Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSREW
ISSREW 2021
Generate Citations
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
Oct. 25 2021 to Oct. 28 2021
Wuhan, China
ISBN: 978-1-6654-2603-9
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Table of Contents
Freely available from IEEE.
pp. v-xiv
Message from the ISSRE 2021 General Chairs
Freely available from IEEE.
pp. xv-xv
Message from the ISSRE 2021 Industry Program Committee Chairs
Freely available from IEEE.
pp. xvi-xvi
ISSRE 2021 Industry Track Program Committees
Freely available from IEEE.
pp. xvii-xvii
Message from the Doctoral Symposium Chairs
Freely available from IEEE.
pp. xviii-xviii
ISSRE 2021 Doctoral Symposium Committees
Freely available from IEEE.
pp. xix-xix
Message from the ISSRE 2021 Fast Abstract Co-Chairs
Freely available from IEEE.
pp. xx-xx
ISSRE 2021 Fast Abstracts Track Committees
Freely available from IEEE.
pp. xxi-xxi
Message from the WoSAR 2021 Workshop Chairs
Freely available from IEEE.
pp. xxii-xxii
WoSAR 2021 Workshop Committees
Freely available from IEEE.
pp. xxiii-xxiv
WoSAR 2021 Workshop Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xxv-xxvi
Message from the WoSoCer 2021 Workshop Chairs
Freely available from IEEE.
pp. xxvii-xxvii
WoSoCer 2021 Workshop Committees
Freely available from IEEE.
pp. xxviii-xxviii
WoSoCer 2021 Workshop Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. xxix-xxix
Message from the RSDA 2021 Workshop Chairs
Freely available from IEEE.
pp. xxx-xxx
RSDA 2021 Workshop Committees
Freely available from IEEE.
pp. xxxi-xxxi
RSDA 2021 Workshop Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxii-xxxiii
IWSF+SHIFT 2021 Workshop Committees
Freely available from IEEE.
pp. xxxiv-xxxiv
IWSF+SHIFT 2021 Workshop Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxv-xxxvi
Message from the GAUSS 2021 Workshop Chairs
Freely available from IEEE.
pp. xxxvii-xxxvii
GAUSS 2021 Workshop Committees
Freely available from IEEE.
pp. xxxviii-xxxviii
GAUSS 2021 Workshop Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. xxxix-xxxix
Message from the RADAS 2021 Workshop Chairs
Freely available from IEEE.
pp. 1-1
RADAS 2021 Workshop Committees
Freely available from IEEE.
pp. xli-xli
RADAS 2021 Workshop Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. xlii-xlii
Message from the RESS Workshop Chairs
Freely available from IEEE.
pp. xliii-xliii
RESS 2021 Workshop Committees
Freely available from IEEE.
pp. lxiv-lxiv
RESS 2021 Workshop Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. xlv-xlv
Message from the WDMD 2021 Workshop Chairs
Freely available from IEEE.
pp. xliv-xliv
WDMD 2021 Workshop Committees
Freely available from IEEE.
pp. xlvii-xlvii
WDMD 2021 Workshop Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xlviii-xlviii
Message from the SSSML 2021 Workshop Organization Committee
Freely available from IEEE.
pp. liii-liii
SSSML 2021 Workshop Committees
Freely available from IEEE.
pp. liv-liv
Within-Project Software Aging Defect Prediction Based on Active Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mengting Liang
,
Dimeng Li
,
Bin Xu
,
Dongdong Zhao
,
Xiao Yu
,
Jianwen Xiang
Sensitivity Analysis of Software Rejuvenation Model with Markov Regenerative Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Junjun Zheng
,
Hiroyuki Okamura
,
Tadashi Dohi
Aging and Rejuvenation Models of Load Changing Attacks in Micro-Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-24
by
Ricardo M. Czekster
,
Alberto Avritzer
,
Daniel Sadoc Menasché
Evaluation of software aging in component-based Web Applications subject to soft errors over time
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-32
by
Jacopo Parri
,
Samuele Sampietro
,
Leonardo Scommegna
,
Enrico Vicario
Memory Degradation Analysis in Private and Public Cloud Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-39
by
Ermeson Andrade
,
Fumio Machida
,
Roberto Pietrantuono
,
Domenico Cotroneo
My Services Got Old! Can Kubernetes Handle the Aging of Microservices?
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-47
by
José Flora
,
Paulo Gonçalves
,
Miguel Teixeira
,
Nuno Antunes
Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-55
by
Lukas Beierlieb
,
Alberto Avritzer
,
Lukas Iffländer
,
Nuno Antunes
,
Aleksandar Milenkoski
,
Samuel Kounev
Recommendations for the Usage of Design Models in Aviation Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-63
by
André Sarkis
,
Johnny Marques
,
Luiz Alberto Vieira Dias
(WiP) LLTFI: Low-Level Tensor Fault Injector
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-68
by
Abraham Chan
,
Udit Kumar Agarwal
,
Karthik Pattabiraman
From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-76
by
Vincent Tan
,
Carmen Cheh
,
Binbin Chen
Software Requirement Criteria based on Human Errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Fuqun Huang
A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-90
by
Jinfu Chen
,
Jingyi Chen
,
Saihua Cai
,
Haibo Chen
,
Chi Zhang
,
Chuangfei Huang
An efficient dual ensemble software defect prediction method with neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-98
by
Jinfu Chen
,
Jiaping Xu
,
Saihua Cai
,
Xiaoli Wang
,
Yuechao Gu
,
Shuhui Wang
Semi-automated model extraction from observations for dependability analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
András Földvári
,
András Pataricza
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-110
by
Jinfu Chen
,
Yuechao Gu
,
Saihua Cai
,
Haibo Chen
,
Jingyi Chen
Input/Output Check Bugs Taxonomy: Injection Errors in Spotlight
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-120
by
Irena Bojanova
,
Carlos Eduardo Galhardo
,
Sara Moshtari
Genetic Algorithm for Scheduling Communication Networks in Time-Triggered Systems-of-Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-128
by
Setareh Majidi
,
Roman Obermaisser
Automatic Extraction of Behavioral Features for Test Program Similarity Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-136
by
Emanuele De Angelis
,
Alessandro Pellegrini
,
Maurizio Proietti
IDEA: Runtime Collection of Android Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-143
by
Luciano Baresi
,
Kostandin Caushi
Migration of Monoliths through the Synthesis of Microservices using Combinatorial Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-147
by
Gianluca Filippone
,
Marco Autili
,
Fabrizio Rossi
,
Massimo Tivoli
Issue Categorization and Analysis of an Open-Source Driving Assistant System
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-153
by
Shuncheng Tang
,
Zhenya Zhang
,
Jia Tang
,
Lei Ma
,
Yinxing Xue
MC-FGSM: Black-box Adversarial Attack for Deep Learning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-159
by
Wenqiang Zheng
,
Yan-Fu Li
Semantic Learning and Understanding of multivehicle interaction patterns Using Primitive Driving Patterns With Bayesian Nonparametric Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-165
by
Lulu Jia
,
Dezhen Yang
,
Yi Ren
,
Cheng Qian
,
Zhifeng Li
Safe and Secure: Mutually Supporting Safety and Security Analyses with Model-Based Suggestions
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-181
by
Bastian Kruck
,
Peter Munk
,
Daniel Angermeier
A Combinatorial Reliability Analysis of Dynamic Fault Trees with Priority-AND Gates
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-188
by
Piaoyi Liu
,
Siwei Zhou
,
Luyao Ye
,
Dongdong Zhao
,
Jianwen Xiang
^{\prime}\mathbf{R}
: Towards Detecting and Understanding Code-Document Violations in Rust
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-197
by
Wanrong Ouyang
,
Baojian Hua
Computation Offloading and Task Scheduling with Fault-Tolerance for Minimizing Redundancy in Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-209
by
Xinying Liu
,
Jianhui Jiang
,
Long Li
Reliability Analysis of Systems Subject to Imperfect Fault Coverage Considering Failure Propagation and Component Relevancy
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-217
by
Chuanli Wu
,
Zixiang Wang
,
Siwei Zhou
,
Dongdong Zhao
,
Jing Tian
,
Jianwen Xiang
Methods for deep learning model failure detection and model adaption: A survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-223
by
Xiaoyu Wu
,
Zheng Hu
,
Ke Pei
,
Liyan Song
,
Zhi Cao
,
Shuyi Zhang
Predicting gray fault based on context graph in container-based cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-234
by
Siyu Yu
,
Ningjiang Chen
,
Birui Liang
MindFI: A Fault Injection Tool for Reliability Assessment of MindSpore Applicacions
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-238
by
Yang Zheng
,
Zhenye Feng
,
Zheng Hu
,
Ke Pei
On the Necessity of Explicit Artifact Links in Safety Assurance Cases for Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-28
by
Lydia Gauerhof
,
Roman Gansch
,
Christian Heinzemann
,
Matthias Woehrle
,
Andreas Heyl
Important-unit Coverage for Recurrent Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-249
by
Xu Liu
,
Honghui Li
,
Rui Wang
,
Zhouxian Jiang
Multi-Scale Software Network Model for Software Safety of the Intended Functionality
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-255
by
Zhitao Wu
,
Xiaoming Yang
,
Ping Chen
,
Zongshun Qu
,
Jun Lin
Network Intrusion Detection by an Approximate Logic Neural Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-261
by
Jiajun Zhao
,
Qiuzhen Lin
,
Junkai Ji
Meaningful color image encryption algorithm based on compressive sensing and chaotic map
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-265
by
Min Liu
,
Guodong Ye
,
Qiuzhen Lin
Detection of IoT Devices That Mine Cryptocurrency
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-271
by
Wei Zheng
,
Liangbo Hou
,
Junming Yu
,
Fei Chen
Rustpi: A Rust-powered Reliable Micro-kernel Operating System
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-273
by
Yuanzhi Liang
,
Lei Wang
,
Siran Li
,
Bo Jiang
Targeted Code Inspection based on Human Errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-275
by
Fuqun Huang
,
Henrique Madeira
Assurance Carrying Code for Software Supply Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-277
by
Yutaka Matsuno
,
Yoriyuki Yamagata
,
Hideaki Nishihara
,
Yuichiro Hosokawa
A Static Analysis Framework for Detecting Bugs in Introductory Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-279
by
Wenchu Xu
,
Yanran Ma
Multi-Feature Fusion based Image Steganography using GAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-281
by
Zhen Wang
,
Zhen Zhang
,
Jianhui Jiang
Exception Handling Recommendation Based on Self-Attention Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-283
by
Kai Lin
,
Chuanqi Tao
,
Zhiqiu Huang
When is Continuous Integration Useful? Empirical Study on Team Size and Reporters in Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-285
by
Naoko Imai
,
Hironori Washizaki
,
Naohiko Tsuda
,
Yoshiaki Fukazawa
Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-287
by
Marco Barletta
,
Marcello Cinque
,
Raffaele Della Corte
SourceSnippet2Binary: A Method for Searching Vulnerable Source Code Snippets in Binaries
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-289
by
Qinqin Wu
,
Hao Huang
,
Yi Tang
,
Zhenwei Gu
,
Ang Jia
Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-291
by
Marek R. Ogiela
,
Lidia Ogiela
Information Hiding using Bucket Steganography
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-293
by
Katarzyna Koptyra
,
Marek R. Ogiela
Dynamic Filtering and Prioritization of Static Code Analysis Alerts
Full-text access may be available. Sign in or learn about subscription options.
pp. 294-295
by
Ulaş Yüksel
,
Hasan Sözer
ColocationSim: Simulate Colocation Datacenter with Microservices and Performance Interference
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-297
by
Kangjin Wang
,
Ying Li
Software Security Readiness and Deployment
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-299
by
Saikath Bhattacharya
,
Munindar P. Singh
,
Laurie Williams
A Runtime Monitoring Based Fuzzing Framework for Temporal Properties
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-301
by
Jinjian Luo
,
Meixi Liu
,
Yunlai Luo
,
Zhenbang Chen
,
Yufeng Zhang
RusBox: Towards Efficient and Adaptive Sandboxing for Rust
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Wanrong Ouyang
,
Baojian Hua
Online Log Parsing: Preliminary Literature Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-305
by
Scott Lupton
,
Hironori Washizaki
,
Nobukazu Yoshioka
,
Yoshiaki Fukazawa
TSAI - Test Selection using Artificial Intelligence for the Support of Continuous Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-309
by
Maria Laura Brzezinski Meyer
Mining Numerical Relations for Improving Software Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-313
by
Bo Zhang
A next-generation platform for Cyber Range-as-a-Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-318
by
Vittorio Orbinato
Failure Prediction for Cloud Applications through Ensemble Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-322
by
Jomar Domingos
Generation and Verification of Executable Assurance Case by Model-based Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-326
by
Fang Yan
System-specific risk rating of software vulnerabilities in industrial automation & control systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-332
by
Monika Maidl
,
Dirk Kröselberg
,
Tiange Zhao
,
Tobias Limmer
Patternika: A Pattern-Mining-Based Tool For Automatic Library Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Ekaterina Blech
,
Andrey Grishchenko
,
Ivan Kniazkov
,
Guangtai Liang
,
Oleg Serebrennikov
,
Andrei Tatarnikov
,
Polina Volkhontseva
,
Kuzma Yakimets
Innovation evaluation framework using state transition probability of the product
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-344
by
Kumi Jinzenji
,
Akio Jin
,
Tatsuya Muramoto
The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-352
by
Luigi Coppolino
,
Salvatore D'Antonio
,
Giovanni Mazzeo
,
Luigi Romano
,
Irene Bonetti
,
Elena Spagnuolo
Genetic Algorithm-based Testing of Industrial Elevators under Passenger Uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-358
by
Joritz Galarraga
,
Aitor Arrieta Marcos
,
Shaukat Ali
,
Goiuria Sagardui
,
Maite Arratibel
Showing 100 out of 115
Load More
Load All