| 2010 | A 2-Phase Method for Validation of Matching Pair Property with Case Studies of Operating Systems. Kang Gui, Suraj Kothari |
| 2010 | A Case Study on Safety Cases in the Automotive Domain: Modules, Patterns, and Models. Stefan Wagner, Bernhard Schätz, Stefan Puchner, Peter Kock |
| 2010 | A Consistency Check Algorithm for Component-Based Refinements of Fault Trees. Dominik Domis, Kai Höfig, Mario Trapp |
| 2010 | A Large-Scale Industrial Case Study on Architecture-Based Software Reliability Analysis. Heiko Koziolek, Bastian Schlich, Carlos G. Bilich |
| 2010 | A Multi-factor Software Reliability Model Based on Logistic Regression. Hiroyuki Okamura, Yusuke Etani, Tadashi Dohi |
| 2010 | An Efficient Method for Architecture-Based Reliability Evaluation for Evolving Systems with Changing Parameters. Indika Meedeniya, Lars Grunske |
| 2010 | An Industrial Investigation of Similarity Measures for Model-Based Test Case Selection. Hadi Hemmati, Lionel C. Briand |
| 2010 | As-If Infinitely Ranged Integer Model. Roger B. Dannenberg, Will Dormann, David Keaton, Robert C. Seacord, David Svoboda, Alex Volkovitsky, Timothy Wilson, Thomas Plum |
| 2010 | Assessing Asymmetric Fault-Tolerant Software. Peter T. Popov, Lorenzo Strigini |
| 2010 | Automata-Based Verification of Security Requirements of Composite Web Services. Hongyu Sun, Samik Basu, Vasant G. Honavar, Robyn R. Lutz |
| 2010 | Automatic Mutation Test Case Generation via Dynamic Symbolic Execution. Mike Papadakis, Nicos Malevris |
| 2010 | Automating System Tests Using Declarative Virtual Machines. Sander van der Burg, Eelco Dolstra |
| 2010 | Calibrating Probabilistic GUI Testing Models Based on Experiments and Survival Analysis. Cristiano Bertolini, Alexandre Mota, Eduardo Aranha |
| 2010 | Change Bursts as Defect Predictors. Nachiappan Nagappan, Andreas Zeller, Thomas Zimmermann, Kim Herzig, Brendan Murphy |
| 2010 | Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian. Amiya Kumar Maji, Kangli Hao, Salmin Sultana, Saurabh Bagchi |
| 2010 | Client-Side Detection of Cross-Site Request Forgery Attacks. Hossain Shahriar, Mohammad Zulkernine |
| 2010 | Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study. Ivano Alessandro Elia, José Fonseca, Marco Vieira |
| 2010 | Computing the Number of Calls Dropped Due to Failures. Kishor S. Trivedi, Dazhi Wang, D. Jason Hunt |
| 2010 | Constraint-Based Test Input Generation for Java Bytecode. Florence Charreteur, Arnaud Gotlieb |
| 2010 | Detecting Dependences and Interactions in Feature-Oriented Design. Sven Apel, Wolfgang Scholz, Christian Lengauer, Christian Kästner |
| 2010 | DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing. Karthik Pattabiraman, Benjamin G. Zorn |
| 2010 | Empirical Evaluation of Factors Affecting Distinction between Failing and Passing Executions. Arin Zahalka, Katerina Goseva-Popstojanova, Jeffrey Zemerick |
| 2010 | Errors on Space Software Requirements: A Field Study and Application Scenarios. Paulo C. Véras, Emília Villani, Ana Maria Ambrosio, Nuno Silva, Marco Vieira, Henrique Madeira |
| 2010 | Evaluating the Use of Requirement Error Abstraction and Classification Method for Preventing Errors during Artifact Creation: A Feasibility Study. Gursimran Singh Walia, Jeffrey C. Carver |
| 2010 | FTCloud: A Component Ranking Framework for Fault-Tolerant Cloud Applications. Zibin Zheng, Tom Chao Zhou, Michael R. Lyu, Irwin King |
| 2010 | Flexible, Any-Time Fault Tree Analysis with Component Logic Models. Marc Forster, Daniel Schneider |
| 2010 | IEEE 21st International Symposium on Software Reliability Engineering, ISSRE 2010, San Jose, CA, USA, 1-4 November 2010 |
| 2010 | Improving the Precision of Dependence-Based Defect Mining by Supervised Learning of Rule and Violation Graphs. Boya Sun, Andy Podgurski, Soumya Ray |
| 2010 | Is Data Privacy Always Good for Software Testing? Mark Grechanik, Christoph Csallner, Chen Fu, Qing Xie |
| 2010 | Log-Based Reliability Analysis of Software as a Service (SaaS). Sean Banerjee, Hema Srikanth, Bojan Cukic |
| 2010 | On the Round Trip Path Testing Strategy. May Khalil, Yvan Labiche |
| 2010 | Optimizing Incremental Scope-Bounded Checking with Data-Flow Analysis. Danhua Shao, Divya Gopinath, Sarfraz Khurshid, Dewayne E. Perry |
| 2010 | Pinpointing the Subsystems Responsible for the Performance Deviations in a Load Test. Haroon Malik, Bram Adams, Ahmed E. Hassan |
| 2010 | Preventing Overflow Attacks by Memory Randomization. Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghunathan Srinivasan |
| 2010 | Prioritizing Mutation Operators Based on Importance Sampling. Mohan Sridharan, Akbar Siami Namin |
| 2010 | Propagating Bug Fixes with Fast Subgraph Matching. Boya Sun, Gang Shu, Andy Podgurski, Shirong Li, Shijie Zhang, Jiong Yang |
| 2010 | Security Trend Analysis with CVE Topic Models. Stephan Neuhaus, Thomas Zimmermann |
| 2010 | Software Aging Analysis of the Linux Operating System. Domenico Cotroneo, Roberto Natella, Roberto Pietrantuono, Stefano Russo |
| 2010 | The Impact of Coupling on the Fault-Proneness of Aspect-Oriented Programs: An Empirical Study. Rachel Burrows, Fabiano Cutigi Ferrari, Otávio Augusto Lazzarini Lemos, Alessandro Garcia, François Taïani |
| 2010 | The Importance of Data Quality in Software Reliability Modeling. Elisabeth A. Nguyen, Carlos F. Rexach, David P. Thorpe, Andrew E. Walther |
| 2010 | The Web Attacker Perspective - A Field Study. José Fonseca, Marco Vieira, Henrique Madeira |
| 2010 | Towards a Bayesian Approach in Modeling the Disclosure of Unique Security Faults in Open Source Projects. Prasanth Anbalagan, Mladen A. Vouk |
| 2010 | Using Accelerated Life Tests to Estimate Time to Software Aging Failure. Rivalino Matias, Kishor S. Trivedi, Paulo Romero Martins Maciel |