City Research Online

Browse by Schools and Department by Authors

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Authors | Publication Type | Date | No Grouping
Number of items at this level: 239.

Article

Alberdi, E., Becher, J.-C., Gilhooly, K. J., Hunter, J., Logie, R., Lyon, A., McIntosh, N. and Reiss, J. (2001). Expertise and the interpretation of computerized physiological data: implications for the design of computerized monitoring in neonatal intensive care. International Journal of Human-Computer Studies, 55(3), pp. 191-216. doi: 10.1006/ijhc.2001.0477

Alberdi, E., Gilhooly, K. J., Hunter, J., Logie, R., Lyon, A., McIntosh, N. and Reiss, J. (2000). Computerisation and decision making in neonatal intensive care: a cognitive engineering investigation. Journal of Clinical Monitoring and Computing, 16(2), pp. 85-94. doi: 10.1023/A:1009954623304

Alberdi, E., Povyakalo, A. A., Strigini, L. and Ayton, P. (2004). Effects of incorrect computer-aided detection (CAD) output on human decision-making in mammography. Academic Radiology, 11(8), pp. 909-918. doi: 10.1016/j.acra.2004.05.012

Alberdi, E., Povyakalo, A. A., Strigini, L., Ayton, P. and Given-Wilson, R. M. (2008). CAD in mammography: lesion-level versus case-level analysis of the effects of prompts on human decisions. International Journal of Computer Assisted Radiology and Surgery, 3(1-2), pp. 115-122. doi: 10.1007/s11548-008-0213-x

Alberdi, E., Povyakalo, A. A., Strigini, L., Ayton, P., Hartswood, M., Procter, R. and Slack, R. (2005). Use of computer-aided detection (CAD) tools in screening mammography: a multidisciplinary investigation. British Journal of Radiology, 78, S31 - S40. doi: 10.1259/bjr/37646417

Alberdi, E., Strigini, L., Povyakalo, A. A. and Ayton, P. (2009). Why Are People's Decisions Sometimes Worse with Computer Support?. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 5775, pp. 18-31. doi: 10.1007/978-3-642-04468-7_3

Alberdi, E., Taylor, P. and Lee, R. (2004). Elicitation and representation of expert knowledge for computer aided diagnosis in mammography. Methods of Information in Medicine, 43(3), pp. 239-246. doi: 10.1267/METH04030239

Bayer, J., Flege, O. and Gacek, C. (2000). Creating product line architectures. Lecture Notes in Computer Science, 1951, pp. 210-216. doi: 10.1007/978-3-540-44542-5_23

Bertolino, A. and Strigini, L. (1998). Assessing the Risk due to Software Faults: Estimates of Failure Rate versus Evidence of Perfection.. Software Testing, Verification and Reliability, 8(3), pp. 155-166. doi: 10.1002/(SICI)1099-1689(1998090)8:3<155::AID-STVR163>3.0.CO;2-B

Bertolino, A. and Strigini, L. (1996). On the use of testability measures for dependability assessment. IEEE Transactions on Software Engineering, 22(2), pp. 97-108. doi: 10.1109/32.485220

Bishop, P. G. (2005). SILS and Software. Safety-Critical Systems Club Newsletter, 14(2),

Bishop, P. G. (1993). The Variation of Software Survival Time for Different Operational Input Profiles. Fault-Tolerant Computing, 1993. FTCS-23. Digest of Papers., The Twenty-Third International Symposium on, pp. 98-107. doi: 10.1109/FTCS.1993.627312

Bishop, P. G., Bloomfield, R. E., Littlewood, B., Popov, P. T., Povyakalo, A. A. and Strigini, L. (2014). A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train. Reliability Engineering & System Safety, 130, pp. 61-68. doi: 10.1016/j.ress.2014.04.002

Bishop, P. G., Bloomfield, R. E., Littlewood, B., Povyakalo, A. A. and Wright, D. (2011). Toward a Formalism for Conservative Claims about the Dependability of Software-Based Systems. IEEE Transactions on Software Engineering, 37(5), pp. 708-717. doi: 10.1109/TSE.2010.67

Bishop, P. G. and Cyra, L. (2010). Overcoming Non-determinism in Testing Smart Devices: A Case Study. Lecture Notes in Computer Science, 6351, pp. 237-250. doi: 10.1007/978-3-642-15651-9_18

Bishop, P. G. and Povyakalo, A. A. (2017). Deriving a frequentist conservative confidence bound for probability of failure per demand for systems with different operational and test profiles. Reliability Engineering & System Safety, 158, pp. 246-253. doi: 10.1016/j.ress.2016.08.019

Bloomfield, R. E., Courtois, P.-J., Littlewood, B., Strigini, L., Yih, S. and Fan, C.-F. (2002). Search for the Unnecessary: Letter to the Editor. Nuclear Engineering International, 47(570), p. 11.

Bloomfield, R. E., Popov, P. T., Salako, K., Stankovic, V. and Wright, D. (2017). Preliminary Interdependency Analysis: An Approach to Support Critical Infrastructure Risk Assessment. Reliability Engineering and System Safety, 167, pp. 198-217. doi: 10.1016/j.ress.2017.05.030

Clark, D., Hunt, S. and Malacaria, P. (2005). Quantified Interference for a While Language. Electronic Notes in Theoretical Computer Science, 112(SPEC), pp. 149-166. doi: 10.1016/j.entcs.2004.01.018

Del Tedesco, F., Hunt, S. and Sands, D. (2011). A semantic hierarchy for erasure policies. Lecture Notes in Computer Science, 7093 L, pp. 352-369. doi: 10.1007/978-3-642-25560-1_24

Devey, C. (2008). Electronic Discovery/Disclosure: From Litigation to International Commercial Arbitration. Arbitration, 74, pp. 369-384.

Egyed, A., Medvidovic, N. and Gacek, C. (2000). Component-based perspective on software mismatch detection and resolution. IEE Proceedings: Software, 147(6), pp. 225-236. doi: 10.1049/ip-sen:20000915

Favaro, J., Mazzini, S., Popov, P. T. ORCID: 0000-0002-3434-5272 and Strigini, L. (2018). AQUAS: A project to bridge the gaps between safety and security processes. Ada User Journal, 39(4), pp. 261-263.

Fengou, M. A., Mantas, G., Lymberopoulos, D., Komninos, N., Fengos, S. and Lazarou, N. (2013). A new framework architecture for next generation e-Health services. IEEE Journal of Biomedical and Health Informatics, 17(1), pp. 2168-2194. doi: 10.1109/TITB.2012.2224876

Frankl, P. G., Hamlet, R. G., Littlewood, B. and Strigini, L. (1998). Evaluating testing methods by delivered reliability. IEEE Transactions on Software Engineering, 24(8), pp. 586-601. doi: 10.1109/32.707695

Garcia, M., Bessani, A. N., Gashi, I., Neves, N. and Obelheiro, R. R. (2013). Analysis of operating system diversity for intrusion tolerance. Software: Practice and Experience, doi: 10.1002/spe.2180

Gashi, I., Popov, P. T. and Stankovic, V. (2009). Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach. Information and Software Technology, 51(2), pp. 497-511. doi: 10.1016/j.infsof.2008.06.003

Gashi, I., Popov, P. T., Stankovic, V. and Strigini, L. (2004). On designing dependable services with diverse off-the-shelf SQL servers. Lecture Notes in Computer Science, 3069, pp. 191-214. doi: 10.1007/978-3-540-25939-8_9

Gashi, I., Popov, P. T. and Strigini, L. (2007). Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers. IEEE Transactions on Dependable and Secure Computing, 4(4), pp. 280-294. doi: 10.1109/TDSC.2007.70208

Gashi, I., Sobesto, B., Mason, S., Stankovic, V. and Cukier, M. (2014). A Study of the Relationship Between Antivirus Regressions and Label Changes. 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp. 441-450. doi: 10.1109/ISSRE.2013.6698897

Georgakakis, E., Komninos, N. and Douligeris, C. (2012). NAVI: Novel authentication with visual information. 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 588-595. doi: 10.1109/ISCC.2012.6249360

Hunt, S., Clark, D. and Malacaria, P. (2002). Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science, 59(3), pp. 1-14. doi: 10.1016/S1571-0661(04)00290-7

Hunt, S., Clark, D. and Malacaria, P. (2007). A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3), pp. 321-371.

Jones, K., Kim, J. and Horowitz, M. (2010). Fast, non-monte-carlo estimation of transient performance variation due to device mismatch. IEEE Transactions on Circuits and Systems, 57(7), pp. 1746-1755. doi: 10.1109/TCSI.2009.2035418

Jones, K., Konrad, V. and Nickovic, D. (2010). Analog Property Checkers: A Ddr2 Case Study. Formal Methods in System Design, 36(2), pp. 114-130. doi: 10.1007/s10703-009-0085-x

Kamilaris, A., Pitsillides, A., Kondepudi, S. and Komninos, N. (2016). Privacy Concerns in Sharing Personal Consumption Data through Online Applications. 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), doi: 10.1109/IWCMC.2016.7577124

Kharchenko, V. S., Popov, P. T., Odarushchenko, O. and Zhadan, V. (2012). Empirical evaluation of accuracy of mathematical software used for availability assessment of fault-tolerant computer systems. Reliability: Theory & Applications,

Komninos, N. and Dimitriou, T. (2007). Protecting biometric templates with image watermarking techniques. Advances in Biometrics: Lecture Notes in Computer Science, 4642, pp. 114-123. doi: 10.1007/978-3-540-74549-5_13

Komninos, N. and Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7(1), pp. 171-182. doi: 10.1016/j.adhoc.2008.01.001

Komninos, N. and Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications(545), pp. 25-28.

Komninos, N. and Mantas, G. (2011). PEA: Polymorphic Encryption Algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3(1), pp. 1-18. doi: 10.1504/IJSCC.2011.039222

Komninos, N., Phillppou, E. and Pitsillides, A. (2014). Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures. Communications Surveys & Tutorials, PP(99), doi: 10.1109/COMST.2014.2320093

Komninos, N., Saxena, N., Shen, H., Raymond Choo, K-K. and Chaudhari, N. S. (2018). BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. IEEE Transactions on Dependable and Secure Computing, PP(99), doi: 10.1109/TDSC.2018.2799223

Komninos, N., Vergados, D. and Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5, pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005

Komninos, N., Vergados, D. and Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25(2), pp. 121-130. doi: 10.1016/j.cose.2005.09.005

Komninos, N., Vergados, D. D. and Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011

Komninos, N., Vergados, D. D. and Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. International Journal of Communication Systems, 20(12), pp. 1391-1406. doi: 10.1002/dac.882

Komninos, N., Vergados, D. D. and Douligeris, C. (2007). A two‐step authentication framework for Mobile ad hoc networks. China Communications Journal, 4(1), pp. 28-39.

Littlewood, B. (2008). Comments on "Multi-objective genetic algorithm for solving N-version program design problem". Reliability Engineering & System Safety, 93(8), p. 1287. doi: 10.1016/j.ress.2007.06.005

Littlewood, B. (2006). Comments on 'Evolutionary neural network modelling for software cumulative failure time prediction' by Liang Tian and Afzel Noore [Reliability Engineering and System Safety 87 (2005) 45-51]. Reliability Engineering & System Safety, 91(4), pp. 485-486. doi: 10.1016/j.ress.2005.02.001

Littlewood, B. (1996). The impact of diversity upon common mode failures. Reliability Engineering & System Safety, 51(1), pp. 101-113. doi: 10.1016/0951-8320(95)00120-4

Littlewood, B. (2000). The use of proofs in diversity arguments. IEEE Transactions on Software Engineering, 26(10), pp. 1022-1023. doi: 10.1109/32.879822

Littlewood, B., Brocklehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J. and Gollmann, D. (1993). Towards operational measures of computer security. Journal of Computer Security, 2(3), pp. 211-229.

Littlewood, B., Popov, P. T. and Strigini, L. (2002). Assessing the reliability of diverse fault-tolerant software-based systems. Safety Science, 40(9), pp. 781-796.

Littlewood, B., Popov, P. T. and Strigini, L. (2001). Modeling software design diversity. ACM Computer Surveys, 33(2), pp. 177-208. doi: 10.1145/384192.384195

Littlewood, B., Popov, P. T. and Strigini, L. (1999). A note on reliability estimation of functionally diverse systems. Reliability Engineering & System Safety, 66(1), pp. 93-95. doi: 10.1016/S0951-8320(99)00014-9

Littlewood, B., Popov, P. T., Strigini, L. and Shryane, N. (2000). Modeling the effects of combining diverse software fault detection techniques. IEEE Transactions on Software Engineering, 26(12), pp. 1157-1167. doi: 10.1109/32.888629

Littlewood, B. and Povyakalo, A. A. (2013). Conservative bounds for the pfd of a 1-out-of-2 software-based system based on an assessor’s subjective probability of “not worse than independence”. IEEE Transactions on Software Engineering, 39(12), pp. 1641-1653. doi: 10.1109/TSE.2013.31

Littlewood, B. and Povyakalo, A. A. (2013). Conservative reasoning about epistemic uncertainty for the probability of failure on demand of a 1-out-of-2 software-based system in which one channel is “possibly perfect”. IEEE Transactions on Software Engineering, 39(11), pp. 1521-1530. doi: 10.1109/TSE.2013.35

Littlewood, B. and Rushby, J. (2011). Reasoning about the Reliability of Diverse Two-Channel Systems in which One Channel is "Possibly Perfect". IEEE Transactions on Software Engineering, doi: 10.1109/TSE.2011.80

Littlewood, B. and Strigini, L. (1993). Validation of Ultrahigh Dependability for Software-Based Systems. Communications of the ACM (CACM), 36(11), pp. 69-80. doi: 10.1145/163359.163373

Littlewood, B. and Strigini, L. (2011). “Validation of ultra-high dependability…” – 20 years on. Safety Systems - The Safety-Critical Systems Club Newsletter, 20(3),

Littlewood, B. and Wright, D. (1997). Some conservative stopping rules for the operational testing of safety-critical software. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 23(11), pp. 673-683. doi: 10.1109/32.637384

Littlewood, B. and Wright, D. (2007). The use of multilegged arguments to increase confidence in safety claims for software-based systems: A study based on a BBN analysis of an idealized example. IEEE Transactions on Software Engineering, 33(5), pp. 347-365. doi: 10.1109/TSE.2007.1002

Mantas, G., Lymberopoulos, D. and Komninos, N. (2012). PKI security in large-scale healthcare networks. Journal of Medical Systems, 36(3), pp. 1107-1116. doi: 10.1007/s10916-010-9573-1

Mantas, G., Lymberopoulos, D. and Komninos, N. (2010). A new framework for ubiquitous context-aware healthcare applications. Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB, pp. 1-4. doi: 10.1109/ITAB.2010.5687758

Michalas, A., Dimitriou, T., Giannetsos, T., Komninos, N. and Prasad, N. R. (2012). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wireless Personal Communications, 66(3), pp. 559-575. doi: 10.1007/s11277-012-0734-z

Michalas, A., Komninos, N. and Prasad, N. R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, doi: 10.1109/WIRELESSVITAE.2011.5940931

Michalas, A., Komninos, N., Prasad, N. R. and Oleshchuk, V. A. (2010). New client puzzle approach for DoS resistance in ad hoc networks. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp. 568-573. doi: 10.1109/ICITIS.2010.5689528

Mitrokotsa, A., Komninos, N. and Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10, pp. 93-106.

Mohavedi, Y., Cukier, M. and Gashi, I. ORCID: 0000-0002-8017-3184 (2019). Vulnerability Prediction Capability: A Comparison between Vulnerability Discovery Models and Neural Network Models. Computers and Security, doi: 10.1016/j.cose.2019.101596

Netkachov, O., Popov, P. T. and Salako, K. (2014). Model-based Evaluation of the Resilience of Critical Infrastructures under Cyber Attacks. Lecture Notes in Computer Science, 8985, pp. 231-243. doi: 10.1007/978-3-319-31664-2_24

Netkachova, K. and Bloomfield, R. E. (2017). Is Chocolate Good for You-or, Is the Cloud Secure?. Computer, 50(8), pp. 74-78. doi: 10.1109/MC.2017.3001250

Netkachova, K. and Pokrova, S. V. (2011). Оценка и обеспечение безопасности систем электронного образования на основе веб-сервисов. Бизнес Информ, 6, pp. 183-186.

Popov, P. T., Netkachov, A. and Salako, K. (2014). Quantification of the Impact of Cyber Attack in Critical Infrastructures. Lecture Notes in Computer Science, 8696, pp. 316-327. doi: 10.1007/978-3-319-10557-4_35

Popov, P. T., Strigini, L., Riddle, S. and Romanovsky, A. (2001). On Systematic Design of Protectors for Employing OTS Items. Euromicro Conference, 2001. Proceedings. 27th, 2001, pp. 22-29. doi: 10.1109/EURMIC.2001.952434

Povyakalo, A. A., Alberdi, E., Strigini, L. and Ayton, P. (2013). How to discriminate between computer-aided and computer-hindered decisions: a case study in mammography. Medical Decision Making, 33(1), pp. 98-107. doi: 10.1177/0272989X12465490

Sabouri, A., Komninos, N. and Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, pp. 422-427. doi: 10.1109/CTS.2011.5898962

Salako, K. and Strigini, L. (2013). When does "diversity" in development reduce common failures? Insights from probabilistic modelling. IEEE Transactions on Dependable and Secure Computing, 11(2), pp. 193-206. doi: 10.1109/TDSC.2013.32

Schmid, K. and Gacek, C. (2000). Implementation issues in product line scoping. Lecture notes in computer science, 1844, pp. 38-82. doi: 10.1007/978-3-540-44995-9_11

Schrammel, P., Kroening, D., Brain, M. ORCID: 0000-0003-4216-7151, Martins, R., Teige, T. and Bienmüller, T. (2017). Incremental bounded model checking for embedded software. Formal Aspects of Computing, 29(5), pp. 911-931. doi: 10.1007/s00165-017-0419-1

Spurgin, A. J. and Stupples, D. (2012). Impact of accidents on organizational aspects of nuclear utilities. International Journal of Economics and Management Engineering, 2(4), pp. 132-144.

Strigini, L. and Wright, D. (2014). Bounds on survival probability given mean probability of failure per demand; And the paradoxical advantages of uncertainty. Reliability Engineering and System Safety, 128, pp. 66-83. doi: 10.1016/j.ress.2014.02.004

Tselikis, C., Douligeris, C., Mitropoulos, S., Komninos, N. and Tselikis, G. (2017). Adaptation of a Conference Key Distribution System for the Wireless Ad Hoc Network. 2017 IEEE International Conference on Communications (ICC), doi: 10.1109/ICC.2017.7996339

Tselikis, C., Mitropoulos, S., Komninos, N. and Douligeris, C. (2012). Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Communications Letters, 16(5), pp. 619-621. doi: 10.1109/LCOMM.2012.031912.112484

Van Delft, B., Hunt, S. and Sands, D. (2015). Very static enforcement of dynamic policies. Lecture Notes in Computer Science, 9036, pp. 32-52. doi: 10.1007/978-3-662-46666-7_3

Zhao, X. ORCID: 0000-0002-3474-349X, Littlewood, B., Povyakalo, A. A., Strigini, L. and Wright, D. (2018). Conservative Claims for the Probability of Perfection of a Software-based System Using Operational Experience of Previous Similar Systems. Reliability Engineering and System Safety, 175, pp. 265-282. doi: 10.1016/j.ress.2018.03.032

Zhao, X., Littlewood, B., Povyakalo, A. A., Strigini, L. and Wright, D. (2017). Modeling the probability of failure on demand (pfd) of a 1-out-of-2 system in which one channel is “quasi-perfect”. Reliability Engineering & System Safety, 158, pp. 230-245. doi: 10.1016/j.ress.2016.09.002

de Lemos, R., Gacek, C. and Romanovsky, A. (2003). Architectural mismatch tolerance. Lecture Notes in Computer Science, 2677, pp. 175-194. doi: 10.1007/3-540-45177-3_8

van der Meulen, M., Riddle, S., Strigini, L. and Jefferson, N. (2005). Protective wrapping of off-the-shelf components. COTS-based Software Systems, 3412, pp. 168-177. doi: 10.1007/978-3-540-30587-3_27

van der Meulen, M., Strigini, L. and Revilla, M. A. (2005). On the effectiveness of run-time checks. Computer Safety, Reliability and Security, 3688, pp. 151-164. doi: 10.1007/11563228_12

Book Section

Algaith, A., Gashi, I., Sobesto, B., Cukier, M., Haxhijaha, S. and Bajrami, G. (2016). Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop. (pp. 48-53). IEEE. ISBN 978-1-5090-3688-2

Bayer, J., Gacek, C., Muthig, D. and Widen, T. (2000). PuLSE-I: Deriving instances from a product line infrastructure. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop. (pp. 237-245). London, UK: IEEE Computer Society. ISBN 0-7695-0604-6

Bishop, P. G. and Bloomfield, R. E. (1998). A Methodology for Safety Case Development. In: Redmill, F. and Anderson, T. (Eds.), Industrial Perspectives of Safety-critical Systems: Proceedings of the Sixth Safety-critical Systems Symposium, Birmingham 1998. . London, UK: Springer. ISBN 3540761896

Bishop, P. G. and Bloomfield, R. E. (1995). The SHIP Safety Case. In: Safecomp '95 : The 14th International Conference on Computer Safety, Reliability and Security. . London, UK: Springer. ISBN 3540199624

Bishop, P. G. and Bloomfield, R. E. (2002). Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects. In: Software Reliability Engineering, 2002. ISSRE 2003. Proceedings. 13th International Symposium on. (pp. 295-303). IEEE.

Bishop, P. G., Bloomfield, R. E., Clement, T., Guerra, S. and Jones, C. (2003). Integrity static analysis of COTS/SOUP. In: Anderson, S. O., Felici, M. and Littlewood, B. (Eds.), Knowledge-Based Intelligent Information and Engineering Systems 7th INternational Conference, KES 2003, Oxford, UK, September 2003. Proceedings, Part I. Lecture Notes in Computer Science, 2788. (pp. 63-76). London, UK: Springer.

Bishop, P. G., Bloomfield, R. E., Guerra, S. and Thuy, N. (2012). Safety justification frameworks: Integrating rule-based, goal-based and risk-informed approaches. In: 8th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies 2012, NPIC and HMIT 2012: Enabling the Future of Nuclear Energy. (pp. 1283-1290). Illinois, USA: American Nuclear Society. ISBN 9781627480154

Bishop, P. G., Penny, J., Eaton, A. and Bloomfield, R. E. (2001). The Practicalities of Goal-Based Safety Regulation. In: Redmill, F. and Anderson, T. (Eds.), Aspects of Safety Management: Proceedings of the Ninth Safety-critical Systems Symposium, Bristol, UK 2001. (pp. 35-48). London; New York: Springer. ISBN 1852334118

Bishop, P. G., Tourlas, K. and Chozos, N. (2010). An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems. In: Schoitsch, E. (Ed.), Computer safety, reliability, and security. Lecture Notes in Computer Science, 6351. (pp. 375-388). London, UK: Springer.

Littlewood, B. (1996). Evaluation of software dependability. In: Wand, I. C. and Milner, R. (Eds.), Computing Tomorrow: Future Research Directions in Computer Science. (pp. 198-216). New York, USA: Cambridge University Press. ISBN 9780521460859

Littlewood, B. and Strigini, L. (2000). Software reliability and dependability: a roadmap. In: Finkelstein, A (Ed.), The Future of Software Engineering. State of the Art Reports given at the 22nd Int. Conf. on Software Engineering. (pp. 177-188). ACM Press. ISBN 1581132530

Mantas, G., Komninos, N., Rodriuez, J., Logota, E. and Marques, H. (2015). Security for 5G Communications. In: Rodriguez, J. (Ed.), Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.. ISBN 9781118867464

Movahedi, Y., Cukier, M., Andongabo, A. and Gashi, I. (2017). Cluster-based Vulnerability Assessment Applied to Operating Systems. In: 2017 13th European Dependable Computing Conference (EDCC). (pp. 18-25). IEEE. ISBN 978-1-5386-0602-5

Netkachov, O., Popov, P. T. ORCID: 0000-0002-3434-5272 and Salako, K. (2019). Quantitative Evaluation of the Efficacy of Defence-in-Depth in Critical Infrastructures. In: Resilience of Cyber-Physical Systems. (pp. 89-121). Berlin, Germany: Springer International Publishing. ISBN 978-3-319-95597-1

Strigini, L. (2005). Fault Tolerance Against Design Faults. In: Diab, H. and Zomaya, A. (Eds.), Dependable Computing Systems: Paradigms, Performance Issues, and Applications. (pp. 213-241). John Wiley & Sons.

Strigini, L. (2012). Fault tolerance and resilience: meanings, measures and assessment. In: Wolter, K., Avritzer, A., Vieira, M. and van Moorsel, A. (Eds.), Resilience Assessment and Evaluation of Computing Systems. . Berlin, Germany: Springer.

Strigini, L. and Bertolino, A. (1996). Acceptance Criteria for Critical Software Based on Testability Estimates and Test Results. In: Lecture notes in computer science. (pp. 83-94). Springer.

Monograph

Gashi, I. and Bloomfield, R. E. (2008). Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems. Centre for Software Reliability, City University London.

Mourouzis, T., Wojcik, M. and Komninos, N. (2016). On The Security Evaluation of Partial Password Implementations. .

Popov, P. T. (2012). Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Fault-Tolerant Off-the-Shelf Software. Centre for Software Reliability, City University London.

Strigini, L. and Littlewood, B. (1997). Guidelines for Statistical Testing (PASCON/WO6-CCN2/TN12). ESA/ESTEC project PASCON.

Strigini, L. and Littlewood, B. (2000). A discussion of practices for enhancing diversity in software designs. London, UK: Centre for Software Reliability, City University London.

Conference or Workshop Item

Adamsky, F., Khayam, S. A., Jager, R. and Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China.

Alberdi, E., Strigini, L., Leach, K., Ryan, P., Palanque, P. and Winckler, M. (2009). Gaining assurance in a voter-verifiable voting system. Paper presented at the 2009 Second International Conference on Dependability, 18 - 23 Jun 2009, Athens, Greece.

Andongabo, A. and Gashi, I. (2017). vepRisk - A Web Based Analysis Tool for Public Security Data. Paper presented at the 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.

Bessani, A. N., Reiser, H. P., Sousa, P., Gashi, I., Stankovic, V., Distler, T., Kapitza, R., Daidone, A. and Obelheiro, R. R. (2008). FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. Paper presented at the ACM/IFIP/USENIX Middleware '08 Conference.

Bishop, P. G. (2013). Does software have to be ultra reliable in safety critical systems?. Paper presented at the SAFECOMP 2013, 32nd International Conference on Computer Safety, Reliability and Security, 24 - 27 September 2013, Toulouse, France.

Bishop, P. G. (2002). Estimating Residual Faults from Code Coverage. Paper presented at the SAFECOMP 2002, 10 - 13 Sept 2002, Catania, Italy.

Bishop, P. G. (2003). MC/DC based estimation and detection of residual faults in PLC logic networks. Paper presented at the 14th IEEE International Symposium on Software Reliability Engineering ISSRE 2003, 17 - 20 Nov 2003, Denver, Colorado.

Bishop, P. G. (2015). Modeling the Impact of Testing on Diverse Programs. Paper presented at the 34th International Conference, SAFECOMP 2015, 23-09-2015 - 25-09-2015, Delft, The Netherlands.

Bishop, P. G. (1997). Using reversible computing to achieve fail-safety. Paper presented at the Eighth International Symposium On Software Reliability Engineering, 2 - 5 Nov 1997, Albuquerque, NM , USA.

Bishop, P. G. and Bloomfield, R. E. (2003). Using a Log-normal Failure Rate Distribution for Worst Case Bound Reliability Prediction. Paper presented at the 14th IEEE International Symposium on Software Reliability Engineering (ISSRE 2003), 17 - 20 Nov 2003, Denver, Colorado.

Bishop, P. G., Bloomfield, R. E. and Cyra, L. (2013). Combining Testing and Proof to Gain High Assurance in Software: a Case Study. Paper presented at the IEEE International Symposium on Software Reliability Engineering (ISSRE 2013), 4 - 7 Nov 2013, Pasadena, CA, USA.

Bishop, P. G., Burns, G. and Anderson, S. O. (1993). Stepwise Development and Verification of a Boiler System Specification. Paper presented at the International Workshop on the Design and Review of Software Controlled Safety-related Systems, 28 - 29 Jun 1993, National Research Council, Ottawa, Canada.

Bishop, P. G. and Cyra, L. (2012). Overcoming non-determinism in testing smart devices: how to build models of device behaviour. Paper presented at the 11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliability Conference 2012 (PSAM11 & ESREL 2012), 25 - 29 June 2012, Helsinki, Finland.

Bishop, P. G., Gashi, I., Littlewood, B. and Wright, D. (2007). Reliability modeling of a 1-out-of-2 system: Research with diverse Off-the-shelf SQL database servers. Paper presented at the The 18th IEEE International Symposium on Software Reliability (ISSRE '07), 5 - 9 Nov 2007, Trollhättan, Sweden.

Bishop, P. G. and Strigini, L. (2014). Estimating Worst Case Failure Dependency with Partial Knowledge of the Difficulty Function. Paper presented at the 33rd International Conference, SAFECOMP 2014, 10-09-2014 - 12-09-2014, Florence, Italy.

Bloomfield, R. E., Bendele, M., Bishop, P. G., Stroud, R. and Tonks, S. (2016). The risk assessment of ERTMS-based railway systems from a cyber security perspective: Methodology and lessons learned. Paper presented at the First International Conference, RSSRail 2016, 28-30 Jun 2016, Paris, France.

Bloomfield, R. E., Butler, E. and Netkachova, K. (2017). Assurance of open systems dependability: developing a framework for automotive security and safety. Paper presented at the Sixth Workshop on Open Systems Dependability, 21 Oct 2017, Tokyo, Japan.

Bloomfield, R. E., Buzna, L., Popov, P. T., Salako, K. and Wright, D. (2010). Stochastic modelling of the effects of interdependencies between critical infrastructure. Paper presented at the 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany.

Bloomfield, R. E., Chozos, N. and Salako, K. (2009). Current capabilities, requirements and a proposed strategy for interdependency analysis in the UK. Paper presented at the 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany.

Bloomfield, R. E., Gashi, I., Povyakalo, A. A. and Stankovic, V. (2008). Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. Paper presented at the 19th International Symposium on Software Reliability Engineering, 2008, 10 - 14 Nov 2008, Seattle, USA.

Bloomfield, R. E., Littlewood, B. and Wright, D. (2007). Confidence: Its role in dependability cases for risk assessment. 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, pp. 338-346. doi: 10.1109/DSN.2007.29 ISSN 1530-0889

Bloomfield, R. E., Netkachova, K. and Stroud, R. (2013). Security-Informed Safety: If it's not secure, it's not safe. Paper presented at the 5th International Workshop on Software Engineering for Resilient Systems (SERENE 2013), 03rd - 04th October 2013, Kiev, Ukraine.

Bloomfield, R. E. and Parisaca-Vargas, A. (2015). Using Ontologies to Support Model-based Exploration of the Dependencies between Causes and Consequences of Hazards. Paper presented at the 7th International Conference on Knowledge Engineering and Ontology Development, 12-11-2015 - 14-11-2015, Lisbon, Portugal.

Cukier, M., Gashi, I., Sobesto, B. and Stankovic, V. (2013). Does Malware Detection Improve With Diverse AntiVirus Products? An Empirical Study. Paper presented at the 32nd International Conference on Computer Safety, Reliability and Security (SAFECOMP), 24- - 27 September 2013, Toulouse, France.

Fengou, M. A., Mantas, G., Lymberopoulos, D. and Komninos, N. (2011). Ubiquitous healthcare profile management applying smart card technology. Paper presented at the Second International ICST Conference, MobiHealth 2011, 5 - 7 October 2011, Kos Island, Greece.

Frankl, P. G., Hamlet, D., Littlewood, B. and Strigini, L. (1997). Choosing a testing method to deliver reliability. PROCEEDINGS OF THE 1997 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, pp. 68-78. ISSN 0270-5257

Gacek, C. (2004). An interdisciplinary perspective of dependability in Open Source Software. BUILDING THE INFORMATION SOCIETY, 156, pp. 685-691. ISSN 1571-5736

Gacek, C., Arief, B. and Lawrie, T. (2001). Software architectures and Open Source Software: Where can research leverage the most?. Paper presented at the 1st Workshop on Open Source Software Engineering: Making Sense of the Bazaar (part of the 23rd IEEE International Conference on Software Engineering (ICSE 2001)), 15 May 2001, Toronto, Canada.

Gacek, C., Lawrie, T. and Arief, B. (2002). Interdisciplinary insights on Open Source. Paper presented at the Open Source Software Development Workshop, 25 - 26 Feb 2002, Newcastle upon Tyne, UK.

Garcia, M., Bessani, A. N., Gashi, I., Neves, N. and Obelheiro, R. R. (2011). OS diversity for intrusion tolerance: Myth or reality?. Paper presented at the 41st International Conference on Dependable Systems & Networks (DSN), 27 - 30 Jun 2011, Hong Kong.

Gashi, I., Bloomfield, R., Bloomfield, R. E. and Stroud, R. (2012). How secure is ERTMS?. Paper presented at the Workshop on Dependable and Secure Computing for Large-scale Complex Critical Infrastructures (DESEC4LCCI), 25 September 2012, Herrenkrug, Germany.

Gashi, I., Mason, S., Lugini, L., Marasco, E. and Cukic, B. (2014). Interoperability between Fingerprint Biometric Systems: An Empirical Study. Paper presented at the IEEE International Conference on Dependable Systems and Networks, 23rd - 26th June 2014, Atlanta, GA, USA.

Gashi, I. and Popov, P. T. (2006). Rephrasing rules for off-the-shelf SQL database servers. Paper presented at the Sixth European Dependable Computing Conference, 2006 (EDCC '06), 18 - 20 Oct 2006, Coimbra, Portugal.

Gashi, I. and Popov, P. T. (2007). Uncertainty explicit assessment of off-the-shelf software: Selection of an optimal diverse pair. Paper presented at the Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, 26 Feb - 2 Mar 2007, Banff, Canada.

Gashi, I., Popov, P. T. and Strigini, L. (2004). Fault diversity among off-the-shelf SQL database servers. Paper presented at the International Conference on Dependable Systems and Networks, 28 Jun - 1 Jul 2004.

Gashi, I., Povyakalo, A. A., Strigini, L., Matschnig, M, Hinterstoisser, T and Fischer, B (2014). Diversity for Safety and Security in Embedded Systems. Paper presented at the IEEE International Conference on Dependable Systems and Networks, 23-06-2014 - 26-06-2014, Atlanta, GA, USA.

Gashi, I., Stankovic, V., Cukier, M. and Sobesto, B. (2012). Diversity with AntiVirus products: Additional empirical studies. Paper presented at the 42nd IEEE International Conference on Dependable Systems and Networks (DSN) 2012, 25 - 28 June 2012, Boston, USA.

Gashi, I., Stankovic, V., Leita, C. and Thonnard, O. (2009). An Experimental Study of Diversity with Off-The-Shelf AntiVirus Engines. Paper presented at the Eighth IEEE International Symposium on Network Computing and Applications, 9 - 11 July 2009, Cambridge, MA, USA.

Gashi, I. ORCID: 0000-0002-8017-3184 and Ul Asad, H. (2018). Diversity in Open Source Intrusion Detection Systems. In: Computer Safety, Reliability, and Security. SAFECOMP 2018. . Cham, Switzerland: Springer. ISBN 978-3-319-99129-0

Georgakakis, E., Komninos, N. and Douligeris, C. (2012). NAVI: Novel authentication with visual information. Paper presented at the IEEE Symposium on Computers and Communications (ISCC), 1 - 4 July 2012, Cappadocia, Turkey.

Hunt, S., Askarov, A., Sabelfeld, A. and Sands, D. (2008). Termination-insensitive noninterference leaks more than just a bit. Paper presented at the 13th European Symposium on Research in Computer Security, Oct 2008, Malaga, Spain.

Hunt, S. and Clark, D. (2008). Non-interference for deterministic interactive programs. Paper presented at the 5th International Workshop on Formal Aspects in Security and Trust (FAST2008), Oct 2008, Malaga, Spain.

Hunt, S. and Mastroeni, I. (2005). The PER model of abstract non-interference. Paper presented at the Proc. Static Analysis, 12th International Symposium.

Hunt, S. and Sands, D. (2011). From exponential to polynomial-time security typing via principal types. Lecture Notes in Computer Science, 6602 L, pp. 297-316. ISSN 0302-9743

Hunt, S. and Sands, D. (2008). Just forget it - The semantics and enforcement of information erasure. Lecture Notes in Computer Science, 4960, pp. 239-253. ISSN 0302-9743

Hunt, S. and Sands, D. (2006). On flow-sensitive security types. ACM SIGPLAN-SIGACT, 41, pp. 79-90. ISSN 0362-1340

Jones, K. (2008). Analog and Mixed Signal Verification. Paper presented at the FMCAD 2008 Formal Methods in Computer Aided Design, 17 - 20 Nov 2008, Portland, OR, USA.

Jones, K. and Salako, K. (2013). Modeling Security Policy and the Effect for End-Users. In: Marinos, L. and Askoxylakis, I. (Eds.), Human Aspects of Information Security, Privacy, and Trust. HAS 2013. Lecture Notes in Computer Science. (pp. 256-265). Cham: Springer. ISBN 978-3-642-39345-7

Kharchenko, V. S., Odarushchenko, O., Odarushchenko, V. and Popov, P. T. (2013). Selecting Mathematical Software for Dependability Assessment of Computer Systems Described by Stiff Markov Chains. Paper presented at the 9th International Conference on ICT in Education, Research and Industrial Applications: Integration, Harmonization and Knowledge Transfer, 19-06-2013 - 22-06-2013, Kherson, Ukraine.

Kim, J., Jones, K. and Horowitz, M. (2007). Variable domain transformation for linear PAC analysis of mixed-signal systems. Paper presented at the International Conference on Computer-Aided Design, 2007. ICCAD 2007, 05 - 08 Nov 2007, San Jose, California, USA.

Komninos, N. (2007). Morpheus: stream cipher for software & hardware applications. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N. and Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04 - 08 June 2006, Mykonos, Greece.

Komninos, N. and Honary, B. (2001). Modified WAP for secure voice and video communication. Paper presented at the 2nd IEE International Conference on 3G Mobile Communication Technologies, 26 - 28 March 2001, London.

Komninos, N. and Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.

Komninos, N. and Honary, B. (2002). Security enhancement for A5/1 without losing hardware efficiency in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.

Komninos, N., Honary, B. and Darnell, M. (2000). Secure communication protocol for mobile multimedia applications. Paper presented at the 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC’2000), 12 - 15 November 2000, Bangkok, Thailand.

Komninos, N. and Junejo, A. K. (2015). Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. Paper presented at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 07-12-2015 - 09-12-2015, Limassol, Cyprus.

Komninos, N., Samarakoon, M. I. and Honary, B. (2000). Authentication and key distribution for wired and wireless systems. Paper presented at the 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 19 - 20 June 2000, Liverpool John Moores University, Liverpool, UK.

Komninos, N., Soroush, H. and Salajegheh, M. (2007). LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N., Tselikis, C. and Douligeris, C. (2013). SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks. Paper presented at the 18th IEEE Symposium on Computers and Communication (ISCC’13), 07 - 10 July 2013, Croatia.

Komninos, N., Vergados, D. D. and Douligeris, C. Two‐Step Authentication in Mobile Ad Hoc Networks. Paper presented at the Global Mobile Congress, 11-16 Oct 2006, Beijing, China.

Littlewood, B. (2000). The problems of assessing software reliability ...When you really need to depend on it. Paper presented at the Conference on Lessons in System Safety.

Littlewood, B. and Bloomfield, R. E. (2004). On the use of diverse arguments to increase confidence in dependability claims. Paper presented at the International Conference on Control and Instrumentation in Nuclear Installations, 2004, Liverpool, UK.

Littlewood, B. and Burns, A. (2010). Reasoning About the Reliability of Multi-version, Diverse Real-Time Systems. Paper presented at the 31st IEEE Real-Time Systems Symposium, 30 November - 03 December 2010, San Diego, USA.

Littlewood, B., Popov, P. T. and Strigini, L. (2001). Design diversity: an update from research on reliability modelling. Paper presented at the 9th Safety-critical Systems Symposium, 2001, Bristol, UK.

Littlewood, B. and Strigini, L. (2004). Redundancy and diversity in security. COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 3193, pp. 423-438. ISSN 0302-9743

Littlewood, B. and Wright, D. (1995). A Bayesian model that combines disparate evidence for the quantitative assessment of system dependability. Paper presented at the 14th International Conference on Computer Safety (SafeComp’95), 11 - 13 October 1995, Belgirate, Italy.

Lugini, L., Marasco, E., Cukic, B. and Gashi, I. (2013). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013), 24 - 27 June 2013, Budapest, Hungary.

Michalas, A., Bakopoulos, M., Komninos, N. and Prasad, N. R. (2012). Secure & trusted communication in emergency situations. Paper presented at the 35th IEEE Sarnoff Symposium (SARNOFF), 21 - 22 May 2012, Newark, USA.

Michalas, A. and Komninos, N. (2014). The Lord of the Sense: A Privacy Preserving Reputation System for Participatory Sensing Applications. Paper presented at the 19th IEEE Symposium on Computers and Communication (ISCC’2014), 23rd - 26th June 2014, Madeira, Portugal.

Michalas, A., Oleshchuk, V. A., Komninos, N. and Prasad, N. R. (2011). Privacy-preserving scheme for mobile ad hoc networks.. Paper presented at the 2011 IEEE Symposium on Computers and Communications (ISCC), 28 June - 1 July 2011, Kerkyra, Greece.

Mitrokotsa, A., Komninos, N. and Douligeris, C. (2007). Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks. Paper presented at the The Sixth Annual Mediterranean Ad Hoc Networking WorkShop, 12th - 15th June 2007, Corfu, Greece.

Mourouzis, T., Courtois, N. and Komninos, N. (2014). Advanced truncated differential cryptanalysis of GOST block cipher. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.

Mourouzis, T., Komninos, N. and Christofi, M. (2014). Towards a combined Rotational-Differential Cryptanalytic Framework. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.

Netkachova, K., Müller, K., Paulitsch, M. and Bloomfield, R. E. (2015). Investigation into a Layered Approach to Architecting Security-Informed Safety Cases. Paper presented at the 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), 13-09-2015 - 17-09-2015, Prague, Czech Republic.

Pizza, M. and Strigini, L. (1998). Comparing the effectiveness of testing methods in improving programs: the effect of variations in program quality. Paper presented at the The Ninth International Symposium on Software Reliability Engineering, 4 - 7 Nov 1998, Paderborn, Germany.

Pizza, M., Strigini, L., Bondavalli, A. and Di Giandomenico, F. (1998). Optimal discrimination between transient and permanent faults. Paper presented at the High-Assurance Systems Engineering Symposium, 13 - 14 Nov 1998, Washington DC, USA.

Popov, P. T. and Littlewood, B. (2004). The effect of testing on reliability of fault-tolerant software. Paper presented at the 2004 International Conference on dependable systems and networks, 28 June - 1 July 2004, Florence, Italy.

Popov, P. T., Povyakalo, A. A., Stankovic, V. and Strigini, L. (2014). Software diversity as a measure for reducing development risk. Paper presented at the Tenth European Dependable Computing Conference - EDCC 2014, 13 - 16 May 2014, Newcastle upon Tyne, UK.

Popov, P. T., Salako, K. and Stankovic, V. (2015). Stochastic modeling for performance evaluation of database replication protocols. Lecture Notes in Computer Science, 9259(9259), pp. 21-37. doi: 10.1007/978-3-319-22264-6_2 ISSN 0302-9743

Popov, P. T., Stankovic, V. and Strigini, L. (2012). An Empirical Study of the Effectiveness of 'Forcing Diversity' Based on a Large Population of Diverse Programs. Paper presented at the ISSRE 2012, International Symposium on Software Reliability Engineering, 27 - 30 November 2012, Dallas, Texas, USA.

Popov, P. T. and Strigini, L. (2010). Assessing Asymmetric Fault-Tolerant Software. Paper presented at the Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on, 1 - 4 Nov 2010, San Jose, California.

Popov, P. T. and Strigini, L. (2001). The reliability of diverse systems: a contribution using modelling of the fault creation process. Paper presented at the International Conference on Dependable Systems and Networks, 1 - 4 Jul 2001, Goteborg, Sweden.

Popov, P. T., Strigini, L. and Romanovsky, A. (1999). Choosing effective methods for design diversity - How to progress from intuition to science. COMPUTER SAFETY, RELIABILITY AND SECURITY, 1698, pp. 272-285. ISSN 0302-9743

Procopiou, A. and Komninos, N. (2015). Current and Future Threats Framework in Smart Grid Domain. Paper presented at the 5th Annual IEEE International Conference on CYBER Technology in Automation Control and Intelligence Systems, 8-06-2015 - 12-06-2015, Shenyang, China.

Spanoudakis, G., Kloukinas, C. and Androutsopoulos, K. (2007). Towards security monitoring patterns. Paper presented at the 22nd Annual ACM Symposium on Applied Computing, 11 - 15 March 2007, Seoul, Korea.

Stankovic, V., Alata, E., Leita, C., Serafini, M., Thonnard, O., Viniikka, J. and Zurutuza, U. (2008). Malicious Fault Characterization Exploiting Honeypot Data. Paper presented at the 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.

Stankovic, V., Bessani, A. N., Daidone, A., Gashi, I., Obelheiro, R. R. and Sousa, P. (2009). Enhancing Fault / Intrusion Tolerance through Design and Configuration Diversity. Paper presented at the 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2009), Jun 2009, Estoril, Lisbon, Portugal.

Stankovic, V., Bloomfield, R. E., Bishop, P. G. and Gashi, I. (2011). Diversity for Security: a Study with Off-The-Shelf AntiVirus Engines. Paper presented at the 21st International Symposium on Software Reliability Engineering (ISSRE 2011), Hiroshima, Japan.

Stankovic, V., Lin, S., Pareaud, T., Robert, T. and Zutautaite-Seputiene, I. (2008). Toward Adaptable Software Architecture for Dependability: ASAP. Paper presented at the 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.

Stankovic, V. and Popov, P. T. (2006). Improving DBMS performance through diverse redundancy. SRDS 2006: 25th IEEE Symposium on Reliable Distributed Systems, Proceedings, pp. 391-400. ISSN 1060-9857

Strigini, L. (2004). Formalism and judgement in assurance cases. Paper presented at the Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities, held at International Conference on Dependable Systems and Networks (DSN 2004), Jun 2004, Florence, Italy.

Strigini, L., Bloomfield, R. E., Paulitsch, M. and Reiger, R. (2012). Evidence-Based Security in Aerospace. From Safety to Security and Back Again. Paper presented at the 23rd International Symposium on Software Reliability Engineering (ISSRE 2012), Fast Abstracts Track, 26 - 29 Nov 2012, Dallas, Texas, USA.

Strigini, L., Bosio, D., Littlewood, B. and Newby, M. J. (2002). Advantages of open source processes for reliability: clarifying the issues. Paper presented at the Workshop on Open Source Software Development, Feb 2002, Newcastle upon Tyne, UK.

Strigini, L., Delic, K. A. and Mazzanti, F. (1998). Formalising Engineering Judgement on Software Dependability via Belief Networks. Paper presented at the Sixth IFIP International Working Conference "Can We Rely on Computers?", Mar 1997, Garmisch-Partenkirchen, Germany.

Strigini, L. and Fenton, N. (1996). Rigorously assessing software reliability and safety. European Space Agency, (Special Publication) ESA SP(377), pp. 193-198. ISSN 0379-6566

Strigini, L., Popov, P. T. and Littlewood, B. (2000). Assessing the Reliability of Diverse Fault-Tolerant Systems. Paper presented at the INucE International Conference on Control and Instrumentation in Nuclear Installations, Bristol, UK.

Strigini, L., Popov, P. T. and Romanovsky, A. (2000). Diversity for off-the-shelf components. Paper presented at the International Conference on Dependable Systems & Networks (FTCS-30, DCCA-8), New York, NY, USA.

Strigini, L. and Povyakalo, A. A. (2013). Software fault-freeness and reliability predictions. In: Bitsch, F., Guiochet, J. and Kaaniche, M. (Eds.), Computer Safety, Reliability, and Security. SAFECOMP 2013. (pp. 106-117). Cham: Springer. ISBN 978-3-642-40792-5

Strigini, L., Povyakalo, A. A. and Alberdi, E. (2003). Human-machine diversity in the use of computerised advisory systems: a case study. Paper presented at the International Conference on Dependable Systems and Networks (DSN'03), 22 - 25 Jun 2003, San Francisco, California.

Stroud, R. and Gashi, I. (2012). Methodology for a security audit of ERTMS. Paper presented at the 42nd IEEE International Conference on Dependable Systems and Networks (DSN) 2012, 25 - 28 June 2012, Boston, USA.

Tselikis, C., Douligeris, C., Mitropoulos, S. and Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. Paper presented at the IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.

Tselikis, C., Mitropoulos, S., Douligeris, C., Ladis, E., Georgouleas, K., Vangelatos, C. and Komninos, N. (2009). Empirical study of clustering algorithms for wireless ad hoc networks. Paper presented at the 16th International Conference on Systems, Signals and Image Processing (IWSSIP 2009), 18 - 20 June 2009, Chalkida, Greece.

Ul Asad, H., Jones, K. and Surre, F. (2014). Verifying robust frequency domain properties of non linear oscillators using SMT. Paper presented at the 17th Symposium on Design & Diagnostics of Electronic Circuits & Systems, 23rd - 25th April 2014, Warsaw, Poland.

Zhao, X., Littlewood, B., Povyakalo, A. A. and Wright, D. (2015). Conservative Claims about the Probability of Perfection of Software-based Systems. Paper presented at the The 26th IEEE International Symposium on Software Reliability Engineering, 02-11-2015 - 05-11-2015, Washington DC, USA.

Zhao, X., Robu, V., Flynn, D., Salako, K. and Strigini, L. (2019). Assessing the Safety and Reliability of Autonomous Vehicles from Road Testing. Paper presented at the ISSRE 2019 - the 20th International Symposium on Software Reliability Engineering, 28 - 31 October 2019, Berlin, Germany.

Book

Jones, C. B., Jones, K., Lindsay, P. A. and Moore, R. (1990). Mural: A formal development support system. London: Springer-Verlag.

Thesis

Salako, K. (2012). Extension to models of coincident failure in multiversion software. (Unpublished Doctoral thesis, City University London)

Stankovic, V. (2008). Performance Implications of Using Diverse Redundancy for Database Replication. (Unpublished Doctoral thesis, City, University of London)

Zhao, X. (2016). On the probability of perfection of Software-Based systems. (Unpublished Doctoral thesis, School of Mathematics, Computer Science & Engineering)

van der Meulen, M. (2008). The Effectiveness of Software Diversity. (Unpublished Doctoral thesis, City University London)

Report

Bishop, P. G., Bloomfield, R. E., Gashi, I. and Stankovic, V. (2012). Diverse protection systems for improving security: a study with AntiVirus engines. London, UK: City University London.

Bloomfield, R. E., Chozos, N., Popov, P. T., Stankovic, V., Wright, D. and Howell-Morris, R. (2010). Preliminary Interdependency Analysis (PIA): Method and tool support (D/501/12102/2 v2.0). London: Adelard LLP and City University London.

Bloomfield, R. E. and Wetherilt, A. (2012). Computer trading and systemic risk: a nuclear perspective (Driver Review DR26). London, UK: Government Office for Science.

Fenton, N., Littlewood, B., Neil, M., Strigini, L., Wright, D. R. and Courtois, P.-J. (1997). Bayesian belief network model for the safety assessment of nuclear computer-based systems (52). Brussels: DeVa ESPRIT Long Term Research Project.

Littlewood, B., Bainbridge, I. and Bloomfield, R. E. (1998). The use of computers in safety-critical applications. London, UK: Health and Safety Commission.

Littlewood, B. and Povyakalo, A. A. (2012). Conservative bounds for the pfd of a 1-out-of-2 software-based system based on an assessor’s subjective probability of "not worse than independence" (CSR Technical Report, 20 May 2012). London: Centre for Software Reliability, City University London.

Littlewood, B. and Povyakalo, A. A. (2012). Conservative reasoning about epistemic uncertainty for the probability of failure on demand of a 1-out-of-2 software-based system in which one channel is "possibly perfect" (CSR Technical Report 20 March 2012). London: Centre for Software Reliability, City University London.

Littlewood, B., Strigini, L., Wright, D. and Courtois, P.-J. (1998). Examination of Bayesian belief network for safety assessment of nuclear computer-based systems (70). Brussels: DeVa ESPRIT Long Term Research Project.

Littlewood, B. and Wright, D. (1996). Reliability prediction of a software product using testing data from other products or execution environment (10). Brussels: DeVa Project.

Littlewood, B. and Wright, D. (1996). Some conservative stopping rules for the operational testing of saftey-critical software (33). Brussels: DeVa ESPRIT Long Term Research Project.

Stankovic, V. and Strigini, L. (2009). A survey on online monitoring approaches of computer-based systems. London, UK: Centre for Software Reliability, City University London.

Strigini, L. (1996). Engineering judgement in reliability and safety and its limits: what can we learn from research in psychology?. .

Wright, D. and Strigini, L. (2013). Bounds on survival probability given mean probability of failure per demand; and the paradoxical advantages of uncertainty. London: City University London.

Software

Popov, P. T. (2015). A SAN model for safety and security analysis of the eMotor, an ASIL-D device

Salako, K., Stankovic, V. and Popov, P. T. (2015). Stochastic model for performance evaluation of database replication protocols

This list was generated on Fri Oct 25 04:30:34 2019 UTC.