


default search action
19th QRS 2019: Sofia, Bulgaria - Companion
- 19th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2019, Sofia, Bulgaria, July 22-26, 2019. IEEE 2019, ISBN 978-1-7281-3925-8

Automobile Software Security and Safety
- Daniel S. Fowler

, Jeremy W. Bryans
, Madeline Cheah
, Paul Wooderson
, Siraj A. Shaikh
:
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example. 1-8 - Jake Hayward, Andrew Tomlinson

, Jeremy W. Bryans
:
Adding Cyberattacks To An Industry-Leading CAN Simulator. 9-16 - Lama Moukahal, Mohammad Zulkernine:

Security Vulnerability Metrics for Connected Vehicles. 17-23 - Clifford Liem, Dan Murdock, Andrew Williams, Martin Soukup:

Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity. 24-27 - Christian Lidström

, Carl Bondesson, Mattias Nyberg, Jonas Westman:
Improved Pattern for ISO 26262 ASIL Decomposition with Dependent Requirements. 28-35 - Ryo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita:

DDCAN: Delay-Time Deliverable CAN Network. 36-41 - Dennis Kengo Oka, Tommi Makila, Rikke Kuipers:

Integrating Application Security Testing Tools into ALM Tools in the Automotive Industry. 42-45
Automated Intelligent Software Testing
- Jinyu Zhang, Honghui Zhao, Yumeng Yang, Jiaqi Yan:

Towards Transparency and Trustworthy: A Used-Car Deposit Platform Based on Blockchain. 46-50 - Siyou Ma, Feng Gao, Yunqiang Yan:

Study on Hybrid Collaborative Simulation Testing Method Towards CPS. 51-56 - Yusong Chen, Yang Gao, Yufeng Zhou, Menghui Chen, Xingyue Ma:

Design of an Automated Test Tool Based on Interface Protocol. 57-61 - Shu Zhang, Ge Yan, Yu Li, Jia Liu:

Evaluation of Judicial Imprisonment Term Prediction Model Based on Text Mutation. 62-65 - Tieke He, Shenghao Chen, Lian Hao, Jia Liu:

Quality Driven Judicial Data Governance. 66-70 - Xiuting Ge, Ya Pan, Yong Fan, Chunrong Fang

:
AMDroid: Android Malware Detection Using Function Call Graphs. 71-77 - Wenhong Liu, Jiahong Jiang, Zhongtian Li, Jun Yang, Yakui Song, Zhaohui Dou:

A Baseline Evaluation Method Based on Principal Component Analysis for Software Test Case Design. 78-83 - Baogui Chen, Zhuoyang Li, Siyuan Shen, Zhipeng Zou, Tieke He:

Judicial Knowledge Reasoning Based on Representation Learning. 84-88 - Yunqiang Yan, Linbo Wu, Yanhong Peng, Changhai Nie:

A Test Case Design Method Based on Path Depth Coverage. 89-96
Cyber Resiliency: Technologies, Economics and Strategy
- Michael Atighetchi, Borislava I. Simidchieva

, Katarzyna Olejnik:
Security Requirements Analysis - A Vision for an Automated Toolchain. 97-104
Data-Driven System Quality Assurance
- Celia Chen, Michael Shoga, Barry W. Boehm:

Exploring the Dependency Relationships between Software Qualities. 105-108 - Yasir Malik, Carlos Renato Salim Campos, Fehmi Jaafar:

Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis. 109-113 - Zekun Song, Yichen Wang, Pengyang Zong, Zhiwei Ren, Di Qi:

An Empirical Study of Comparison of Code Metric Aggregation Methods-on Embedded Software. 114-119 - María José Salamea, Carles Farré

:
Influence of Developer Factors on Code Quality: A Data Study. 120-125 - Iosif Itkin

, Andrey Novikov, Rostislav Yavorskiy:
Development of Intelligent Virtual Assistant for Software Testing Team. 126-129 - Martí Manzano, Claudia P. Ayala, Cristina Gómez

, Lidia López Cuesta
:
A Software Service Supporting Software Quality Forecasting. 130-132
Human and Social Aspects of Software Quality
- Hui Wang, Tieke He, Zhipeng Zou, Siyuan Shen, Yu Li:

Using Case Facts to Predict Accusation Based on Deep Learning. 133-137 - Wu Wen, Jiahui Sun, Ya Li, Peng Gu, Jianfeng Xu:

Design and Implementation of Software Test Laboratory Based on Cloud Platform. 138-144 - Baogui Chen, Yu Li, Shu Zhang, Hao Lian, Tieke He:

A Deep Learning Method for Judicial Decision Support. 145-149 - Linbo Wu, Yunqiang Yan, Feng Gao, Xiaohong Chen, Changhai Nie:

Research on Modeling and Verification Methods for Embedded Software Systems Based on SysML. 150-157 - Amr ElBanna, Nashwa Abdelbaki

:
NONYM!ZER: Mitigation Framework for Browser Fingerprinting. 158-163
Model Checking and Software Testing and Verification
- Zhiqin Cao, Jinyu Yin, Yichen Wang, Yu Li, Jintao Zhang:

An Empirical Study of Open Source Flight Control Software Program Model Checking. 164-169 - Onur Kilinççeker

, Alper Silistre, Moharram Challenger
, Fevzi Belli:
Random Test Generation from Regular Expressions for Graphical User Interface (GUI) Testing. 170-176 - Konrad Fögen, Horst Lichter

:
Repairing Over-Constrained Models for Combinatorial Robustness Testing. 177-184 - Caleb King, Joseph Morgan, Ryan Lekivetz:

Design Fractals: A Graphical Method for Evaluating Binary Covering Arrays. 185-190 - Nikolay Brayanov, Arno Eichberger

:
Automation in Hardware-in-the-Loop Units Development and Integration. 191-197
Quality Engineering
- Anna Gromova, Iosif Itkin

, Sergey Pavlov, Alexander Korovayev:
Raising the Quality of Bug Reports by Predicting Software Defect Indicators. 198-204 - Rong Wang

, Shaoying Liu:
Branch Sequence Coverage Criterion for Testing-Based Formal Verification with Symbolic Execution. 205-212 - Yonghui Yang, Fei Deng, Yunqiang Yan, Feng Gao:

A Fault Localization Method Based on Conditional Probability. 213-218 - Yu Gao, Hua Li, Yuanping Li, Bowei Liu, Xianrong Wang, Hongwei Ruan:

Using TLA+ to Specify Leader Election of Raft Algorithm with Consideration of Leadership Transfer in Multiple Controllers. 219-226 - Petar Afric

, Lucija Sikic, Adrian Satja Kurdija, Goran Delac, Marin Silic:
REPD: Source Code Defect Prediction As Anomaly Detection. 227-234 - Ying Wang, Jian Dong, Sen Zhang, Decheng Zuo:

B-SEFI: A Binary Level Soft Error Fault Injection Tool. 235-241
Reliability and Resilience of Complex Systems
- Xiaohong Wang, Yuan Zhang, Lizhi Wang, Dawei Lu, Yusheng Sun, Jun Yao, Tielin Ma, Xiaohui Wang:

Task Decision-Making for UAV Swarms Based on Robustness Evaluation. 242-248 - Xiaoyue Wu, Haiyue Yu:

A Petri Net Modeling Approach for Reliability of PMS with Time Redundancy. 249-254 - Heng Zhang

, Jing Jiang, Zhenling Mo, Qiang Miao:
A Remaining Useful Life Prediction Framework for Multi-sensor System. 255-259 - Qian Zhao, Xiang Jia, Bo Guo:

Bayesian Estimation of Residual Life for Weibull Distributed Products Based on the Fusion of Different Forms of Expert Information. 260-267
Software Engineering and Big Data
- Pan Liu, Yudong Li, Zhaojun Li:

Some Thoughts on Model-Based Test Optimization. 268-274 - Yi Yang, Jian Wang, Weixing Huang, Guoqing Li, Lan Huang:

Crowd Intelligence-Based Interactive Creation Platform. 275-280 - Ge Yan, Yu Li, Siyuan Shen, Shu Zhang, Jia Liu:

Law Article Prediction Based on Deep Learning. 281-284 - Yihang Bo:

Emotion-Based Interactive Art Design. 285-290 - Meng Li, Jian Wang, Yi Yang, Weixing Huang, Wenjuan Du:

Improving GAN-Based Calligraphy Character Generation using Graph Matching. 291-295 - Jiawei Liu, Zhenzhen Wang, Ge Yan, Hao Lian:

Quality Measurement of Judgment Documents. 296-299
Software Engineering and Knowledge Management
- Thomas Hirsch, Christian Schindler, Matthias Müller

, Thomas Schranz, Wolfgang Slany:
An Approach to Test Classification in Big Android Applications. 300-308 - Zhongzhao Zhang, Yanzhong Dang:

Complicated Causality Discovering and Presenting Based on Enterprise Knowledge Management. 309-315 - Yingying Wang, Guoqiang Li:

Detect Triangle Attack on Blockchain by Trace Analysis. 316-321 - Kenji Hisazumi

:
Feature Extraction from Japanese Natural Language Requirements Documents for Software Product Line Engineering. 322-329 - Anis Kothia, Bobby Swar, Fehmi Jaafar:

Knowledge Extraction and Integration for Information Gathering in Penetration Testing. 330-335 - Yubin Wang, Yanzhong Dang:

Quick Solutions to Production Problems in Manufacturing Enterprises: A Knowledge Perspective. 336-341 - Dan Luo, Jiangning Wu:

Ranking Online Reviews Based on Consumer Preferences. 342-347 - Tao Li

, Lili Rong:
Resilience of air Transport Network with the Complementary Effects of High-Speed Rail Network. 348-353 - Chunyu Xia, Tieke He, Wenlong Li, Zemin Qin, Zhipeng Zou:

Similarity Analysis of Law Documents Based on Word2vec. 354-357 - Bo Sun, Yachao Shao, Chao Chen:

Study on the Automated Unit Testing Solution on the Linux Platform. 358-361
System Reliability in Cloud Computing and Big Data
- Su Wu, Ziheng Wang, Chang Liu

, Chenming Zhu, Shaozhi Wu, Kai Xiao:
Automatical Segmentation of Pelvic Organs After Hysterectomy by using Dilated Convolution U-Net++. 362-367 - Chang Liu

, Shaozhi Wu, Su Wu, Ziheng Wang, Kai Xiao:
Reliable Automatic Organ Segmentation from CT Images using Deep CNN. 368-374
Security, Reliability, and Resilience in Wireless Sensor Networks and Smart Grid
- Yun Lin, Jie Chang:

Improving Wireless Network Security Based On Radio Fingerprinting. 375-379 - Selasi Kwame Ocansey, Changda Wang:

Search Over Encrypted Cloud Data With Secure Updates. 380-386 - Chaopeng Shen, Xiaotao Yan, Qiaozhen Liu, Jian Kang, Yang Liu, Xiaogang Zheng, Xige Zhang, Yuanyi Liu:

An FPGA Design and Implementation of 4G Network Security Algorithm Based on SNOW3G. 387-392
Safety and Security in Cyber-Physical Systems
- Yang Cao, Yunwei Dong, Xiaomin Wei

, Xiao Wu:
AADL Vulnerability Modeling and Security Analysis Method. 399-406 - Yongfeng Yin, Yuyan Shao, Xuefeng Wang, Qingran Su:

A Flexible Cyber Security Experimentation Platform Architecture Based on Docker. 413-420
System Testing and Validation
- Nikolay Tcholtchev

, Steven Ulrich, Faruk Catal, Wojciech Konitzer, Ramon Barakat
, Andreas Hoffmann, Ina Schieferdecker:
The Need for Unified Testbed Management Across Multiple Teams and Stakeholders in a Large Scale Telecom Integration Context. 427-434 - Alexander Kaiser, Sascha Hackel

:
Standards-Based IoT Testing with Open-Source Test Equipment. 435-441
Trustworthy Computing
- Mehmet Demir, Manar H. Alalfi, Ozgur Turetken

, Alexander Ferworn:
Security Smells in Smart Contracts. 442-449 - Yu-Lun Huang, Wen-Lin Sun, Ying-Han Tang:

3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud. 450-457 - Benjamin Vignau, Raphaël Khoury, Sylvain Hallé:

10 Years of IoT Malware: A Feature-Based Taxonomy. 458-465 - Jun Lin, Lan Liu:

Research on Security Detection and Data Analysis for Industrial Internet. 466-470 - Saikat Das, Ahmed M. Mahfouz, Deepak Venugopal, Sajjan G. Shiva:

DDoS Intrusion Detection Through Machine Learning Ensemble. 471-477
Testing and Verification of Programmable Chips
- Shasha Zhang, Liang Cao:

Security and Fault Diagnosis-Based Assertion-Based Verification for FPGA. 478-481 - Yayun Hu, Dongfang Li:

Formal Verification Technology for Asynchronous Communication Protocol. 482-486 - Dongfang Li, Wei Shen, Zhihao Wang:

A Noval Method of Security Verification for JTAG Protection Function. 487-492 - Shuling Yang, Suzhi Cao, Lei Yan, Siyan Pan, Houpeng Wang, Jian Zhang, Dandan Cui:

Research on Heterogeneous Cloud Test Platform Based on Elastic Scaling Mechanism. 493-498 - Jiajie Dong, Long Xi, Mengxi Yu, Zeming Zhang:

Software Simulation Error Injection in RAM on RISC-V of PolarFire FPGA. 499-502
Industry Track
- Rudolf Ramler, Claus Klammer

:
Enhancing Acceptance Test-Driven Development with Model-Based Test Generation. 503-504 - Satya Pradhan, Venky Nanniyur, Paddu Melanahalli, Munir Palla, Sunita Chulani:

Quality Metrics for Hybrid Software Development Organizations - A Case Study. 505-506
Fast Abstract
- Xuejiao Zhao, Lizhi Wang, Xiaohong Wang, Yusheng Sun, Tongmin Jiang, Zhiqiang Li, Yuan Zhang:

Reliable Life Prediction and Evaluation Analysis of Lithium-ion Battery Based on Long-Short Term Memory Model. 507-509 - Song Huang, Lele Chen, Zhanwei Hui, Jialuo Liu, Sen Yang, Qiang Chen:

A Method of Bug Report Quality Detection Based on Vector Space Model. 510-511 - Zhao Li, Yuhang Chen, Guoqiang Gong, Dongcheng Li, Ke Lv, Peng Chen:

A Survey of the Application of Combinatorial Testing. 512-513 - Barry W. Boehm, Doug Rosenberg, Neil G. Siegel:

Critical Quality Factors for Rapid, Scalable, Agile Development. 514-515 - Zhao Li, Yi Song, Guoqiang Gong, Dongcheng Li, Ke Lv, Jingsha He:

Applying Ordered Technique Set for Fault Localization. 516-517 - Jim A. Scheibmeir, Yashwant K. Malaiya:

An API Development Model for Digital Twins. 518-519 - Song Huang, Qiang Chen, Zhanwei Chen, Lele Chen, Jialuo Liu, Sen Yang:

A Test Cases Generation Technique Based on an Adversarial Samples Generation Algorithm for Image Classification Deep Neural Networks. 520-521 - Yunqi Du, Ya Pan, Haiyang Ao, Nimako Ottinah Alexander, Yong Fan:

Automatic Test Case Generation and Optimization Based on Mutation Testing. 522-523 - Junmei Sun, Kai Yan, Xuejiao Liu, Min Zhu, Lei Xiao:

Automatically Capturing and Reproducing Android Application Crashes. 524-525 - Patrick Kwaku Kudjo, Selasie Brown Aformaley

, Solomon Mensah, Jinfu Chen:
The Significant Effect of Parameter Tuning on Software Vulnerability Prediction Models. 526-527 - Sa Meng, Yuanshun Dai, Liang Luo, Chang Liu

:
Reliability Modeling and Optimization for Large-Scale Network Systems. 528-529 - Wenguang Xie, Yuyang Fan:

A Two-stage Personnel Recommendation Method Directed Towards Mobile Crowdsourcing Testing. 530-531
Posters
- Besma Khaireddine

, Aleksandr Zakharchenko
, Ali Mili:
Fault Density, Fault Depth and Fault Multiplicity: The Reward of Discernment. 532-533 - Song Huang, Sen Yang, Zhanwei Hui, Yongming Yao, Lele Chen, Jialuo Liu, Qiang Chen:

Runtime-Environment Testing Method for Android Applications. 534-535 - Yi Yao, Jiuluo Liu, Song Huang, Zhanwei Hui, Kaishun Wu, Lele Chen, Sen Yang, Qiang Chen:

Testing Adequacy of Convolutional Neural Network Based on Mutation Testing. 536-537 - Zhao Li, Yi Song, Peng Chen, Dongcheng Li, Guoqiang Gong, Ke Lv:

Progress of Word Embedding in Code Generation. 538-539 - Lisa Jöckel, Michael Kläs, Silverio Martínez-Fernández

:
Safe Traffic Sign Recognition through Data Augmentation for Autonomous Vehicles Software. 540-541 - Toshiyuki Fujikura, Ryo Kurachi:

A Test Scenario Generation Method for High Requirement Coverage by using KAOS Method. 542-543 - Xiupei Mei

, Imran Ashraf
, Bo Jiang, Wing Kwong Chan:
A Fuzz Testing Service for Assuring Smart Contracts. 544-545

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














