Search Results - "2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC)"

Refine Results
  1. 1

    Deep Learning-Based Intrusion Detection for IoT Networks by Ge, Mengmeng, Fu, Xiping, Syed, Naeem, Baig, Zubair, Teo, Gideon, Robles-Kelly, Antonio

    “…Internet of Things (IoT) has an immense potential for a plethora of applications ranging from healthcare automation to defence networks and the power grid. The…”
    Get full text
    Conference Proceeding
  2. 2

    Privacy Assurance for Android Augmented Reality Apps by Zhang, Xueling, Slavin, Rocky, Wang, Xiaoyin, Niu, Jianwei

    “…Augmented Reality (AR) is an emerging technique that enriches real environment with virtual information objects. Despite its wide application scenarios, AR…”
    Get full text
    Conference Proceeding
  3. 3
  4. 4
  5. 5

    Evaluating Variational Autoencoder as a Private Data Release Mechanism for Tabular Data by Li, Szu-Chuang, Tai, Bo-Chen, Huang, Yennun

    “…Multi-market businesses can collect data from different business entities and aggregate data from various sources to create value. However, due to the…”
    Get full text
    Conference Proceeding
  6. 6

    Approximate QoS Rule Derivation Based on Root Cause Analysis for Cloud Computing by Konno, Satoshi, Defago, Xavier

    “…Ensuring proper quality of service (QoS) is essential for cloud service providers and customers alike. To this end, cloud systems must rely as much as possible…”
    Get full text
    Conference Proceeding
  7. 7

    Ensemble Methods for Anomaly Detection Based on System Log by Xia, Xuze, Zhang, Wei, Jiang, Jianhui

    “…Anomaly detection plays an important role in large-scale distributed systems. System logs are significant source of troubleshooting and problem diagnosis. Most…”
    Get full text
    Conference Proceeding
  8. 8

    Program-Structure-Guided Approximation of Large Fault Spaces by Pusz, Oskar, Kiechle, Daniel, Dietrich, Christian, Lohmann, Daniel

    “…Due to shrinking structure sizes and operating voltages, hardware becomes more susceptible to transient faults. Fault injection campaigns are a common approach…”
    Get full text
    Conference Proceeding
  9. 9

    Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in Vehicles by Rosenstatter, Thomas, Sandberg, Christian, Olovsson, Tomas

    “…Nowadays vehicles have an internal network consisting of more than 100 microcontrollers, so-called Electronic Control Units (ECUs), which control core…”
    Get full text
    Conference Proceeding
  10. 10

    On-Chip Delay Measurement for In-Field Test of FPGAs by Miyake, Yousuke, Sato, Yasuo, Kajihara, Seiji

    “…Avoidance of delay-related failures due to aging phenomena is an important issue of current VLSI systems. Delay measurement in field is effective for detection…”
    Get full text
    Conference Proceeding
  11. 11

    On the Diversity of Machine Learning Models for System Reliability by Machida, Fumio

    “…The diversity of system components is one of the important contributing factors of reliable and secure software systems. In a software fault-tolerant system…”
    Get full text
    Conference Proceeding
  12. 12

    AMVG: Adaptive Malware Variant Generation Framework Using Machine Learning by Choi, Jusop, Shin, Dongsoon, Kim, Hyoungshick, Seotis, Jason, Hong, Jin B.

    “…There are advances in detecting malware using machine learning (ML), but it is still a challenging task to detect advanced malware variants (e.g., polymorphic…”
    Get full text
    Conference Proceeding
  13. 13

    State Transition Tuple Coverage Criterion for Extended Place/Transition Net-Based Testing by Takagi, Tomohiko, Kurozumi, Ryo, Katayama, Tetsuro

    “…This paper shows a STT (State Transition Tuple) coverage criterion for extended place/transition net-based testing. A STT as a measuring object consists of…”
    Get full text
    Conference Proceeding
  14. 14

    Testing Graph Searching Based Path Planning Algorithms by Metamorphic Testing by Zhang, Jiantao, Zheng, Zheng, Yin, Beibei, Qiu, Kun, Liu, Yang

    “…Path planning algorithms play critical roles in the systems of robots and unmanned aerial vehicles (UAVs). However, it is always difficult to verify the…”
    Get full text
    Conference Proceeding
  15. 15

    An Analytical Approach for Optimizing Data Transfer Rate in a Faulty Wireless Sensor Network by Amrizal, Muhammad Alfian, Guillen, Luis, Suganuma, Takuo

    “…Wireless Sensor Networks (WSNs) typically consist of failure-prone sensor nodes (SN) and more reliable sink nodes (SK). To prevent data loss due to hardware…”
    Get full text
    Conference Proceeding
  16. 16
  17. 17

    Synergizing Reliability Modeling Languages: BDMPs without Repairs and DFTs by Khan, Shahid, Katoen, Joost-Pieter, Volk, Matthias, Bouissou, Marc

    “…Static Fault Trees (SFTs) are a key model in reliability and safety analysis. Various extensions have been developed to model, e.g., functional dependencies,…”
    Get full text
    Conference Proceeding
  18. 18

    High-Accuracy Software Fault Injection in Source Code with Clang by Gabor, Ulrich Thomas, Siegert, Daniel Ferdinand, Spinczyk, Olaf

    “…We present a novel method to inject software faults into source code, which is capable of operating on unpreprocessed C/C++ source code and can inject faults…”
    Get full text
    Conference Proceeding
  19. 19

    BBB: Make Benchmarking Blockchains Configurable and Extensible by Duan, Xuheng, Pan, Haochen, Tseng, Lewis, Wu, Yingjian

    “…Interest in Blockchain technology gradually developed after Bitcoin was introduced in 2008, and has grown exponentially as Blockchain can be applied in many…”
    Get full text
    Conference Proceeding
  20. 20

    A Visualization Analytical Framework for Software Fault Localization Metrics by Zhang, Xiao-Yi, Zheng, Zheng

    “…The core of Spectra-Based Fault Localization (SBFL) is suspiciousness metric, expressed as a formula to calculate the fault proneness for each program…”
    Get full text
    Conference Proceeding