| 2015 | 2015 IEEE International Conference on Software Quality, Reliability and Security, QRS 2015, Vancouver, BC, Canada, August 3-5, 2015 |
| 2015 | A Case Study on Code Generation of an ERP System from Event-B. Néstor Cataño, Tim Wahls |
| 2015 | A Fault-Localization Approach Based on the Coincidental Correctness Probability. Xiaoli Zhou, Hanfei Wang, Jianhua Zhao |
| 2015 | A New Framework and Application of Software Reliability Estimation Based on Fault Detection and Correction Processes. Yu Liu, Min Xie, Jianfeng Yang, Ming Zhao |
| 2015 | ASR: Abstraction Subspace Reduction for Exposing Atomicity Violation Bugs in Multithreaded Programs. Shangru Wu, Chunbai Yang, W. K. Chan |
| 2015 | Abstracting Program Dependencies Using the Method Dependence Graph. Haipeng Cai, Raúl A. Santelices |
| 2015 | An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques. Amirreza Soudi, Wael Khreich, Abdelwahab Hamou-Lhadj |
| 2015 | An Approach for Authenticating Smartphone Users Based on Histogram Features. Chien-Cheng Lin, Chin-Chun Chang, Deron Liang |
| 2015 | An Effective Approach to Continuous User Authentication for Touch Screen Smart Devices. Arun Balaji Buduru, Stephen S. Yau |
| 2015 | An Empirical Study of Dynamic Incomplete-Case Nearest Neighbor Imputation in Software Quality Data. Jianglin Huang, Hongyi Sun, Yan-Fu Li, Min Xie |
| 2015 | An Empirical Study of Highly Impactful Bugs in Mozilla Projects. Le An, Foutse Khomh |
| 2015 | An Event-Based Formal Framework for Dynamic Software Update. Shengwei An, Xiaoxing Ma, Chun Cao, Ping Yu, Chang Xu |
| 2015 | Are Anti-patterns Coupled? An Empirical Study. Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu, Xiaoyu Zhou |
| 2015 | Assessing Security to Compare Architecture Alternatives of Component-Based Systems. Axel Busch, Misha Strittmatter, Anne Koziolek |
| 2015 | Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing. Josip Bozic, Bernhard Garn, Ioannis Kapsalis, Dimitris E. Simos, Severin Winkler, Franz Wotawa |
| 2015 | Combinatorial Testing for Tree-Structured Test Models with Constraints. Takashi Kitamura, Akihisa Yamada, Goro Hatayama, Cyrille Artho, Eun-Hye Choi, Thi Bich Ngoc Do, Yutaka Oiwa, Shinya Sakuragi |
| 2015 | Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System. Awad A. Younis, Yashwant K. Malaiya |
| 2015 | Cross-Project Aging Related Bug Prediction. Fangyun Qin, Zheng Zheng, Chenggang Bai, Yu Qiao, Zhenyu Zhang, Cheng Chen |
| 2015 | Deep Learning for Just-in-Time Defect Prediction. Xinli Yang, David Lo, Xin Xia, Yun Zhang, Jianling Sun |
| 2015 | Fault Localization in the Light of Faulty User Input. Birgit Hofer, Franz Wotawa |
| 2015 | Fine-Grained Software Reliability Estimation Using Software Testing Inputs. Hiroyuki Okamura, Yuki Takekoshi, Tadashi Dohi |
| 2015 | Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies. Dianxiang Xu, Yunpeng Zhang, Ning Shen |
| 2015 | HSD: Hybrid MARTE Sequence Diagram. Lulu Yao, Jing Liu, Yan Zhang, Yuejun Wang, Haiying Sun, Qingsheng Wang, Dehui Du, Xiaohong Chen |
| 2015 | Hovac: A Configurable Fault Injection Framework for Benchmarking the Dependability of C/C++ Applications. Lena Herscheid, Daniel Richter, Andreas Polze |
| 2015 | How Effective Are Code Coverage Criteria? Hadi Hemmati |
| 2015 | Is Learning-to-Rank Cost-Effective in Recommending Relevant Files for Bug Localization? Fei Zhao, Yaming Tang, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu |
| 2015 | Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems. Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand |
| 2015 | LLFI: An Intermediate Code-Level Fault Injection Tool for Hardware Faults. Qining Lu, Mostafa Farahani, Jiesheng Wei, Anna Thomas, Karthik Pattabiraman |
| 2015 | Machine Learning Based Hybrid Behavior Models for Android Malware Analysis. Hsin-Yu Chuang, Sheng-De Wang |
| 2015 | Multi-perspective Regression Test Prioritization for Time-Constrained Environments. Dusica Marijan |
| 2015 | Node-Set Analysis for Linked Recursive Data Structures. Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li |
| 2015 | On the Relationship between Model Coverage and Code Coverage Using MATLAB's Simulink. Yunwei Dong, Zhe Li, Dave Towey |
| 2015 | On the Viability of Using SRGMs for IT Help Desk Incident Predictions. Anneliese Andrews, Joseph Lucente |
| 2015 | PORA: Proportion-Oriented Randomized Algorithm for Test Case Prioritization. Bo Jiang, Wing Kwong Chan, T. H. Tse |
| 2015 | Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection. Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein |
| 2015 | Predicting Vulnerable Components via Text Mining or Software Metrics? An Effort-Aware Perspective. Yaming Tang, Fei Zhao, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu |
| 2015 | Robustness of Non-homogeneous Gamma Process-Based Software Reliability Models. Yasuhiro Saito, Tadashi Dohi |
| 2015 | System Call-Based Detection of Malicious Processes. Raymond Canzanese, Spiros Mancoridis, Moshe Kam |
| 2015 | Uncertainty Analysis of Race Conditions in Real-Time Systems. Shan He, Sizhao Li, Yan Chen, Donghui Guo |