2015 IEEE International Conference on Software Quality, Reliability and Security - Companion

3-5 Aug. 2015

Filter Results

Displaying Results 1 - 25 of 52
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (787 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Message from the Steering Committee Co-Chairs

    Publication Year: 2015, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (187 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2015, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2015, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (141 KB) | HTML iconHTML
    Freely Available from IEEE
  • QRS 2015 Steering and Organization Committees

    Publication Year: 2015, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Chairs for Workshops Co-located with QRS 2015

    Publication Year: 2015, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • QRS 2015 Program Committee

    Publication Year: 2015, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Keynote abstracts

    Publication Year: 2015, Page(s):xvi - xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plenary Panel: Security of IoT

    Publication Year: 2015, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • [Tutorials: 2 abstracts]

    Publication Year: 2015, Page(s):xxiii - xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    These tutorial discuss the following: reliability engineering in Web applications; and key principles in good governance of open source software and services at enterprises. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing Real-Time Malware Threats

    Publication Year: 2015, Page(s):6 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (563 KB) | HTML iconHTML

    In recent years, distribution of malware has switched from classical channels, such as e-mail, vulnerable services, or macros in software, to a new channel, websites. Therefore one major entry point of malware - that severely reduces a user's security - is through the browser. For this reason it is essential to increase the security awareness of users and in the long-term extrapolate guidelines to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An AST-Based Approach to Classifying Defects

    Publication Year: 2015, Page(s):14 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    During software development life cycle, a large number of defects could be discovered and reported. Defect classification is essential, as it can help developers better understand the distribution of the defect types and hence help reduce the effort of root cause analysis. In this paper, we proposed an approach to automatically classifying software defects using various features extracted from the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective Regression Testing of Safety-Critical Systems: A Black Box Approach

    Publication Year: 2015, Page(s):22 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB) | HTML iconHTML

    This paper presents a selective regression testing approach for testing proper failure mitigation in safety-critical systems. Based on changes to the models used for test generation, it classifies tests as obsolete, retestable, and reusable. It also defines a process for generating new tests based on partial regeneration. It takes advantage of the phased approach of the original method that starts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Control Strategy for Resource Allocation of Service-Based Systems in Cloud Environment

    Publication Year: 2015, Page(s):32 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Service-based systems (SBS) resource allocation in cloud computing environment is important to guarantee Quality of Service (QoS) to satisfy requirements of service requests as well as reduce operating costs. In this paper, a control strategy is presented to allocate the system resources of cloud provider to the servers using PID self tuning adaptive control dynamically. Meanwhile, an adaptive mec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Security Threats Using Mobile Devices

    Publication Year: 2015, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    In our previous work [1], we presented a study of using performance escalation to automatic detect Distributed Denial of Service (DDoS) types of attacks. We propose to enhance the work of security threat detection by using mobile phones as the detector to identify outliers of normal traffic patterns as threats. The mobile solution makes detection portable to any services. This paper also shows tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PURITY: A Planning-based secURITY Testing Tool

    Publication Year: 2015, Page(s):46 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1128 KB) | HTML iconHTML

    Despite sophisticated defense mechanisms security testing still plays an important role in software engineering. Because of their latency, security flaws in web applications always bear the risk of being exploited sometimes in the future. In order to avoid potential damage, appropriate prevention measures should be incorporated in time and in the best case already during the software development c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Network Models Based on Dynamic Execution for Fault Propagation Research

    Publication Year: 2015, Page(s):56 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    The growing complexity makes it difficult for researchers to quantify the behavior of software. By extracting the entities of software into nodes and the mutual effects between two entities into edges, a software can be transformed into a complex network which present both the topological structure and the entities' properties. In this paper, software network models based on dynamic execution (SNM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiently Testing Intelligent Transportation System in Simulation Environment

    Publication Year: 2015, Page(s):62 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1126 KB) | HTML iconHTML

    This paper presents a simulation test approach to improve the efficiency of testing the Intelligent Transportation Systems (ITS). During the test, the ITS onsite environment is replaced by the simulation environment, which is consisted of two parts: the transport scene simulation model and the sensor simulation model. We firstly extend the transport micro-simulation scene model to support the new ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault Propagation Model for Embedded Software

    Publication Year: 2015, Page(s):72 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1097 KB) | HTML iconHTML

    With the the ever increasing advancement of technology, embedded software has becomes more and more complex, making it difficult to perform fault propagation analysis, understanding fault propagation in embedded software is important toward improving the reliability of the whole system. There is a significant amount of published works regarding fault propagation analysis, however much of this rese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Selection and Analysis of Diffraction Images

    Publication Year: 2015, Page(s):80 - 88
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    3D morphological features of biological cells captured in diffraction images provide the basis to deeply study the biochemical processes that a cell undergoes during various activities. Although automatic classification of biological cells is highly desired, manual analysis of image data is often necessary to study the underlying morphological processes as in most of the cases due to complex cell ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Attributes-Based Allocation Approach of Software Trustworthy Degrees

    Publication Year: 2015, Page(s):89 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Trustworthiness measurement and evaluation of softwares is an important research topic in the field of trustworthy softwares. The existing metric model for software trustworthiness can determine trustworthy degree of a software with given trustworthy degrees of attributes. In this paper, we focus on the reverse of measurement approach, which determines trustworthy degrees of attributes with given ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.