Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DSN-W
DSN-W 2017
Generate Citations
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)
June 26 2017 to June 29 2017
Denver, CO, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-viii
Message from the General Chair
Freely available from IEEE.
pp. ix-ix
Message from the Workshop Chairs
Freely available from IEEE.
pp. x-x
Foreword for the Industry Track
Freely available from IEEE.
pp. xi-xi
Organizing Committee
Freely available from IEEE.
pp. xii-xiii
Technical Program Committee
Freely available from IEEE.
pp. xiv-xv
Steering Committee
Freely available from IEEE.
pp. xvi-xvi
Reviewers
Freely available from IEEE.
pp. xvii-xvii
SSIV 2017 Welcome
Freely available from IEEE.
pp. 1-1
by
João Carlos Cunha
,
Kalinka Branco
,
António Casimiro
,
Urbano Nunes
Safe Landing of Fixed Wing UAVs
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-9
by
Pranav Jetley
,
P.B. Sujit
,
Srikanth Saripalli
Byzantine Agreement Service for Cooperative Wireless Embedded Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-15
by
Wenbo Xu
,
Martin Wegner
,
Lars Wolf
,
Rüdiger Kapitza
Assuring Fully Autonomous Vehicles Safety by Design: The Autonomous Vehicle Control (AVC) Module Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
by
Caroline Bianca Santos Tancredi Molina
,
Jorge Rady de Almeida
,
Lucio F. Vismari
,
Rodrigo Ignacio R. Gonzalez
,
Jamil K. Naufal
,
Joao Batista Camargo
Deterministic Ethernet: Addressing the Challenges of Asynchronous Sensing in Sensor Fusion Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-28
by
Ayhan Mehmed
,
Sasikumar Punnekkat
,
Wilfried Steiner
Towards Adaptive Fault Tolerance on ROS for Advanced Driver Assistance Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-35
by
M. Amy
,
J.-C. Fabre
,
M. Lauer
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-43
by
Madeline Cheah
,
Jeremy Bryans
,
Daniel S. Fowler
,
Siraj Ahmed Shaikh
RADIANCE Welcome
Freely available from IEEE.
pp. 44-44
by
Nuno Antunes
,
Ariadne M. B. R. Carvalho
,
Andrea Ceccarelli
Discovering and Mitigating New Attack Paths Using Graphical Security Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-52
by
Jin Bum Hong
,
Dong Seong Kim
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-60
by
Mengmeng Ge
,
Huy Kang Kim
,
Dong Seong Kim
Quantitative Evaluation of QoS Prediction in IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-66
by
Gary White
,
Andrei Palade
,
Christian Cabrera
,
Siobhán Clarke
An Integrated Approach for Resilience in Industrial Control Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-74
by
Johannes Iber
,
Tobias Rauter
,
Michael Krisper
,
Christian Kreiner
Towards an Ontology-Based Definition of Data Anonymization Policy for Cloud Computing and Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-82
by
Roberta Matsunaga
,
Ivan Ricarte
,
Tania Basso
,
Regina Moraes
MARITACA: From Textual Use Case Descriptions to Behavior Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-90
by
Leydi Erazo
,
Eliane Martins
,
Juliana Galvani Greghi
RSVP: Soft Error Resilient Power Savings at Near-Threshold Voltage Using Register Vulnerability
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-98
by
Li Tan
,
Nathan DeBardeleben
,
Qiang Guan
,
Sean Blanchard
,
Michael Lang
Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-100
by
Jinwoo Kim
,
Seungwon Shin
TDSC: Two-Stage DDoS Detection and Defense System Based on Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-102
by
Shuang Wei
,
Yijing Ding
,
Xinhui Han
The Many Conflicting Visions of ‘Safety Case’
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-104
by
Patrick J. Graydon
RFID Tag Grouping Protocols Made Private
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-106
by
Yudai Komori
,
Kazuya Sakai
,
Satoshi Fukumoto
Off-Path Caching for File Versioning in Named Data Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-108
by
Mamoru Ohara
,
Satoshi Fukumoto
Portable SDN Testbed Prototype
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-110
by
Josh Alcorn
,
Scott Melton
,
C. Edward Chow
A Framework for SDN Network Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-112
by
Josh Alcorn
,
Scott Melton
,
C. Edward Chow
Document Faults: An Extension of the Taxonomy of Dependable and Secure Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-114
by
Algirdas Avižienis
Opportunities and Challenges of Third-Party Sustainment of Critical Software in Dependable Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-116
by
Kate Gill
,
Rob Ashmore
RT Level vs. Microarchitecture-Level Reliability Assessment: Case Study on ARM(R) Cortex(R)-A9 CPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-120
by
Athanasios Chatzidimitriou
,
Manolis Kaliorakis
,
Dimitris Gizopoulos
,
Maurizio Iacaruso
,
Mauro Pipponzi
,
Riccardo Mariani
,
Stefano Di Carlo
Faster Exact Reliability Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-124
by
Vincent Debieux
,
Yvonne-Anne Pignolet
,
Thanikesavan Sivanthi
Providing Resiliency to Orchestration and Automation Engines in Hybrid Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-128
by
Long Wang
,
Harigovind V Ramasamy
,
Alexei Karve
,
Richard E Harper
Uptime-Optimized Cloud Architecture as a Brokered Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-132
by
Sreekrishnan Venkateswaran
,
Santonu Sarkar
Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-136
by
Yan Li
,
Binbin Chen
,
Vincent W. Zheng
,
William G. Temple
,
Zbigniew Kalbarczyk
,
Yue Wu
Automating DRAM Fault Mitigation By Learning From Experience
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-140
by
Elisabeth Baseman
,
Nathan DeBardeleben
,
Kurt Ferreira
,
Vilas Sridharan
,
Taniya Siddiqua
,
Olena Tkachenko
FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-144
by
Karim Eldefrawy
,
Norrathep Rattanavipanon
,
Gene Tsudik
MAS: Mobile-Apps Assessment and Analysis System
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-148
by
Chia-Wei Tien
,
Tse-Yung Huang
,
Ting-Chun Huang
,
Wei-Ho Chung
,
Sy-Yen Kuo
A Visit to the Jungle of Terminology
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-152
by
Algirdas Avižienis
Modeling Error Propagation in Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-155
by
Guanpeng Li
Automated Program Diversity Using Program Synthesis
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-159
by
Abraham Chan
Student Research Paper: Evaluation of the Dependability of Critical Infrastructures Using Hybrid Petri Nets with Random Variables and Stochastic Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-163
by
Carina Pilch
Enabling Low Degraded Read Latency and Fast Recovery for Erasure Coded Cloud Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-167
by
Peng Li
Special Session at DSN for the Best Papers from SELSE 2017
Freely available from IEEE.
pp. 168-168
by
Alan Wood
Evaluation and Mitigation of Soft-Errors in Neural Network-Based Object Detection in Three GPU Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-176
by
Fernando Fernandes dos Santos
,
Lucas Draghetti
,
Lucas Weigel
,
Luigi Carro
,
Philippe Navaux
,
Paolo Rech
DRAM Scaling Error Evaluation Model Using Various Retention Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-183
by
Seong-Lyong Gong
,
Jungrae Kim
,
Mattan Erez
Deep Healing: Ease the BTI and EM Wearout Crisis by Activating Recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-191
by
Xinfei Guo
,
Mircea R. Stan
Author index
Freely available from IEEE.
pp. 192-193
[Publisher's information]
Freely available from IEEE.
pp. 194-194
Showing 54 out of 54