The SCEAS System
Navigation Menu

Conferences in DBLP

High-Assurance Systems (HASE) (hase)
2008 (conf/hase/2008)

  1. Path Sensitive Analysis for Security Flaws. [Citation Graph (, )][DBLP]

  2. Transaction Calculus. [Citation Graph (, )][DBLP]

  3. Assurance Technology of System Test Based on Operators' Aspects. [Citation Graph (, )][DBLP]

  4. Security Goal Indicator Trees: A Model of Software Features that Supports Efficient Security Inspection. [Citation Graph (, )][DBLP]

  5. Low Cost Secure Computation for the General Client-Server Computation Model. [Citation Graph (, )][DBLP]

  6. Evaluating Security Risks following a Compliance Perspective. [Citation Graph (, )][DBLP]

  7. On the Comparison of Network Attack Datasets: An Empirical Analysis. [Citation Graph (, )][DBLP]

  8. On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. [Citation Graph (, )][DBLP]

  9. The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. [Citation Graph (, )][DBLP]

  10. A Scalable Checkpoint Encoding Algorithm for Diskless Checkpointing. [Citation Graph (, )][DBLP]

  11. HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks. [Citation Graph (, )][DBLP]

  12. Towards Secure Trust Bootstrapping in Pervasive Computing Environment. [Citation Graph (, )][DBLP]

  13. Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination. [Citation Graph (, )][DBLP]

  14. A Low Energy Soft Error-Tolerant Register File Architecture for Embedded Processors. [Citation Graph (, )][DBLP]

  15. Randomization Based Probabilistic Approach to Detect Trojan Circuits. [Citation Graph (, )][DBLP]

  16. On the Integrity of Lightweight Checkpoints. [Citation Graph (, )][DBLP]

  17. A Fast Performance Analysis Tool for Multicore, Multithreaded Communication Processors. [Citation Graph (, )][DBLP]

  18. Random Relaxation Abstractions for Bounded Reachability Analysis of Linear Hybrid Automata: Distributed Randomized Abstractions in Model Checking. [Citation Graph (, )][DBLP]

  19. Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems. [Citation Graph (, )][DBLP]

  20. A Few Remarks about Formal Development of Secure Systems. [Citation Graph (, )][DBLP]

  21. Verification of Exception Control Flows and Handlers Based on Architectural Scenarios. [Citation Graph (, )][DBLP]

  22. Localizing Program Errors via Slicing and Reasoning. [Citation Graph (, )][DBLP]

  23. A Timed Extension of Property Sequence Chart. [Citation Graph (, )][DBLP]

  24. An Interaction-Based Test Sequence Generation Approach for Testing Web Applications. [Citation Graph (, )][DBLP]

  25. Automated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based Approach. [Citation Graph (, )][DBLP]

  26. Mutation-Based Testing of Format String Bugs. [Citation Graph (, )][DBLP]

  27. Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code. [Citation Graph (, )][DBLP]

  28. A Multi-Periodic Synchronous Data-Flow Language. [Citation Graph (, )][DBLP]

  29. Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications. [Citation Graph (, )][DBLP]

  30. At What Level of Granularity Should We be Componentizing for Software Reliability? [Citation Graph (, )][DBLP]

  31. A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models. [Citation Graph (, )][DBLP]

  32. Software Quality Improvement via Pattern-Based Model Refactoring. [Citation Graph (, )][DBLP]

  33. A Novel Model for Component-Based Software Reliability Analysis. [Citation Graph (, )][DBLP]

  34. Automotive Safety Case A Qualitative Case Study of Drivers, Usages, and Issues. [Citation Graph (, )][DBLP]

  35. Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant Analysis. [Citation Graph (, )][DBLP]

  36. Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques. [Citation Graph (, )][DBLP]

  37. Layered Memory Architecture for High IO Intensive Information Services to Achieve Timeliness. [Citation Graph (, )][DBLP]

  38. Securing Sensor Nodes Against Side Channel Attacks. [Citation Graph (, )][DBLP]

  39. Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  40. A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. [Citation Graph (, )][DBLP]

  41. Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems. [Citation Graph (, )][DBLP]

  42. Privacy, Preservation and Performance: The 3 P's of Distributed Data Management. [Citation Graph (, )][DBLP]

  43. A Novel Ripple-Based Context-Cognizant Service Discovery Method in Autonomous Decentralized Community System. [Citation Graph (, )][DBLP]

  44. Architecture Centric System Design for Supporting Reconfiguration of Service Oriented Systems. [Citation Graph (, )][DBLP]

  45. A Self-Managing Brokerage Model for Quality Assurance in Service-Oriented Systems. [Citation Graph (, )][DBLP]

  46. Formalize UML 2 Sequence Diagrams. [Citation Graph (, )][DBLP]

  47. Towards the Service Composition Through Buses. [Citation Graph (, )][DBLP]

  48. Designing, Modelling and Verifying a Container Terminal System Using UPPAAL. [Citation Graph (, )][DBLP]

  49. A Grammar-Based Reverse Engineering Framework for Behavior Verification. [Citation Graph (, )][DBLP]

  50. Checking Inconsistency of Rule Sets in Active Real-Time Databases. [Citation Graph (, )][DBLP]

  51. An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets. [Citation Graph (, )][DBLP]

  52. Reliability Design for Large Scale Storage Systems. [Citation Graph (, )][DBLP]

  53. A New Fault-Tolerant Wormhole Routing Scheme in Tori with Convex Faults. [Citation Graph (, )][DBLP]

  54. Using Multi-Level Security Annotations to Improve Software Assurance. [Citation Graph (, )][DBLP]

  55. DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. [Citation Graph (, )][DBLP]

  56. Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value. [Citation Graph (, )][DBLP]

  57. Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures. [Citation Graph (, )][DBLP]

  58. Jasmine: A Tool for Model-Driven Runtime Verification with UML Behavioral Models. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002