| 2015 | 20th International Conference on Engineering of Complex Computer Systems, ICECCS 2015, Gold Coast, Australia, December 9-12, 2015 |
| 2015 | A Formal Framework for Reasoning Emergent Behaviors in Swarm Robotic Systems. Qin Li, Jinxun Wang, Qiwen Xu, Yanhong Huang, Huibiao Zhu |
| 2015 | A Make/Buy/Reuse Feature Development Framework for Product Line Evolution. Juha Savolainen, Mike Mannion |
| 2015 | All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo |
| 2015 | An Invariant Inference Framework by Active Learning and SVMs. Jiaying Li |
| 2015 | Analyzing Security Property of Android Application Implementation Using Formal Method. Quanqi Ye |
| 2015 | Architecture Exploration of Real-Time Systems Based on Multi-objective Optimization. Rahma Bouaziz, Laurent Lemarchand, Frank Singhoff, Bechir Zalila, Mohamed Jmaiel |
| 2015 | Combining Software Metrics and Text Features for Vulnerable File Prediction. Yun Zhang, David Lo, Xin Xia, Bowen Xu, Jianling Sun, Shanping Li |
| 2015 | Comparing Routing Protocols. Mojgan Kamali, Luigia Petre |
| 2015 | Conversing at Many Layers: Multi-layer System-on-Chip Protocol Conversion. Roopak Sinha |
| 2015 | Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT). Byungho Min, Vijay Varadharajan |
| 2015 | Fitness Landscape Characterisation for Constrained Software Architecture Optimisation Problems. Aldeida Aleti, Irene Moser |
| 2015 | Formal Analysis of a Single Sign-On Protocol Implementation for Android. Quanqi Ye, Guangdong Bai, Kailong Wang, Jin Song Dong |
| 2015 | Formal Certification of Non-interferent Android Bytecode (DEX Bytecode). Hendra Gunadi |
| 2015 | Formal Development of a Real-Time Operating System Memory Manager. Wen Su, Jean-Raymond Abrial, Geguang Pu, Bin Fang |
| 2015 | GPU Accelerated On-the-Fly Reachability Checking. Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi, Shengchao Qin |
| 2015 | Hardened Flow-Sensitive Trace Formula for Fault Localization. Si-Mohamed Lamraoui, Shin Nakajima, Hiroshi Hosobe |
| 2015 | Improved Recovery for Proactive, Distributed Routing. Mojgan Kamali, Luigia Petre |
| 2015 | Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors. Mohamed Almorsy Abdelrazek, John Grundy, Amani S. Ibrahim |
| 2015 | Multi-objectives Refinement of AADL Models for the Synthesis Embedded Systems (mu-RAMSES). Smail Rahmoun, Etienne Borde, Laurent Pautet |
| 2015 | Parallel and Distributed Algorithms for Model Checking Problems (Doctoral Consortium). Zhimin Wu |
| 2015 | Probabilistic Denotational Semantics for an Interrupt Modelling Language. Yanhong Huang, Yongxin Zhao, Shengchao Qin, Jifeng He |
| 2015 | Requirements-Aided Automatic Test Case Generation for Industrial Cyber-physical Systems. Roopak Sinha, Cheng Pang, Gerardo Santillan Martinez, Juha Kuronen, Valeriy Vyatkin |
| 2015 | SeBip: A Symbolic Executor for BIP. Qiang Wang, Simon Bliudze |
| 2015 | Security Concepts as Add-On for Process Models. Jacob Geisel, Brahim Hamid, Jean-Michel Bruel |
| 2015 | Semantic Network Model: A Reasoning Engine for Software Requirements. Kushal Ahmed, Lian Wen, Abdul Sattar, Reza Farid |
| 2015 | Sports Strategy Analytics Using Probabilistic Reasoning. Jin Song Dong, Ling Shi, Le Vu Nguyen Chuong, Kan Jiang, Jing Sun |
| 2015 | The Complexity of Deadline Analysis for Workflow Graphs with a Single Resource. Mirela Botezatu, Hagen Völzer, Lothar Thiele |
| 2015 | Towards a Session Logic for Communication Protocols. Florin Craciun, Tibor Kiss, Andreea Costea |
| 2015 | Verifying FreeRTOS' Cyclic Doubly Linked List Implementation: From Abstract Specification to Machine Code. David Sanán, Yang Liu, Yongwang Zhao, Zhenchang Xing, Mike Hinchey |
| 2015 | Web Application Architecture Security Evaluation Method Based on AADL. Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Da-Zhi Sun |