PRDC 2018: THE 23RD IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
abnormal node detection
ACC
acceptable result
Access Control
Adaptive Repetition
algorithms
Android malware family signature generation
Android security
Anomalies
anomaly detection
approximate adders
ArduPilot Flight Controller
Arrival rate
atomicity
attacker model
Authorization
autonomous vehicle
Autonomous Vehicles
B
Bag of words
binary analysis
binary equivalence
binary rejuvenation
bit-flips
Bitcoin
blockchain
botnet detection
C
Certificateless PKC
Chipkill
Cloud computing service
Cloud security
coarse grain lockstep
combinatorial interaction testing
Conformance Testing
constrained covering array
constrained locating array
control flow checking
controller failure
convolutional codes
Covert-Channel Attacks
CubeSat
cyber physical systems
Cyber Security
Cyber-Physical
cyber-physical system
cyber-physical systems
D
data error detection
data mining
degradation
Dependability assessment
Detection
dimensionality reduction
discrete event simulator
distributed data protection
distributed systems
DRAM Reliability
Drones
Dynamic analysis
Dynamic IoT systems
E
ECA rules
Efficiency
End-to-end email encryption
enterprise computing
Error correction Code
F
failover
Failure database
fault injection
fault localization
fault recovery
fault tolerance
faults injection
feasibility
formal verification
forward error correction
FPGA
fuzzy logic
G
Game Theory
goodness-of-fit
GPS Spoofing
H
Hash
heterogeneous controllers
high availability
Highly interactive systems
Hybrid Automata
I
Identification service
Incentive mechanism
Indoor Temperature
information leakage model
instruction duplication
Internet of things
Internet-of-Things
intrusion detection
Invariants
IoT
isolation
K
k-anonymity
L
LKAS
M
Machine Learning
majority attack
malicious web scraping
MDS codes
mesh array
metamorphic relation
metamorphic testing
mixed-criticality
mobile applications
mobile device management
Mobile IoT systems
Mobile software
Mobility Models
model checking
MSDND
multiprocessor
N
n-coloring problem
Nanosatellite
Narrowband Internet-of-Things (NB-IoT)
Network Economics
non-homogeneous binomial process
non-homogeneous Poisson process
O
One-way group key agreement
openpilot
P
Parallelization
partial reconfiguration
physically verifiable
Platform market
Poisson-binomial distribution
Policy
prediction
private data release
Problem Detection
product search engine
Proof of Work (PoW)
Protocol expressiveness
PTM model
Q
Queue theory
R
radiation
RAID
real-time
Reed Solomon Code
reliability
reliability estimation
resilience
Resource-constrained
restructuring
reverse engineering
Risk Assessment
rule table distribution
runtime behavior analysis
S
safety
safety analysis
SAT
Satellite
scheduling
SDN
security
Security Assessment
Security Metrics
security policy enforcement
security tools
Security Vulnerabilities
self-driving
Self-driving Cars (SDC)
sensor correlation
Service time
Side-Channel Attacks
silent data corruption
single track switch
sliding window
SmallSat
software
software defined fault tolerance
software diversity
Software fault injection
Software Metrics
software release decision
software reliability
Software Security
software signature
Software testing
software-defined networking
space
spaceflight
static branch prediction
STPA
System-on-chip
T
TCAM
temporal correctness
test-run reliability
Text mining
Thermal Sensation
timed automata
Topic model
transaction
transient error detection
Trustworthiness Benchmarking
U
UAS Traffic Management (UTM)
Unified Modeling Language
Unmanned Aerial Vehicle
Unmanned Aircraft Systems (UAS)
unsupervised learning
W
wireless sensor network
Z
zero-day attacks