


default search action
17th HASE 2016: Orlando, FL, USA
- Radu F. Babiceanu, Hélène Waeselynck, Raymond A. Paul, Bojan Cukic, Jie Xu:

17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016, Orlando, FL, USA, January 7-9, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-9913-5
Session 1A: Cybersecurity I
- Key-whan Chung

, Charles A. Kamhoua, Kevin A. Kwiat, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Game Theory with Learning for Cyber Security Monitoring. 1-8 - Nikhil Palaskar, Zahid A. Syed

, Sean Banerjee, Charlotte Tang
:
Empirical Techniques to Detect and Mitigate the Effects of Irrevocably Evolving User Profiles in Touch-Based Authentication Systems. 9-16 - Qi Cheng

, Kevin A. Kwiat, Charles A. Kamhoua:
Design Diversity for Mitigating Monoculture Induced Threats. 17-18 - Eric Reinsmidt, David Schwab, Li Yang:

Securing a Connected Mobile System for Healthcare. 19-22
Session 1B: Adaptive Systems
- Mohammed Al-Refai, Walter Cazzola

, Sudipto Ghosh, Robert B. France:
Using Models to Validate Unanticipated, Fine-Grained Adaptations at Runtime. 23-30 - Guillaume Babin

, Yamine Aït Ameur, Marc Pantel:
Correct Instantiation of a System Reconfiguration Pattern: A Proof and Refinement-Based Approach. 31-38 - Marcello M. Bersani, Marisol García-Valls

:
The Cost of Formal Verification in Adaptive CPS. An Example of a Virtualized Server Node. 39-46
Session 2A: Testing and Quality Assurance
- Sunint Kaur Khalsa, Yvan Labiche

:
An Extension of Category Partition Testing for Highly Constrained Systems. 47-54 - Puntitra Sawadpong, Edward B. Allen:

Software Defect Prediction Using Exception Handling Call Graphs: A Case Study. 55-62 - Tarek Awwad, Nadia Bennani, Lionel Brunie, David Coquil, Harald Kosch, Veronika Rehn-Sonigo:

Task Characterization for an Effective Worker Targeting in Crowdsourcing. 63-64 - Anneliese Andrews, Mahmoud Abdelgawad

, Ahmed Gario:
World Model for Testing Autonomous Systems Using Petri Nets. 65-69
Session 2B: Safety-Critical Systems
- Alexei Iliasov, Alexander B. Romanovsky

:
Formal Analysis of Railway Signalling Data. 70-77 - Ralph Eastwood, Robert Alexander, Tim Kelly:

Safe Multi-objective Planning with a Posteriori Preferences. 78-85 - Lian Duan, Sanjai Rayadurgam, Mats Per Erik Heimdahl, Oleg Sokolsky

, Insup Lee:
Representation of Confidence in Assurance Cases Using the Beta Distribution. 86-93
Session 3A: System Resilience and Survivability
- Michaël Lauer, Matthieu Amy, Jean-Charles Fabre, Matthieu Roy, William Excoffon, Miruna Stoicescu:

Engineering Adaptive Fault-Tolerance Mechanisms for Resilient Computing on ROS. 94-101 - Azadeh Jahanbanifar, Ferhat Khendek

, Maria Toeroe:
Runtime Adjustment of Configuration Models for Consistency Preservation. 102-109 - Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:

CSRS: Cyber Survive and Recover Simulator. 110-113
Session 3B: Software Analysis
- Jian Xiang, John C. Knight, Kevin J. Sullivan:

Synthesis of Logic Interpretations. 114-121 - Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:

Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods. 122-131 - Yuan Fei, Huibiao Zhu, Xi Wu, Huixing Fang

:
Comparative Modeling and Verification of Pthreads and Dthreads. 132-140
Session 4A: Cybersecurity II
- Sridhar Adepu, Aditya Mathur:

An Investigation into the Response of a Water Treatment System to Cyber Attacks. 141-148 - Raymond C. Borges-Hink

, Katerina Goseva-Popstojanova
:
Characterization of Cyberattacks Aimed at Integrated Industrial Control and Enterprise Systems: A Case Study. 149-156 - Md. Shahrear Iqbal

, Mohammad Zulkernine, Fehmi Jaafar, Yuan Gu:
FCFraud: Fighting Click-Fraud from the User Side. 157-164
Session 4B: Formal Development
- Alexei Iliasov, Alexander B. Romanovsky

, Elena Troubitsyna, Linas Laibinis:
Formalisation-Driven Development of Safety-Critical Systems. 165-172 - Amel Mammar, Thi Mai Nguyen, Régine Laleau:

Formal Development of a Secure Access Control Filter. 173-180 - Kerianne H. Gross, Aaron W. Fifarek, Jonathan A. Hoffman:

Incremental Formal Methods Based Design Approach Demonstrated on a Coupled Tanks Control System. 181-188
Session 5A: Analysis of Design Models
- Ashlie B. Hocking, M. Anthony Aiello, John C. Knight, Nikos Aréchiga:

Proving Critical Properties of Simulink Models. 189-196 - Van Chan Ngo

, Axel Legay, Jean Quilbeuf:
Statistical Model Checking for SystemC Models. 197-204 - Sean J. S. Regisford, Brian K. Hulbert, Aaron W. Fifarek:

Compositional Architecture Design for Fuel Tank Thermal Systems. 205-212
Session 5B: Networked Systems
- Paul Hyden, Ira S. Moskowitz, Stephen Russell:

Using Network Topology to Supplement High Assurance Systems. 213-219 - Xi Wu, Yongxin Zhao, Huibiao Zhu:

Integrating a Calculus with Mobility and Quality for Wireless Sensor Networks. 220-227 - Tommaso Zoppi

, Andrea Ceccarelli
, Paolo Lollini
, Andrea Bondavalli
, Francesco Lo Piccolo, Gabriele Giunta
, Vito Morreale:
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy. 228-235
Session 6A: Work in Progress - Software
- Pankaj Kamthan, Nazlie Shahmir:

Modeling Negative User Stories is Risky Business. 236-237 - S. Tucker Taft, Florian Schanda, Yannick Moy:

High-Integrity Multitasking in SPARK: Static Detection of Data Races and Locking Cycles. 238-239 - Mohamed Naija, Jean-Michel Bruel, Samir Ben Ahmed

:
Towards a MARTE Extension to Address Adaptation Mechanisms. 240-243
Session 6B: Work in Progress - System
- Hong Liu, Tianyu Yang, Jing Wang:

Model Checking for the Fault Tolerance of Collaborative AUVs. 244-245 - Jaime C. Acosta, Salamah Salamah:

An Analysis Platform for Execution-Based Model Generation. 246-247 - Giedre Sabaliauskaite

, Geok See Ng
, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Methods to Detect Cyber Attacks on a Robot. 248-251
Session 7A: Cloud Services
- Renyu Yang

, Tianyu Wo, Chunming Hu, Jie Xu, Mingming Zhang:
D^2PS: A Dependable Data Provisioning Service in Multi-tenant Cloud Environment. 252-259 - Philipp Stephanow, Christian Banse

, Julian Schütte
:
Generating Threat Profiles for Cloud Service Certification Systems. 260-267 - Saikat Das, Mohammad Zulkernine:

CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions. 268-275
Session 7B: Smart Grid and Cyber-Physical Systems
- Marco Mori, Andrea Ceccarelli

, Paolo Lollini
, Andrea Bondavalli
, Bernhard Frömel:
A Holistic Viewpoint-Based SysML Profile to Design Systems-of-Systems. 276-283 - Silvano Chiaradonna, Felicita Di Giandomenico, Jun Xiao:

Quantification of the Effectiveness of Medium Voltage Control Policies in Smart Grids. 284-291 - Eduardo B. Fernández

:
Preventing and unifying threats in cyberphysical systems. 292-293 - Sara Cleemput, Mustafa A. Mustafa

, Bart Preneel
:
High Assurance Smart Metering. 294-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














