ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
Latest Publications
TOTAL DOCUMENTS
53
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9781479958436
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A Proof System in Process Algebra for Demand and Supply
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.44
◽
2014
◽
Author(s):
Xinghua Yao
◽
Yixiang Chen
Keyword(s):
Process Algebra
◽
Proof System
◽
Demand And Supply
Download Full-text
Organizing Committee
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.8
◽
2014
◽
Download Full-text
The Impact of Static and Dynamic Pairs on Pair Programming
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.52
◽
2014
◽
Cited By ~ 3
Author(s):
Rajendran Swamidurai
◽
David Umphress
Keyword(s):
Pair Programming
◽
The Impact
Download Full-text
A Hybrid Clock System Related to STeC Language
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.39
◽
2014
◽
Cited By ~ 3
Author(s):
Yixinag Chen
◽
Yuanrui Zhang
Keyword(s):
Clock System
Download Full-text
Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.30
◽
2014
◽
Cited By ~ 7
Author(s):
Farzana Rahman
◽
Md Osman Gani
◽
Golam Mushih Tanimul Ahsan
◽
Sheikh Iqbal Ahamed
Keyword(s):
Mobile Devices
◽
User Authentication
◽
Usable Security
Download Full-text
A Light-Weight Software Environment for Confining Android Malware
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.34
◽
2014
◽
Cited By ~ 1
Author(s):
Xiaolei Li
◽
Guangdong Bai
◽
Benjamin Thian
◽
Zhenkai Liang
◽
Heng Yin
Keyword(s):
Light Weight
◽
Software Environment
◽
Android Malware
Download Full-text
Analysing Requirements to Detect Latent Security Vulnerabilities
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.35
◽
2014
◽
Author(s):
Curtis C. R. Busby Earle
◽
Robert B. France
◽
Indrakshi Ray
Keyword(s):
Security Vulnerabilities
Download Full-text
A Predictive Runtime Verification Framework for Cyber-Physical Systems
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.43
◽
2014
◽
Cited By ~ 3
Author(s):
Kang Yu
◽
Zhenbang Chen
◽
Wei Dong
Keyword(s):
Cyber Physical Systems
◽
Runtime Verification
◽
Physical Systems
Download Full-text
Fourth International Workshop on Safety and Security in Cyber-Physical Systems - Program Committee
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.10
◽
2014
◽
Keyword(s):
International Workshop
◽
Cyber Physical Systems
◽
Program Committee
◽
Physical Systems
Download Full-text
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
◽
10.1109/sere-c.2014.33
◽
2014
◽
Cited By ~ 9
Author(s):
Mariem Graa
◽
Nora Cuppens Boulahia
◽
Frederic Cuppens
◽
Ana Cavalliy
Keyword(s):
Code Obfuscation
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close