survey of Software Testing in the Cloud. 18-23 - Hailin Li, Yadi Wang, Jihong Han:

A Novel Method for Modeling Complex Network of Software System Security. 24-26 - Jan de Muijnck-Hughes

, Ishbel Duncan
:
Thinking Towards a Pattern Language for Predicate Based Encryption Crypto-Systems. 27-32 - Mark R. Blackburn, Benjamin Huddell:

Hybrid Bayesian Network Models for Predicting Software Reliability. 33-34 - Sam Malek, Naeem Esfahani, Thabet Kacem

, Riyadh Mahmood, Nariman Mirzaei, Angelos Stavrou
:
A Framework for Automated Security Testing of Android Applications on the Cloud. 35-36 - Wenxu Ding, Xin Chen, Peng Jiang, Nan Ye, Lei Bu, Xuandong Li:

Path-oriented Test Data Generation Driven by Component Linear Fitting Functions. 37-38 - Ishbel MacDonald Duncan:

Intelligent Biological Security Testing Agents. 41-42 - Zhaohui Wang, Angelos Stavrou

:
Attestation & Authentication for USB Communications. 43-44 - Ryan Johnson, Zhaohui Wang, Corey Gagnon, Angelos Stavrou

:
Analysis of Android Applications' Permissions. 45-46 - Philipp Zech

, Michael Felderer
, Ruth Breu:
Towards a Model Based Security Testing Approach of Cloud Computing Environments. 47-56 - Susan J. Lincke, Timothy H. Knautz, Misty D. Lowery:

Designing System Security with UML Misuse Deployment Diagrams. 57-61 - Rodrigo Alves Costa, Ruy J. G. B. de Queiroz, Elmano Ramalho Cavalcanti:

A Proposal to Prevent Click-Fraud Using Clickable CAPTCHAs. 62-67 - Ryan K. McLean:

Comparing Static Security Analysis Tools Using Open Source Software. 68-74 - Arsène Sabas, Subash Shankar, Virginie Wiels, Michel Boyer:

Undesirable Aspect Interactions: A Prevention Policy for Three Aspect Fault Types. 75-84 - Jungwoo Ryoo

, Phillip A. Laplante, Rick Kazman:
Revising a Security Tactics Hierarchy through Decomposition, Reclassification, and Derivation. 85-91 - Junhua Ding, Lian Mo:

Enforcement of Role Based Access Control in Social Network Environments. 92-101 - Chase Baker, Michael Shin:

Mapping of Security Concerns in Design to Security Aspects in Code. 102-110 - Heshem A. El Zouka:

Secure PC Platform Based on Dual-Bus Architecture. 111-118 - Hsiao-Ying Lin, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin:

A Privacy Preserving Smart Metering System Supporting Multiple Time Granularities. 119-126 - Jun-Ru Chang, Chin-Yu Huang, Po-Hsi Li:

An Investigation of Classification-Based Algorithms for Modified Condition/Decision Coverage Criteria. 127-136 - Haiyu Pan, Min Zhang, Yixiang Chen:

Lattice-Valued Kripke Structures Based on Complete Residuated Lattice. 137-143 - Longming Dong, Wei Dong, Liqian Chen:

Invalid Pointer Dereferences Detection for CPS Software Based on Extended Pointer Structures. 144-151 - Liping Chen, Xiaoping Wang, Xiong Gong, Hongchang Zhang, Fanli Zhou, Bin Gu, Lei Wang:

Modeling and Simulating CAN-Based Cyber-Physical Systems in Modelica. 152-157 - Xiaoyu Zhou, Qian Li, Jianhua Zhao:

A New Approach of Partial Order Reduction Technique for Parallel Timed Automata Model Checking. 158-167 - Jie Chen, Xiaoguang Mao

:
Bodhi: Detecting Buffer Overflows with a Game. 168-173 - Deming Song, Yunwei Dong, Fan Zhang, Hong Huo, Bin Gu:

Study of Safety Analysis and Assessment Methodology for AADL Model. 174-183 - Xuesong Cai, Junwei Wu:

Hazardous Chemicals Vehicles Rollover Pre-warning System Based on CPS. 184-187 - Junjie Tang, Jianjun Zhao, Jianwan Ding, Liping Chen, Gang Xie, Bin Gu, Mengfei Yang:

Cyber-physical Systems Modeling Method Based on Modelica. 188-191 - Vijay Sampath, Vipul Shah:

Software Testing of Business Applications. 192 - JeeHyun Hwang, Vincent C. Hu

, Tao Xie:
Paradigm in Verification of Access Control. 193 - Yasuharu Nishi:

Viewpoint-based Test Architecture Design. 194-197 - Fevzi Belli, Mutlu Beyazit

, Atif M. Memon:
Testing is an Event-Centric Activity. 198-206 - Benedikt Kruger, Michael Linschulte:

Cost Reduction through Combining Test Sequences with Input Data. 207-216

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














