Default Cover Image

2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)

Oct. 25 2021 to Oct. 28 2021

Wuhan, China

ISBN: 978-1-6654-2603-9

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
[Title page]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xiv
Message from the ISSRE 2021 General ChairsFreely available from IEEE.pp. xv-xv
ISSRE 2021 Industry Track Program CommitteesFreely available from IEEE.pp. xvii-xvii
Message from the Doctoral Symposium ChairsFreely available from IEEE.pp. xviii-xviii
ISSRE 2021 Doctoral Symposium CommitteesFreely available from IEEE.pp. xix-xix
Message from the ISSRE 2021 Fast Abstract Co-ChairsFreely available from IEEE.pp. xx-xx
ISSRE 2021 Fast Abstracts Track CommitteesFreely available from IEEE.pp. xxi-xxi
Message from the WoSAR 2021 Workshop ChairsFreely available from IEEE.pp. xxii-xxii
WoSAR 2021 Workshop CommitteesFreely available from IEEE.pp. xxiii-xxiv
WoSAR 2021 Workshop KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xxv-xxvi
Message from the WoSoCer 2021 Workshop ChairsFreely available from IEEE.pp. xxvii-xxvii
WoSoCer 2021 Workshop CommitteesFreely available from IEEE.pp. xxviii-xxviii
WoSoCer 2021 Workshop KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. xxix-xxix
Message from the RSDA 2021 Workshop ChairsFreely available from IEEE.pp. xxx-xxx
RSDA 2021 Workshop CommitteesFreely available from IEEE.pp. xxxi-xxxi
RSDA 2021 Workshop KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xxxii-xxxiii
IWSF+SHIFT 2021 Workshop CommitteesFreely available from IEEE.pp. xxxiv-xxxiv
IWSF+SHIFT 2021 Workshop KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xxxv-xxxvi
Message from the GAUSS 2021 Workshop ChairsFreely available from IEEE.pp. xxxvii-xxxvii
GAUSS 2021 Workshop CommitteesFreely available from IEEE.pp. xxxviii-xxxviii
GAUSS 2021 Workshop KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. xxxix-xxxix
Message from the RADAS 2021 Workshop ChairsFreely available from IEEE.pp. 1-1
RADAS 2021 Workshop CommitteesFreely available from IEEE.pp. xli-xli
RADAS 2021 Workshop KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. xlii-xlii
Message from the RESS Workshop ChairsFreely available from IEEE.pp. xliii-xliii
RESS 2021 Workshop CommitteesFreely available from IEEE.pp. lxiv-lxiv
RESS 2021 Workshop KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. xlv-xlv
Message from the WDMD 2021 Workshop ChairsFreely available from IEEE.pp. xliv-xliv
WDMD 2021 Workshop CommitteesFreely available from IEEE.pp. xlvii-xlvii
WDMD 2021 Workshop KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xlviii-xlviii
Message from the SSSML 2021 Workshop Organization CommitteeFreely available from IEEE.pp. liii-liii
SSSML 2021 Workshop CommitteesFreely available from IEEE.pp. liv-liv
Within-Project Software Aging Defect Prediction Based on Active LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Sensitivity Analysis of Software Rejuvenation Model with Markov Regenerative ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Aging and Rejuvenation Models of Load Changing Attacks in Micro-GridsFull-text access may be available. Sign in or learn about subscription options.pp. 17-24
Memory Degradation Analysis in Private and Public Cloud EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 33-39
My Services Got Old! Can Kubernetes Handle the Aging of Microservices?Full-text access may be available. Sign in or learn about subscription options.pp. 40-47
Recommendations for the Usage of Design Models in Aviation SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 56-63
(WiP) LLTFI: Low-Level Tensor Fault InjectorFull-text access may be available. Sign in or learn about subscription options.pp. 64-68
Software Requirement Criteria based on Human ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
An efficient dual ensemble software defect prediction method with neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 91-98
Semi-automated model extraction from observations for dependability analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 105-110
Input/Output Check Bugs Taxonomy: Injection Errors in SpotlightFull-text access may be available. Sign in or learn about subscription options.pp. 111-120
Genetic Algorithm for Scheduling Communication Networks in Time-Triggered Systems-of-SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
Automatic Extraction of Behavioral Features for Test Program Similarity AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 129-136
IDEA: Runtime Collection of Android DataFull-text access may be available. Sign in or learn about subscription options.pp. 137-143
Issue Categorization and Analysis of an Open-Source Driving Assistant SystemFull-text access may be available. Sign in or learn about subscription options.pp. 148-153
MC-FGSM: Black-box Adversarial Attack for Deep Learning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 154-159
Safe and Secure: Mutually Supporting Safety and Security Analyses with Model-Based SuggestionsFull-text access may be available. Sign in or learn about subscription options.pp. 172-181
A Combinatorial Reliability Analysis of Dynamic Fault Trees with Priority-AND GatesFull-text access may be available. Sign in or learn about subscription options.pp. 182-188
^{\prime}\mathbf{R}: Towards Detecting and Understanding Code-Document Violations in RustFull-text access may be available. Sign in or learn about subscription options.pp. 189-197
Computation Offloading and Task Scheduling with Fault-Tolerance for Minimizing Redundancy in Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 198-209
Methods for deep learning model failure detection and model adaption: A surveyFull-text access may be available. Sign in or learn about subscription options.pp. 218-223
Predicting gray fault based on context graph in container-based cloudFull-text access may be available. Sign in or learn about subscription options.pp. 224-234
MindFI: A Fault Injection Tool for Reliability Assessment of MindSpore ApplicacionsFull-text access may be available. Sign in or learn about subscription options.pp. 235-238
Important-unit Coverage for Recurrent Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 245-249
Multi-Scale Software Network Model for Software Safety of the Intended FunctionalityFull-text access may be available. Sign in or learn about subscription options.pp. 250-255
Network Intrusion Detection by an Approximate Logic Neural ModelFull-text access may be available. Sign in or learn about subscription options.pp. 256-261
Meaningful color image encryption algorithm based on compressive sensing and chaotic mapFull-text access may be available. Sign in or learn about subscription options.pp. 262-265
Detection of IoT Devices That Mine CryptocurrencyFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
Rustpi: A Rust-powered Reliable Micro-kernel Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 272-273
Targeted Code Inspection based on Human ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 274-275
Assurance Carrying Code for Software Supply ChainFull-text access may be available. Sign in or learn about subscription options.pp. 276-277
A Static Analysis Framework for Detecting Bugs in Introductory ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 278-279
Multi-Feature Fusion based Image Steganography using GANFull-text access may be available. Sign in or learn about subscription options.pp. 280-281
Exception Handling Recommendation Based on Self-Attention NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 282-283
Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 286-287
SourceSnippet2Binary: A Method for Searching Vulnerable Source Code Snippets in BinariesFull-text access may be available. Sign in or learn about subscription options.pp. 288-289
Eye Tracking Sensors as a Contactless Interfaces in Wireless Security ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 290-291
Information Hiding using Bucket SteganographyFull-text access may be available. Sign in or learn about subscription options.pp. 292-293
Dynamic Filtering and Prioritization of Static Code Analysis AlertsFull-text access may be available. Sign in or learn about subscription options.pp. 294-295
ColocationSim: Simulate Colocation Datacenter with Microservices and Performance InterferenceFull-text access may be available. Sign in or learn about subscription options.pp. 296-297
Software Security Readiness and DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 298-299
A Runtime Monitoring Based Fuzzing Framework for Temporal PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 300-301
RusBox: Towards Efficient and Adaptive Sandboxing for RustFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Online Log Parsing: Preliminary Literature ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 304-305
TSAI - Test Selection using Artificial Intelligence for the Support of Continuous IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 306-309
Mining Numerical Relations for Improving Software ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 310-313
A next-generation platform for Cyber Range-as-a-ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 314-318
Failure Prediction for Cloud Applications through Ensemble LearningFull-text access may be available. Sign in or learn about subscription options.pp. 319-322
Generation and Verification of Executable Assurance Case by Model-based EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 323-326
Innovation evaluation framework using state transition probability of the productFull-text access may be available. Sign in or learn about subscription options.pp. 339-344
Showing 100 out of 115