Default Cover Image

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)

June 26 2017 to June 29 2017

Denver, CO, USA

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-viii
Message from the General ChairFreely available from IEEE.pp. ix-ix
Message from the Workshop ChairsFreely available from IEEE.pp. x-x
Foreword for the Industry TrackFreely available from IEEE.pp. xi-xi
Organizing CommitteeFreely available from IEEE.pp. xii-xiii
Technical Program CommitteeFreely available from IEEE.pp. xiv-xv
Steering CommitteeFreely available from IEEE.pp. xvi-xvi
ReviewersFreely available from IEEE.pp. xvii-xvii
Safe Landing of Fixed Wing UAVsFull-text access may be available. Sign in or learn about subscription options.pp. 2-9
Byzantine Agreement Service for Cooperative Wireless Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 10-15
Towards Adaptive Fault Tolerance on ROS for Advanced Driver Assistance SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 29-35
Discovering and Mitigating New Attack Paths Using Graphical Security ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 45-52
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security PatchesFull-text access may be available. Sign in or learn about subscription options.pp. 53-60
Quantitative Evaluation of QoS Prediction in IoTFull-text access may be available. Sign in or learn about subscription options.pp. 61-66
An Integrated Approach for Resilience in Industrial Control SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 67-74
MARITACA: From Textual Use Case Descriptions to Behavior ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 83-90
Software-Defined HoneyNet: Towards Mitigating Link Flooding AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 99-100
TDSC: Two-Stage DDoS Detection and Defense System Based on ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 101-102
The Many Conflicting Visions of ‘Safety Case’Full-text access may be available. Sign in or learn about subscription options.pp. 103-104
RFID Tag Grouping Protocols Made PrivateFull-text access may be available. Sign in or learn about subscription options.pp. 105-106
Off-Path Caching for File Versioning in Named Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 107-108
Portable SDN Testbed PrototypeFull-text access may be available. Sign in or learn about subscription options.pp. 109-110
A Framework for SDN Network EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 111-112
Document Faults: An Extension of the Taxonomy of Dependable and Secure ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 113-114
Opportunities and Challenges of Third-Party Sustainment of Critical Software in Dependable SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 115-116
Faster Exact Reliability ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 121-124
Providing Resiliency to Orchestration and Automation Engines in Hybrid CloudFull-text access may be available. Sign in or learn about subscription options.pp. 125-128
Uptime-Optimized Cloud Architecture as a Brokered ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 129-132
Automating DRAM Fault Mitigation By Learning From ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 137-140
FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons LearnedFull-text access may be available. Sign in or learn about subscription options.pp. 141-144
MAS: Mobile-Apps Assessment and Analysis SystemFull-text access may be available. Sign in or learn about subscription options.pp. 145-148
A Visit to the Jungle of TerminologyFull-text access may be available. Sign in or learn about subscription options.pp. 149-152
Modeling Error Propagation in ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 153-155
Automated Program Diversity Using Program SynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 156-159
Enabling Low Degraded Read Latency and Fast Recovery for Erasure Coded Cloud Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 164-167
DRAM Scaling Error Evaluation Model Using Various Retention TimeFull-text access may be available. Sign in or learn about subscription options.pp. 177-183
Deep Healing: Ease the BTI and EM Wearout Crisis by Activating RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 184-191
Author indexFreely available from IEEE.pp. 192-193
[Publisher's information]Freely available from IEEE.pp. 194-194
Showing 54 out of 54