default search action
17th HASE 2016: Orlando, FL, USA
- Radu F. Babiceanu, Hélène Waeselynck, Raymond A. Paul, Bojan Cukic, Jie Xu:
17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016, Orlando, FL, USA, January 7-9, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-9913-5
Session 1A: Cybersecurity I
- Key-whan Chung, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Game Theory with Learning for Cyber Security Monitoring. 1-8 - Nikhil Palaskar, Zahid A. Syed, Sean Banerjee, Charlotte Tang:
Empirical Techniques to Detect and Mitigate the Effects of Irrevocably Evolving User Profiles in Touch-Based Authentication Systems. 9-16 - Qi Cheng, Kevin A. Kwiat, Charles A. Kamhoua:
Design Diversity for Mitigating Monoculture Induced Threats. 17-18 - Eric Reinsmidt, David Schwab, Li Yang:
Securing a Connected Mobile System for Healthcare. 19-22
Session 1B: Adaptive Systems
- Mohammed Al-Refai, Walter Cazzola, Sudipto Ghosh, Robert B. France:
Using Models to Validate Unanticipated, Fine-Grained Adaptations at Runtime. 23-30 - Guillaume Babin, Yamine Aït Ameur, Marc Pantel:
Correct Instantiation of a System Reconfiguration Pattern: A Proof and Refinement-Based Approach. 31-38 - Marcello M. Bersani, Marisol García-Valls:
The Cost of Formal Verification in Adaptive CPS. An Example of a Virtualized Server Node. 39-46
Session 2A: Testing and Quality Assurance
- Sunint Kaur Khalsa, Yvan Labiche:
An Extension of Category Partition Testing for Highly Constrained Systems. 47-54 - Puntitra Sawadpong, Edward B. Allen:
Software Defect Prediction Using Exception Handling Call Graphs: A Case Study. 55-62 - Tarek Awwad, Nadia Bennani, Lionel Brunie, David Coquil, Harald Kosch, Veronika Rehn-Sonigo:
Task Characterization for an Effective Worker Targeting in Crowdsourcing. 63-64 - Anneliese Andrews, Mahmoud Abdelgawad, Ahmed Gario:
World Model for Testing Autonomous Systems Using Petri Nets. 65-69
Session 2B: Safety-Critical Systems
- Alexei Iliasov, Alexander B. Romanovsky:
Formal Analysis of Railway Signalling Data. 70-77 - Ralph Eastwood, Robert Alexander, Tim Kelly:
Safe Multi-objective Planning with a Posteriori Preferences. 78-85 - Lian Duan, Sanjai Rayadurgam, Mats Per Erik Heimdahl, Oleg Sokolsky, Insup Lee:
Representation of Confidence in Assurance Cases Using the Beta Distribution. 86-93
Session 3A: System Resilience and Survivability
- Michaël Lauer, Matthieu Amy, Jean-Charles Fabre, Matthieu Roy, William Excoffon, Miruna Stoicescu:
Engineering Adaptive Fault-Tolerance Mechanisms for Resilient Computing on ROS. 94-101 - Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe:
Runtime Adjustment of Configuration Models for Consistency Preservation. 102-109 - Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
CSRS: Cyber Survive and Recover Simulator. 110-113
Session 3B: Software Analysis
- Jian Xiang, John C. Knight, Kevin J. Sullivan:
Synthesis of Logic Interpretations. 114-121 - Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods. 122-131 - Yuan Fei, Huibiao Zhu, Xi Wu, Huixing Fang:
Comparative Modeling and Verification of Pthreads and Dthreads. 132-140
Session 4A: Cybersecurity II
- Sridhar Adepu, Aditya Mathur:
An Investigation into the Response of a Water Treatment System to Cyber Attacks. 141-148 - Raymond C. Borges-Hink, Katerina Goseva-Popstojanova:
Characterization of Cyberattacks Aimed at Integrated Industrial Control and Enterprise Systems: A Case Study. 149-156 - Md. Shahrear Iqbal, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu:
FCFraud: Fighting Click-Fraud from the User Side. 157-164
Session 4B: Formal Development
- Alexei Iliasov, Alexander B. Romanovsky, Elena Troubitsyna, Linas Laibinis:
Formalisation-Driven Development of Safety-Critical Systems. 165-172 - Amel Mammar, Thi Mai Nguyen, Régine Laleau:
Formal Development of a Secure Access Control Filter. 173-180 - Kerianne H. Gross, Aaron W. Fifarek, Jonathan A. Hoffman:
Incremental Formal Methods Based Design Approach Demonstrated on a Coupled Tanks Control System. 181-188
Session 5A: Analysis of Design Models
- Ashlie B. Hocking, M. Anthony Aiello, John C. Knight, Nikos Aréchiga:
Proving Critical Properties of Simulink Models. 189-196 - Van Chan Ngo, Axel Legay, Jean Quilbeuf:
Statistical Model Checking for SystemC Models. 197-204 - Sean J. S. Regisford, Brian K. Hulbert, Aaron W. Fifarek:
Compositional Architecture Design for Fuel Tank Thermal Systems. 205-212
Session 5B: Networked Systems
- Paul Hyden, Ira S. Moskowitz, Stephen Russell:
Using Network Topology to Supplement High Assurance Systems. 213-219 - Xi Wu, Yongxin Zhao, Huibiao Zhu:
Integrating a Calculus with Mobility and Quality for Wireless Sensor Networks. 220-227 - Tommaso Zoppi, Andrea Ceccarelli, Paolo Lollini, Andrea Bondavalli, Francesco Lo Piccolo, Gabriele Giunta, Vito Morreale:
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy. 228-235
Session 6A: Work in Progress - Software
- Pankaj Kamthan, Nazlie Shahmir:
Modeling Negative User Stories is Risky Business. 236-237 - S. Tucker Taft, Florian Schanda, Yannick Moy:
High-Integrity Multitasking in SPARK: Static Detection of Data Races and Locking Cycles. 238-239 - Mohamed Naija, Jean-Michel Bruel, Samir Ben Ahmed:
Towards a MARTE Extension to Address Adaptation Mechanisms. 240-243
Session 6B: Work in Progress - System
- Hong Liu, Tianyu Yang, Jing Wang:
Model Checking for the Fault Tolerance of Collaborative AUVs. 244-245 - Jaime C. Acosta, Salamah Salamah:
An Analysis Platform for Execution-Based Model Generation. 246-247 - Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Methods to Detect Cyber Attacks on a Robot. 248-251
Session 7A: Cloud Services
- Renyu Yang, Tianyu Wo, Chunming Hu, Jie Xu, Mingming Zhang:
D^2PS: A Dependable Data Provisioning Service in Multi-tenant Cloud Environment. 252-259 - Philipp Stephanow, Christian Banse, Julian Schütte:
Generating Threat Profiles for Cloud Service Certification Systems. 260-267 - Saikat Das, Mohammad Zulkernine:
CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions. 268-275
Session 7B: Smart Grid and Cyber-Physical Systems
- Marco Mori, Andrea Ceccarelli, Paolo Lollini, Andrea Bondavalli, Bernhard Frömel:
A Holistic Viewpoint-Based SysML Profile to Design Systems-of-Systems. 276-283 - Silvano Chiaradonna, Felicita Di Giandomenico, Jun Xiao:
Quantification of the Effectiveness of Medium Voltage Control Policies in Smart Grids. 284-291 - Eduardo B. Fernández:
Preventing and unifying threats in cyberphysical systems. 292-293 - Sara Cleemput, Mustafa A. Mustafa, Bart Preneel:
High Assurance Smart Metering. 294-297
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.