Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DSN-W
DSN-W 2019
Generate Citations
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)
June 24 2019 to June 27 2019
Portland, OR, USA
ISBN: 978-1-7281-3030-9
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of contents
Freely available from IEEE.
pp. 5-7
Message from the Workshop Chairs
Freely available from IEEE.
pp. 8-8
Message from the DCDS 2019 Organizers
Freely available from IEEE.
pp. 9-9
Message from the DSML 2019 Organizers
Freely available from IEEE.
pp. 10-10
Welcome from the SSIV 2019 Organizers
Freely available from IEEE.
pp. 11-11
Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Gustavo Gonzalez-Granadillo
,
Mario Faiella
,
Ibéria Medeiros
,
Rui Azevedo
,
Susana Gonzalez-Zarzosa
Design of a Classification Model for a Twitter-Based Streaming Threat Monitor
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-14
by
Fernando Alves
,
Pedro Miguel Ferreira
,
Alysson Bessani
N-Version Machine Learning Models for Safety Critical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-51
by
Fumio Machida
System Misuse Detection Via Informed Behavior Clustering and Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-23
by
Linara Adilova
,
Livin Natious
,
Siming Chen
,
Olivier Thonnard
,
Michael Kamp
Adversarial Video Captioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-27
by
Suman Kalyan Adari
,
Washington Garcia
,
Kevin Butler
Malware Evasion Attack and Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-38
by
Yonghong Huang
,
Utkarsh Verma
,
Celeste Fralick
,
Gabriel Infantec-Lopez
,
Brajesh Kumar
,
Carl Woodward
Mixed Strategy Game Model Against Data Poisoning Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-43
by
Yifan Ou
,
Reza Samavi
NV-DNN: Towards Fault-Tolerant DNN Systems with N-Version Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-47
by
Hui Xu
,
Zhuangbin Chen
,
Weibin Wu
,
Zhi Jin
,
Sy-yen Kuo
,
Michael Lyu
Novelty Detection via Network Saliency in Visual-Based Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-57
by
Valerie Chen
,
Man-Ki Yoon
,
Zhong Shao
Using Intuition from Empirical Properties to Simplify Adversarial Training Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-61
by
Guanxiong Liu
,
Issa Khalil
,
Abdallah Khreishah
Component-Level ASIL Decomposition for Automotive Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-69
by
Alessandro Frigerio
,
Bart Vermeulen
,
Kees Goossens
Autonomous Maneuver Coordination Via Vehicular Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-77
by
Wenbo Xu
,
Alexander Willecke
,
Martin Wegner
,
Lars Wolf
,
Rüdiger Kapitza
Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-85
by
Talal Halabi
,
Mohammad Zulkernine
Predictive Runtime Simulation for Building Trust in Cooperative Autonomous Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-89
by
Emilia Cioroaica
,
Daniel Schneider
,
Hanna AlZughbi
,
Jan Reich
,
Rasmus Adler
,
Tobias Braun
Enabling Security Checking of Automotive ECUs with Formal CSP Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-97
by
John Heneghan
,
Siraj Ahmed Shaikh
,
Jeremy Bryans
,
Madeline Cheah
,
Paul Wooderson
Author index
Freely available from IEEE.
pp. 99-99
Showing 24 out of 24