City Research Online

Items where Subject is "QA76 Computer software"

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Authors | Publication Type
Number of items at this level: 236.

Article

Andrienko, G., Andrienko, N., Chen, W., Maciejewski, R. and Zhao, Y. (2017). Visual Analytics of Mobility and Transportation: State of the Art and Further Research Directions. IEEE Transactions on Intelligent Transportation Systems, PP(99), doi: 10.1109/TITS.2017.2683539

Arunkumar, S., Soyluoglu, B., Sensoy, M., Srivatsa, M. and Rajarajan, M. (2017). Location attestation and access control for mobile devices using GeoXACML. Journal of Network and Computer Applications, 80, pp. 181-188. doi: 10.1016/j.jnca.2016.11.028

Aversa, P. ORCID: 0000-0003-3175-9477, Hervas-Drane, A. and Evenou, M. (2019). Business model responses to digital piracy. California Management Review, 61(2), pp. 30-58. doi: 10.1177/0008125618818841

Bayer, J., Flege, O. and Gacek, C. (2000). Creating product line architectures. Lecture Notes in Computer Science, 1951, pp. 210-216. doi: 10.1007/978-3-540-44542-5_23

Bertolino, A. and Strigini, L. (1998). Assessing the Risk due to Software Faults: Estimates of Failure Rate versus Evidence of Perfection.. Software Testing, Verification and Reliability, 8(3), pp. 155-166. doi: 10.1002/(SICI)1099-1689(1998090)8:3<155::AID-STVR163>3.0.CO;2-B

Bertolino, A. and Strigini, L. (1996). On the use of testability measures for dependability assessment. IEEE Transactions on Software Engineering, 22(2), pp. 97-108. doi: 10.1109/32.485220

Bishop, P. G. (2005). SILS and Software. Safety-Critical Systems Club Newsletter, 14(2),

Bishop, P. G., Bloomfield, R. E., Littlewood, B., Povyakalo, A. A. and Wright, D. (2011). Toward a Formalism for Conservative Claims about the Dependability of Software-Based Systems. IEEE Transactions on Software Engineering, 37(5), pp. 708-717. doi: 10.1109/TSE.2010.67

Blandford, A., Adams, A., Attfield, S., Buchanan, G., Gow, J., Makri, S., Rimmer, J. and Warwick, C. (2008). The PRET A Rapporter framework: Evaluating digital libraries from the perspective of information work. Information Processing & Management, 44(1), pp. 4-21. doi: 10.1016/j.ipm.2007.01.021

Blandford, A., Green, T. R. G., Furniss, D. and Makri, S. (2008). Evaluating system utility and conceptual fit using CASSM. International Journal of Human-Computer Studies, 66(6), pp. 393-409. doi: 10.1016/j.ijhcs.2007.11.005

Booth, T. and Stumpf, S. (2013). End-user experiences of visual and textual programming environments for Arduino. Lecture Notes in Computer Science, 7897 L, pp. 25-39. doi: 10.1007/978-3-642-38706-7_4

Chen, T. and Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), pp. 91-93. doi: 10.1109/MC.2011.115

Das, S., Moore, T., Wong, W-K, Stumpf, S., Oberst, I., McIntosh, K. and Burnett, M. (2013). End-user feature labeling: Supervised and semi-supervised approaches based on locally-weighted logistic regression. Artificial Intelligence, 204, pp. 56-74. doi: 10.1016/j.artint.2013.08.003

Dyson, J., Marsh, C., Jackson, N., Richardson, D., Faisal, M., Scally, A. J. and Mohammed, M. (2019). Understanding and applying practitioner and patient views on the implementation of a novel automated Computer-Aided Risk Score (CARS) predicting the risk of death following emergency medical admission to hospital: qualitative study. BMJ Open, 9(4), e026591. doi: 10.1136/bmjopen-2018-026591

Egyed, A., Medvidovic, N. and Gacek, C. (2000). Component-based perspective on software mismatch detection and resolution. IEE Proceedings: Software, 147(6), pp. 225-236. doi: 10.1049/ip-sen:20000915

Evans, L. and Saker, M. ORCID: 0000-0002-7414-2840 (2019). The Playeur and Pokémon Go: Examining the effects of locative play on spatiality and sociability. Mobile Media & Communication, 7(2), pp. 232-247. doi: 10.1177/2050157918798866

Faisal, M., Scally, A. J., Jackson, N., Richardson, D., Beatson, K., Howes, R., Speed, K., Menon, M., Daws, J., Dyson, J., Marsh, C. and Mohammed, M. A. (2018). Development and validation of a novel computer-aided score to predict the risk of in-hospital mortality for acutely ill medical admissions in two acute hospitals using their first electronically recorded blood test results and vital signs: a cross-sectional study. BMJ Open, 8(12), doi: 10.1136/bmjopen-2018-022939

Garcia, M., Bessani, A. N., Gashi, I., Neves, N. and Obelheiro, R. R. (2013). Analysis of operating system diversity for intrusion tolerance. Software: Practice and Experience, doi: 10.1002/spe.2180

Gashi, I., Popov, P. T. and Stankovic, V. (2009). Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach. Information and Software Technology, 51(2), pp. 497-511. doi: 10.1016/j.infsof.2008.06.003

Gashi, I., Popov, P. T., Stankovic, V. and Strigini, L. (2004). On designing dependable services with diverse off-the-shelf SQL servers. Lecture Notes in Computer Science, 3069, pp. 191-214. doi: 10.1007/978-3-540-25939-8_9

Gashi, I., Popov, P. T. and Strigini, L. (2007). Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers. IEEE Transactions on Dependable and Secure Computing, 4(4), pp. 280-294. doi: 10.1109/TDSC.2007.70208

Hall, K. W., Perin, C., Kusalik, P. G., Gutwin, C. and Carpendale, S. (2016). Formalizing Emphasis in Information Visualization. Computer Graphics Forum, 35(3), pp. 717-737. doi: 10.1111/cgf.12936

Idrees, F., Rajarajan, M., Conti, M., Chen, T. and Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011

Jones, K., Kim, J. and Horowitz, M. (2010). Fast, non-monte-carlo estimation of transient performance variation due to device mismatch. IEEE Transactions on Circuits and Systems, 57(7), pp. 1746-1755. doi: 10.1109/TCSI.2009.2035418

Jones, P. R. ORCID: 0000-0001-7672-8397 (2018). Myex: A MATLAB interface for the Tobii Eyex eye-tracker. Journal of Open Research Software, 6(1), .16. doi: 10.5334/jors.196

Jones, P. R. ORCID: 0000-0001-7672-8397 (2018). QuestPlus: A MATLAB Implementation of the QUEST+ adaptive Psychometric Method. Journal of Open Research Software, 6(27), doi: 10.5334/jors.195

Kharchenko, V. S., Popov, P. T., Odarushchenko, O. and Zhadan, V. (2012). Empirical evaluation of accuracy of mathematical software used for availability assessment of fault-tolerant computer systems. Reliability: Theory & Applications,

Kloukinas, C. and Ozkaya, M. (2012). Xcd - Modular, Realizable Software Architectures. Lecture Notes in Computer Science: Formal Aspects of Component Software, 7684, pp. 152-169. doi: 10.1007/978-3-642-35861-6_10

Komninos, N. and Dimitriou, T. (2007). Protecting biometric templates with image watermarking techniques. Advances in Biometrics: Lecture Notes in Computer Science, 4642, pp. 114-123. doi: 10.1007/978-3-540-74549-5_13

Komninos, N. and Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7(1), pp. 171-182. doi: 10.1016/j.adhoc.2008.01.001

Komninos, N. and Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications(545), pp. 25-28.

Komninos, N. and Mantas, G. (2011). PEA: Polymorphic Encryption Algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3(1), pp. 1-18. doi: 10.1504/IJSCC.2011.039222

Komninos, N., Vergados, D. and Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5, pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005

Komninos, N., Vergados, D. and Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25(2), pp. 121-130. doi: 10.1016/j.cose.2005.09.005

Komninos, N., Vergados, D. D. and Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011

Komninos, N., Vergados, D. D. and Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. International Journal of Communication Systems, 20(12), pp. 1391-1406. doi: 10.1002/dac.882

Komninos, N., Vergados, D. D. and Douligeris, C. (2007). A two‐step authentication framework for Mobile ad hoc networks. China Communications Journal, 4(1), pp. 28-39.

Kotti, M, Benetos, E., Kotropoulos, C. and Pitas, I (2007). A neural network approach to audio-assisted movie dialogue detection. Neurocomputing, 71(1-3), pp. 157-166. doi: 10.1016/j.neucom.2007.08.006

Lichtenstein, Y., Dujmovic, S. and Baden-Fuller, C. ORCID: 0000-0002-0230-1144 (2018). Strategies for Competing in the Automotive Industry’s Software Ecosystem: Standards and Bottlenecks. IEEE Software, doi: 10.1109/MS.2018.290105946

Littlewood, B. (2008). Comments on "Multi-objective genetic algorithm for solving N-version program design problem". Reliability Engineering & System Safety, 93(8), p. 1287. doi: 10.1016/j.ress.2007.06.005

Littlewood, B. (2006). Comments on 'Evolutionary neural network modelling for software cumulative failure time prediction' by Liang Tian and Afzel Noore [Reliability Engineering and System Safety 87 (2005) 45-51]. Reliability Engineering & System Safety, 91(4), pp. 485-486. doi: 10.1016/j.ress.2005.02.001

Littlewood, B. (1996). The impact of diversity upon common mode failures. Reliability Engineering & System Safety, 51(1), pp. 101-113. doi: 10.1016/0951-8320(95)00120-4

Littlewood, B. (2000). The use of proofs in diversity arguments. IEEE Transactions on Software Engineering, 26(10), pp. 1022-1023. doi: 10.1109/32.879822

Littlewood, B., Brocklehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J. and Gollmann, D. (1993). Towards operational measures of computer security. Journal of Computer Security, 2(3), pp. 211-229.

Littlewood, B., Popov, P. T. and Strigini, L. (2002). Assessing the reliability of diverse fault-tolerant software-based systems. Safety Science, 40(9), pp. 781-796.

Littlewood, B., Popov, P. T. and Strigini, L. (1999). A note on reliability estimation of functionally diverse systems. Reliability Engineering & System Safety, 66(1), pp. 93-95. doi: 10.1016/S0951-8320(99)00014-9

Littlewood, B., Popov, P. T., Strigini, L. and Shryane, N. (2000). Modeling the effects of combining diverse software fault detection techniques. IEEE Transactions on Software Engineering, 26(12), pp. 1157-1167. doi: 10.1109/32.888629

Littlewood, B. and Povyakalo, A. A. (2013). Conservative bounds for the pfd of a 1-out-of-2 software-based system based on an assessor’s subjective probability of “not worse than independence”. IEEE Transactions on Software Engineering, 39(12), pp. 1641-1653. doi: 10.1109/TSE.2013.31

Littlewood, B. and Povyakalo, A. A. (2013). Conservative reasoning about epistemic uncertainty for the probability of failure on demand of a 1-out-of-2 software-based system in which one channel is “possibly perfect”. IEEE Transactions on Software Engineering, 39(11), pp. 1521-1530. doi: 10.1109/TSE.2013.35

Littlewood, B. and Rushby, J. (2011). Reasoning about the Reliability of Diverse Two-Channel Systems in which One Channel is "Possibly Perfect". IEEE Transactions on Software Engineering, doi: 10.1109/TSE.2011.80

Littlewood, B. and Strigini, L. (1993). Validation of Ultrahigh Dependability for Software-Based Systems. Communications of the ACM (CACM), 36(11), pp. 69-80. doi: 10.1145/163359.163373

Littlewood, B. and Wright, D. (1997). Some conservative stopping rules for the operational testing of safety-critical software. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 23(11), pp. 673-683. doi: 10.1109/32.637384

Littlewood, B. and Wright, D. (2007). The use of multilegged arguments to increase confidence in safety claims for software-based systems: A study based on a BBN analysis of an idealized example. IEEE Transactions on Software Engineering, 33(5), pp. 347-365. doi: 10.1109/TSE.2007.1002

Lobachova, K. I. and Kharchenko, V. S. (2007). Assessing Software Vulnerabilities and Recovery Time Using Open Resources: Elements Of Technique And Results. Radioelectronic and Computer Systems, 8(27), pp. 61-65.

Mantas, G., Lymberopoulos, D. and Komninos, N. (2010). A new framework for ubiquitous context-aware healthcare applications. Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB, pp. 1-4. doi: 10.1109/ITAB.2010.5687758

Michalas, A., Dimitriou, T., Giannetsos, T., Komninos, N. and Prasad, N. R. (2012). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wireless Personal Communications, 66(3), pp. 559-575. doi: 10.1007/s11277-012-0734-z

Michalas, A., Komninos, N. and Prasad, N. R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, doi: 10.1109/WIRELESSVITAE.2011.5940931

Michalas, A., Komninos, N., Prasad, N. R. and Oleshchuk, V. A. (2010). New client puzzle approach for DoS resistance in ad hoc networks. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp. 568-573. doi: 10.1109/ICITIS.2010.5689528

Mitrokotsa, A., Komninos, N. and Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10, pp. 93-106.

Mohavedi, Y., Cukier, M. and Gashi, I. ORCID: 0000-0002-8017-3184 (2019). Vulnerability Prediction Capability: A Comparison between Vulnerability Discovery Models and Neural Network Models. Computers and Security, doi: 10.1016/j.cose.2019.101596

Movahedi, Y., Cukier, M., Andongabo, A. and Gashi, I. ORCID: 0000-0002-8017-3184 (2018). Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers. Computing, doi: 10.1007/s00607-018-0663-0

Nandhakumar, J., Panourgias, N.S. and Scarbrough, H. (2013). From knowing it to "getting it": Envisioning practices in computer games development. Information Systems Research, 24(4), pp. 933-955. doi: 10.1287/isre.2013.0482

Pimperton, H., Kyle, F. E. ORCID: 0000-0003-2997-3167, Hulme, C., Harris, M., Beedie, I., Ralph-Lewis, A., Worster, E., Rees, R., Donlan, C. and MacSweeney, M. (2019). Computerised speechreading training for deaf children: A randomised controlled trial. Journal of Speech, Language, and Hearing Research, 62(8), pp. 2882-2894. doi: 10.1044/2019_JSLHR-H-19-0073

Popov, P. T., Strigini, L., Riddle, S. and Romanovsky, A. (2001). On Systematic Design of Protectors for Employing OTS Items. Euromicro Conference, 2001. Proceedings. 27th, 2001, pp. 22-29. doi: 10.1109/EURMIC.2001.952434

Power, C., Cairns, P., Denisova, A. ORCID: 0000-0002-1497-5808, Papaioannou, T. and Gultroma, R. (2018). Lost at the Edge of Uncertainty: Measuring Player Uncertainty in Digital Games. International Journal of Human-Computer Interaction, doi: 10.1080/10447318.2018.1507161

Reimers, S. and Stewart, N. (2014). Presentation and response timing accuracy in Adobe Flash and HTML5/JavaScript Web experiments. Behavior Research Methods, doi: 10.3758/s13428-014-0471-1

Robinson, L. (1998). Using Word 97 to create documents for an intranet. Managing Information, 5(4), pp. 30-33.

Sabouri, A., Komninos, N. and Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, pp. 422-427. doi: 10.1109/CTS.2011.5898962

Saker, M. ORCID: 0000-0002-7414-2840 and Frith, J. (2018). Locative Media and Sociability:Using Location-Based Social Networks to Coordinate Everyday Life. Architecture_MPS, 14(1), doi: 10.14324/111.444.amps.2018v14i1.001

Salako, K. and Strigini, L. (2013). When does "diversity" in development reduce common failures? Insights from probabilistic modelling. IEEE Transactions on Dependable and Secure Computing, 11(2), pp. 193-206. doi: 10.1109/TDSC.2013.32

Schmid, K. and Gacek, C. (2000). Implementation issues in product line scoping. Lecture notes in computer science, 1844, pp. 38-82. doi: 10.1007/978-3-540-44995-9_11

Slingsby, A., Beecham, R. and Wood, J. (2013). Visual analysis of social networks in space and time using smartphone logs. Pervasive and Mobile Computing, 9(6), pp. 848-864. doi: 10.1016/j.pmcj.2013.07.002

Ueberall, C., Koehnen, C., Rakocevic, V., Jaeger, R., Hoy, E. and Rajarajan, M. (2013). Recommendations in a heterogeneous service environment. Multimedia Tools and Applications, 62(3), pp. 785-820. doi: 10.1007/s11042-011-0874-2

de Lemos, R., Gacek, C. and Romanovsky, A. (2003). Architectural mismatch tolerance. Lecture Notes in Computer Science, 2677, pp. 175-194. doi: 10.1007/3-540-45177-3_8

van der Meulen, M., Riddle, S., Strigini, L. and Jefferson, N. (2005). Protective wrapping of off-the-shelf components. COTS-based Software Systems, 3412, pp. 168-177. doi: 10.1007/978-3-540-30587-3_27

van der Meulen, M., Strigini, L. and Revilla, M. A. (2005). On the effectiveness of run-time checks. Computer Safety, Reliability and Security, 3688, pp. 151-164. doi: 10.1007/11563228_12

Šoltészová, V., Turkay, C., Price, M. C. and Viola, I. (2012). A perceptual-statistics shading model. IEEE Transactions on Visualization and Computer Graphics, 18(12), pp. 2265-2274. doi: 10.1109/TVCG.2012.188

Book Section

Andrienko, G. ORCID: 0000-0002-8574-6295 and Andrienko, N. ORCID: 0000-0003-3313-1560 (2018). Creating maps of artificial spaces to explore trajectories. In: Proceedings of the Workshop on Advanced Visual Interfaces AVI. . NY, USA: ACM. ISBN 9781450356169

Bayer, J., Gacek, C., Muthig, D. and Widen, T. (2000). PuLSE-I: Deriving instances from a product line infrastructure. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop. (pp. 237-245). London, UK: IEEE Computer Society. ISBN 0-7695-0604-6

Bishop, P. G. and Bloomfield, R. E. (1998). A Methodology for Safety Case Development. In: Redmill, F. and Anderson, T. (Eds.), Industrial Perspectives of Safety-critical Systems: Proceedings of the Sixth Safety-critical Systems Symposium, Birmingham 1998. . London, UK: Springer. ISBN 3540761896

Bishop, P. G. and Bloomfield, R. E. (1995). The SHIP Safety Case. In: Safecomp '95 : The 14th International Conference on Computer Safety, Reliability and Security. . London, UK: Springer. ISBN 3540199624

Bishop, P. G. and Bloomfield, R. E. (2002). Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects. In: Software Reliability Engineering, 2002. ISSRE 2003. Proceedings. 13th International Symposium on. (pp. 295-303). IEEE.

Bishop, P. G., Penny, J., Eaton, A. and Bloomfield, R. E. (2001). The Practicalities of Goal-Based Safety Regulation. In: Redmill, F. and Anderson, T. (Eds.), Aspects of Safety Management: Proceedings of the Ninth Safety-critical Systems Symposium, Bristol, UK 2001. (pp. 35-48). London; New York: Springer. ISBN 1852334118

Bishop, P. G., Tourlas, K. and Chozos, N. (2010). An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems. In: Schoitsch, E. (Ed.), Computer safety, reliability, and security. Lecture Notes in Computer Science, 6351. (pp. 375-388). London, UK: Springer.

Botros, F., Perin, C., Aseniero, B.A. and Carpendale, S. (2016). Go and grow: Mapping personal data to a living plant. In: AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces. (pp. 112-119). New York, NY, United States: ACM. ISBN 978-1-4503-4131-8

Cecchinato, M.E., Cox, A. L. and Bird, J. (2015). Working 9-5? Professional differences in email and boundary management practices. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. (pp. 3989-3998). New York, NY, United States: ACM. ISBN 9781450331456

Collins, E. I. M., Cox, A. L., Bird, J. and Harrison, D. (2014). Social networking use and RescueTime: The issue of engagement. In: UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (pp. 687-690). New York, NY, United States: Association for Computing Machinery (ACM). ISBN 978-1-4503-3047-3

Cox, A. L., Bird, J., Mauthner, N., Dray, S., Peters, A. and Collins, E. (2014). Socio-Technical Practices and Work-Home Boundaries. In: Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services. (pp. 581-584). New York, USA: ACM. ISBN 978-1-4503-3004-6

Glover, I. (2012). SCOF: A Standardised, Customisable Online Feedback Tool. In: Amiel, T. and Wilson, B. (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2012. (pp. 1805-1812). EdITLib. ISBN 1880094959

Harrison, D., Marshall, P., Berthouze, N. and Bird, J. (2014). Tracking physical activity: Problems related to running longitudinal studies with commercial devices. In: UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (pp. 699-702). New York, NY, United States: Association for Computing Machinery (ACM). ISBN 9781450330473

Howe, J. M. and King, A. (2010). A pearl on SAT solving in Prolog. In: International Symposium on Functional and Logic Programming, pages 165-174. Lecture Notes in Computer Science (6009). . Springer.

Lambert, A., Weyde, T. and Armstrong, N. (2015). Perceiving and predicting expressive rhythm with recurrent neural networks. In: Proceedings of the 12th International Conference in Sound and Music Computing. . Maynooth, Ireland: SMC15. ISBN 9780992746629

Littlewood, B. (1996). Evaluation of software dependability. In: Wand, I. C. and Milner, R. (Eds.), Computing Tomorrow: Future Research Directions in Computer Science. (pp. 198-216). New York, USA: Cambridge University Press. ISBN 9780521460859

Littlewood, B. and Strigini, L. (2000). Software reliability and dependability: a roadmap. In: Finkelstein, A (Ed.), The Future of Software Engineering. State of the Art Reports given at the 22nd Int. Conf. on Software Engineering. (pp. 177-188). ACM Press. ISBN 1581132530

Loumakis, F., Stumpf, S. and Grayson, D. (2011). This image smells good: Effects of image information scent in search engine results pages. In: Proceedings of the 20th ACM international conference on Information and knowledge management. (pp. 475-484). New York: ACM. ISBN 9781450307178

Maiden, N., Zachos, K., Lockerbie, J., Hoddy, S. and Camargo, K. (2017). Establishing Digital Creativity Support in Non-Creative Work Environments. In: Proceedings of the 11th ACM Creativity and Cognition Conference. (pp. 222-231). New York, USA: ACM. ISBN 978-1-4503-4403-6

Maiden, N., Zachos, K., Lockerbie, J., Levis, S., Camargo, K., Hoddy, S. and Allemandi, G. (2017). Evaluating Digital Creativity Support To Improve Health-and-Safety in a Manufacturing Plant. In: Proceedings of the ACM Conference on Human Factors in Computing Systems. (pp. 7005-7014). New York, NY, United States: ACM. ISBN 978-1-4503-4655-9

Perin, C. and Dragicevic, P. (2014). Manipulating multiple sliders by crossing. In: Proceedings of the 26th Conference on l'Interaction Homme-Machine. (pp. 48-54). ACM. ISBN 9781450329354

Perin, C., Vernier, F. and Fekete, J. (2013). Interactive horizon graphs: Improving the compact visualization of multiple time series. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). (pp. 3217-3226). New York, NY, United States: ACM. ISBN 9781450318990

Porlezza, C. ORCID: 0000-0002-1400-5879 (2019). Data journalism and the ethics of open source. In: Daly, A., Devitt, S. K. and Mann, M. (Eds.), Good Data. Theory on Demand, 29. (pp. 189-201). Amsterdam: Institute of Network Cultures. ISBN 978-94-92302-27-4

Roper, A. ORCID: 0000-0001-6950-6294 Computer-aided rehabilitation. In: Damico, J. S. and Ball, M. J. (Eds.), The SAGE Encyclopedia of Human Communication Sciences and Disorders. (pp. 456-460). Thousand Oaks, California: SAGE. ISBN 9781483380834

Sadeghi, J., Perin, C., Flemisch, T., Hancock, M. and Carpendale, S. (2016). Flexible trees: Sketching tree layouts. In: AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces. (pp. 84-87). New York, USA: ACM. ISBN 9781450341318

Strigini, L. (2012). Fault tolerance and resilience: meanings, measures and assessment. In: Wolter, K., Avritzer, A., Vieira, M. and van Moorsel, A. (Eds.), Resilience Assessment and Evaluation of Computing Systems. . Berlin, Germany: Springer.

Strigini, L. and Bertolino, A. (1996). Acceptance Criteria for Critical Software Based on Testability Estimates and Test Results. In: Lecture notes in computer science. (pp. 83-94). Springer.

de Rooij, A., Corr, P. J. and Jones, S. (2017). Creativity and Emotion: Enhancing Creative Thinking by the Manipulation of Computational Feedback to Determine Emotional Intensity. In: Proceedings of the 2017 ACM SIGCHI Conference on Creativity and Cognition. (pp. 148-157). New York, NY, United States: ACM. ISBN 978-1-4503-4403-6

Monograph

Gashi, I. and Bloomfield, R. E. (2008). Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems. Centre for Software Reliability, City University London.

Conference or Workshop Item

Abd Rahman, M. H., Nordin, A. I. and Denisova, A. ORCID: 0000-0002-1497-5808 (2017). The effect of time manipulation on immersion in digital games. In: Badioze Zaman, H., Robinson, P., Smeaton, A. F., Shih, T. K. and Velastin, S. (Eds.), Advances in Visual Informatics. IVIC 2017. Lecture Notes in Computer Science. (pp. 544-551). Cham: UNSPECIFIED. ISBN 978-3-319-70009-0

Adamsky, F., Khayam, S. A., Jager, R. and Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China.

Algaith, A., Nunes, P., Fonseca, J., Gashi, I. ORCID: 0000-0002-8017-3184 and Viera, M. (2018). Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools. In: 2018 14th European Dependable Computing Conference (EDCC). (pp. 57-64). IEEE. ISBN 978-1-5386-8060-5

Benetos, E. and Dixon, S. (2011). Polyphonic music transcription using note onset and offset detection. Paper presented at the 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 22 - 27 May 2011, Prague, Czech Republic.

Benetos, E., Kotti, M. and Kotropoulos, C. (2006). Applying supervised classifiers based on non-negative matrix factorization to musical instrument classification. Paper presented at the IEEE International Conference on Multimedia and Expo (ICME 2006), 9 - 12 July 2006, Toronto, Canada.

Benetos, E., Kotti, M. and Kotropoulos, C. (2006). Musical instrument classification using non-negative matrix factorization algorithms and subset feature selection. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 5, pp. 221-224. ISSN 1520-6149

Bessani, A. N., Reiser, H. P., Sousa, P., Gashi, I., Stankovic, V., Distler, T., Kapitza, R., Daidone, A. and Obelheiro, R. R. (2008). FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. Paper presented at the ACM/IFIP/USENIX Middleware '08 Conference.

Bishop, P. G. (2013). Does software have to be ultra reliable in safety critical systems?. Paper presented at the SAFECOMP 2013, 32nd International Conference on Computer Safety, Reliability and Security, 24 - 27 September 2013, Toulouse, France.

Bishop, P. G. (2002). Estimating Residual Faults from Code Coverage. Paper presented at the SAFECOMP 2002, 10 - 13 Sept 2002, Catania, Italy.

Bishop, P. G. (2003). MC/DC based estimation and detection of residual faults in PLC logic networks. Paper presented at the 14th IEEE International Symposium on Software Reliability Engineering ISSRE 2003, 17 - 20 Nov 2003, Denver, Colorado.

Bishop, P. G. (1997). Using reversible computing to achieve fail-safety. Paper presented at the Eighth International Symposium On Software Reliability Engineering, 2 - 5 Nov 1997, Albuquerque, NM , USA.

Bishop, P. G. and Bloomfield, R. E. (2003). Using a Log-normal Failure Rate Distribution for Worst Case Bound Reliability Prediction. Paper presented at the 14th IEEE International Symposium on Software Reliability Engineering (ISSRE 2003), 17 - 20 Nov 2003, Denver, Colorado.

Bishop, P. G., Bloomfield, R. E. and Cyra, L. (2013). Combining Testing and Proof to Gain High Assurance in Software: a Case Study. Paper presented at the IEEE International Symposium on Software Reliability Engineering (ISSRE 2013), 4 - 7 Nov 2013, Pasadena, CA, USA.

Bishop, P. G., Burns, G. and Anderson, S. O. (1993). Stepwise Development and Verification of a Boiler System Specification. Paper presented at the International Workshop on the Design and Review of Software Controlled Safety-related Systems, 28 - 29 Jun 1993, National Research Council, Ottawa, Canada.

Bishop, P. G. and Cyra, L. (2012). Overcoming non-determinism in testing smart devices: how to build models of device behaviour. Paper presented at the 11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliability Conference 2012 (PSAM11 & ESREL 2012), 25 - 29 June 2012, Helsinki, Finland.

Bishop, P. G., Gashi, I., Littlewood, B. and Wright, D. (2007). Reliability modeling of a 1-out-of-2 system: Research with diverse Off-the-shelf SQL database servers. Paper presented at the The 18th IEEE International Symposium on Software Reliability (ISSRE '07), 5 - 9 Nov 2007, Trollhättan, Sweden.

Bloomfield, R. E., Gashi, I., Povyakalo, A. A. and Stankovic, V. (2008). Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. Paper presented at the 19th International Symposium on Software Reliability Engineering, 2008, 10 - 14 Nov 2008, Seattle, USA.

Bloomfield, R. E., Littlewood, B. and Wright, D. (2007). Confidence: Its role in dependability cases for risk assessment. 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, pp. 338-346. doi: 10.1109/DSN.2007.29 ISSN 1530-0889

Bloomfield, R. E., Netkachova, K. and Stroud, R. (2013). Security-Informed Safety: If it's not secure, it's not safe. Paper presented at the 5th International Workshop on Software Engineering for Resilient Systems (SERENE 2013), 03rd - 04th October 2013, Kiev, Ukraine.

Bourazeri, A. ORCID: 0000-0002-0258-7648, Pitt, J. and Arnab, S. (2016). Social Mpower: An Educational Game for Energy Efficiency. In: Serious Games, Interaction and Simulation: SGAMES 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (176). (pp. 133-140). Cham: Springer. ISBN 9783319510545

Cukier, M., Gashi, I., Sobesto, B. and Stankovic, V. (2013). Does Malware Detection Improve With Diverse AntiVirus Products? An Empirical Study. Paper presented at the 32nd International Conference on Computer Safety, Reliability and Security (SAFECOMP), 24- - 27 September 2013, Toulouse, France.

Denisova, A. and Cairns, P. (2015). Adaptation in Digital Games: The Effect of Challenge Adjustment on Player Performance and Experience. In: Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. (pp. 97-101). New York: ACM Press. ISBN 9781450334662

Denisova, A. and Cairns, P. (2015). First Person vs. Third Person Perspective in Digital Games: Do Player Preferences Affect Immersion? In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. (pp. 145-148). New York: ACM. ISBN 978-1-4503-3145-6

Denisova, A. and Cairns, P. (2015). The Placebo Effect in Digital Games. In: Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. (pp. 23-33). New York: ACM. ISBN 9781450334662

Denisova, A., Nordin, A. I. and Cairns, P. (2016). The Convergence of Player Experience Questionnaires. In: Proceedings of the 2016 Annual Symposium on Computer-Human Interaction in Play. (pp. 33-37). New York: ACM. ISBN 978-1-4503-4456-2

Einbond, A., Trapani, C., Agostini, A., Ghisi, D. and Schwarz, D. (2014). Fine-tuned Control of Concatenative Synthesis with CATART Using the BACH Library for MAX. Paper presented at the International Computer Music Conference, ICMC 2014, 14-20 September, 2014, Athens, Greece.

Fengou, M. A., Mantas, G., Lymberopoulos, D. and Komninos, N. (2011). Ubiquitous healthcare profile management applying smart card technology. Paper presented at the Second International ICST Conference, MobiHealth 2011, 5 - 7 October 2011, Kos Island, Greece.

Gacek, C. (2004). An interdisciplinary perspective of dependability in Open Source Software. BUILDING THE INFORMATION SOCIETY, 156, pp. 685-691. ISSN 1571-5736

Gacek, C., Arief, B. and Lawrie, T. (2001). Software architectures and Open Source Software: Where can research leverage the most?. Paper presented at the 1st Workshop on Open Source Software Engineering: Making Sense of the Bazaar (part of the 23rd IEEE International Conference on Software Engineering (ICSE 2001)), 15 May 2001, Toronto, Canada.

Gacek, C., Lawrie, T. and Arief, B. (2002). Interdisciplinary insights on Open Source. Paper presented at the Open Source Software Development Workshop, 25 - 26 Feb 2002, Newcastle upon Tyne, UK.

Galliers, J. R., Wilson, S., Muscroft, S., Marshall, J., Roper, A., Cocks, N. and Pring, T. (2011). Accessibility of 3D Game Environments for People with Aphasia: An Exploratory Study. Paper presented at the 13th International ACM SIGACCESS Conference on Computers and Accessibility, 24 - 26 Oct 2011, Dundee, Scotland.

Garcia, M., Bessani, A. N., Gashi, I., Neves, N. and Obelheiro, R. R. (2011). OS diversity for intrusion tolerance: Myth or reality?. Paper presented at the 41st International Conference on Dependable Systems & Networks (DSN), 27 - 30 Jun 2011, Hong Kong.

Gashi, I., Bloomfield, R., Bloomfield, R. E. and Stroud, R. (2012). How secure is ERTMS?. Paper presented at the Workshop on Dependable and Secure Computing for Large-scale Complex Critical Infrastructures (DESEC4LCCI), 25 September 2012, Herrenkrug, Germany.

Gashi, I. and Popov, P. T. (2006). Rephrasing rules for off-the-shelf SQL database servers. Paper presented at the Sixth European Dependable Computing Conference, 2006 (EDCC '06), 18 - 20 Oct 2006, Coimbra, Portugal.

Gashi, I. and Popov, P. T. (2007). Uncertainty explicit assessment of off-the-shelf software: Selection of an optimal diverse pair. Paper presented at the Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, 26 Feb - 2 Mar 2007, Banff, Canada.

Gashi, I., Popov, P. T. and Strigini, L. (2004). Fault diversity among off-the-shelf SQL database servers. Paper presented at the International Conference on Dependable Systems and Networks, 28 Jun - 1 Jul 2004.

Gashi, I., Stankovic, V., Cukier, M. and Sobesto, B. (2012). Diversity with AntiVirus products: Additional empirical studies. Paper presented at the 42nd IEEE International Conference on Dependable Systems and Networks (DSN) 2012, 25 - 28 June 2012, Boston, USA.

Gashi, I., Stankovic, V., Leita, C. and Thonnard, O. (2009). An Experimental Study of Diversity with Off-The-Shelf AntiVirus Engines. Paper presented at the Eighth IEEE International Symposium on Network Computing and Applications, 9 - 11 July 2009, Cambridge, MA, USA.

Georgakakis, E., Komninos, N. and Douligeris, C. (2012). NAVI: Novel authentication with visual information. Paper presented at the IEEE Symposium on Computers and Communications (ISCC), 1 - 4 July 2012, Cappadocia, Turkey.

Karakostas, B. and Katsoulakos, T. (2013). A DSL For Logistics Clouds. Paper presented at the The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, 27 May - 01 June 2013, Valencia, Spain.

Karakostas, B. and Theodoulidis, B. (2013). A MapReduce architecture for web site user behaviour monitoring in real time. Paper presented at the 2nd International Conference on Data Management Technologies and Applications (DATA), 29 - 31 July 2013, Reykjavik, Iceland.

Kardaras, D., Mamakou, X. J. and Karakostas, B. (2013). Fuzzy equivalence relation based clustering and its use to restructuring websites' hyperlinks and web pages. Paper presented at the AIAI 2013 : 9th IFIP International Conference on Artificial Intelligence Applications and Innovations, 30th September - 2nd October 2013, Paphos, Cyprus.

Kharchenko, V. S., Odarushchenko, O., Odarushchenko, V. and Popov, P. T. (2013). Selecting Mathematical Software for Dependability Assessment of Computer Systems Described by Stiff Markov Chains. Paper presented at the 9th International Conference on ICT in Education, Research and Industrial Applications: Integration, Harmonization and Knowledge Transfer, 19-06-2013 - 22-06-2013, Kherson, Ukraine.

Kim, J., Jones, K. and Horowitz, M. (2007). Variable domain transformation for linear PAC analysis of mixed-signal systems. Paper presented at the International Conference on Computer-Aided Design, 2007. ICCAD 2007, 05 - 08 Nov 2007, San Jose, California, USA.

Kloukinas, C. and Issarny, V. (2000). Automating the Composition of Middleware Configurations. Paper presented at the he Fifteenth IEEE International Conference on Automated Software Engineering, 11 - 15 Sep 2000, Grenoble, France.

Kloukinas, C. and Issarny, V. (2001). SPIN-ning Software Architectures: A Method for Exploring Complex Systems. In: UNSPECIFIED (pp. 67-76). IEEE Computer Society. ISBN 0-7695-1360-3

Komninos, N. (2007). Morpheus: stream cipher for software & hardware applications. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N. and Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04 - 08 June 2006, Mykonos, Greece.

Komninos, N. and Honary, B. (2001). Modified WAP for secure voice and video communication. Paper presented at the 2nd IEE International Conference on 3G Mobile Communication Technologies, 26 - 28 March 2001, London.

Komninos, N. and Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.

Komninos, N. and Honary, B. (2002). Security enhancement for A5/1 without losing hardware efficiency in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.

Komninos, N., Honary, B. and Darnell, M. (2000). Secure communication protocol for mobile multimedia applications. Paper presented at the 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC’2000), 12 - 15 November 2000, Bangkok, Thailand.

Komninos, N., Samarakoon, M. I. and Honary, B. (2000). Authentication and key distribution for wired and wireless systems. Paper presented at the 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 19 - 20 June 2000, Liverpool John Moores University, Liverpool, UK.

Komninos, N., Tselikis, C. and Douligeris, C. (2013). SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks. Paper presented at the 18th IEEE Symposium on Computers and Communication (ISCC’13), 07 - 10 July 2013, Croatia.

Kotti, M., Benetos, E. and Kotropoulos, C. (2006). Automatic speaker change detection with the Bayesian information criterion using MPEG-7 features and a fusion scheme. Paper presented at the International Symposium on Circuits and Systems (ISCAS 2006), 21 - 24 May 2006, Island of Kos, Greece.

Kotti, M., Martins, L. P. M., Benetos, E., Cardoso, J. S. and Kotropoulos, C. (2006). Automatic speaker segmentation using multiple features and distance measures: a comparison of three approaches. Paper presented at the IEEE International Conference on Multimedia and Expo (ICME 2006), 9 - 12 July 2006, Toronto, Canada.

Krotsiani, M., Spanoudakis, G. and Mahbub, K. (2013). Incremental certification of cloud services. Paper presented at the SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies, 25th - 31st August 2013, Barcelona, Spain.

Le, B. T., Nadimi, S., Goodey, R.J. ORCID: 0000-0002-9166-8393 and Taylor, R.N. ORCID: 0000-0002-8103-0433 (2018). A study on performance of three-dimensional imaging system for physical models. In: McNamara, A. M. ORCID: 0000-0002-3452-0800, Divall, S. ORCID: 0000-0001-9212-5115, Goodey, R.J. ORCID: 0000-0002-9166-8393, Taylor, N., Stallebrass, S. E. ORCID: 0000-0002-3747-9524 and Panchal, J. P. (Eds.), Physical Modelling in Geotechnics: Proceedings of the 9th International Conference on Physical Modelling in Geotechnics (ICPMG 2018), July 17-20, 2018, London, United Kingdom. (pp. 853-858). Boca Raton: CRC Press/Balkema. ISBN 978113844228

Littlewood, B. (2000). The problems of assessing software reliability ...When you really need to depend on it. Paper presented at the Conference on Lessons in System Safety.

Littlewood, B. and Burns, A. (2010). Reasoning About the Reliability of Multi-version, Diverse Real-Time Systems. Paper presented at the 31st IEEE Real-Time Systems Symposium, 30 November - 03 December 2010, San Diego, USA.

Littlewood, B., Popov, P. T. and Strigini, L. (2001). Design diversity: an update from research on reliability modelling. Paper presented at the 9th Safety-critical Systems Symposium, 2001, Bristol, UK.

Littlewood, B. and Strigini, L. (2004). Redundancy and diversity in security. COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 3193, pp. 423-438. ISSN 0302-9743

Littlewood, B. and Wright, D. (1995). A Bayesian model that combines disparate evidence for the quantitative assessment of system dependability. Paper presented at the 14th International Conference on Computer Safety (SafeComp’95), 11 - 13 October 1995, Belgirate, Italy.

Lugini, L., Marasco, E., Cukic, B. and Gashi, I. (2013). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013), 24 - 27 June 2013, Budapest, Hungary.

Michalas, A., Bakopoulos, M., Komninos, N. and Prasad, N. R. (2012). Secure & trusted communication in emergency situations. Paper presented at the 35th IEEE Sarnoff Symposium (SARNOFF), 21 - 22 May 2012, Newark, USA.

Michalas, A. and Komninos, N. (2014). The Lord of the Sense: A Privacy Preserving Reputation System for Participatory Sensing Applications. Paper presented at the 19th IEEE Symposium on Computers and Communication (ISCC’2014), 23rd - 26th June 2014, Madeira, Portugal.

Michalas, A., Oleshchuk, V. A., Komninos, N. and Prasad, N. R. (2011). Privacy-preserving scheme for mobile ad hoc networks.. Paper presented at the 2011 IEEE Symposium on Computers and Communications (ISCC), 28 June - 1 July 2011, Kerkyra, Greece.

Moschou, V., Kotti, M., Benetos, E. and Kotropoulos, C. (2007). Systematic comparison of BIC-based speaker segmentation systems. Paper presented at the IEEE 9Th International Workshop on Multimedia Signal Processing, 1 - 3 October 2007, Crete, Greece.

Mota, E., Howe, J. M. ORCID: 0000-0001-8013-6941, Schramm, A. and d'Avila Garcez, A. S. (2019). Efficient Predicate Invention using Shared NeMuS. Paper presented at the 14th International Workshop on Neural-Symbolic Learning and Reasoning, 10 - 16 August 2019, Macau, China.

Mourouzis, T., Courtois, N. and Komninos, N. (2014). Advanced truncated differential cryptanalysis of GOST block cipher. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.

Mourouzis, T., Komninos, N. and Christofi, M. (2014). Towards a combined Rotational-Differential Cryptanalytic Framework. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.

O'Sullivan, D., Wilk, S., Michalowski, W. and Farion, K. (2013). Using PICO to Align Medical Evidence with MDs Decision Making Models. Paper presented at the 14th World Congress on Medical and Health Informatics, 20-08-2013 - 23-08-2013, Copenhagen, Denmark.

Ozkaya, M. and Kloukinas, C. (2013). Towards Design-by-Contract based software architecture design. Paper presented at the 2013 IEEE 12th International Conference on Intelligent Software Methodologies, Tools and Techniques (SoMeT), 22nd September - 24 September 2013, Budapest, Hungary.

Panagakis, I., Benetos, E. and Kotropoulos, C. (2008). Music genre classification: a multilinear approach. Paper presented at the International Symposium Music Information Retrieval, 14 - 18 September 2008, Philadelphia, USA.

Pizza, M. and Strigini, L. (1998). Comparing the effectiveness of testing methods in improving programs: the effect of variations in program quality. Paper presented at the The Ninth International Symposium on Software Reliability Engineering, 4 - 7 Nov 1998, Paderborn, Germany.

Popov, P. T. and Littlewood, B. (2004). The effect of testing on reliability of fault-tolerant software. Paper presented at the 2004 International Conference on dependable systems and networks, 28 June - 1 July 2004, Florence, Italy.

Popov, P. T., Salako, K. and Stankovic, V. (2015). Stochastic modeling for performance evaluation of database replication protocols. Lecture Notes in Computer Science, 9259(9259), pp. 21-37. doi: 10.1007/978-3-319-22264-6_2 ISSN 0302-9743

Popov, P. T., Stankovic, V. and Strigini, L. (2012). An Empirical Study of the Effectiveness of 'Forcing Diversity' Based on a Large Population of Diverse Programs. Paper presented at the ISSRE 2012, International Symposium on Software Reliability Engineering, 27 - 30 November 2012, Dallas, Texas, USA.

Popov, P. T. and Strigini, L. (2010). Assessing Asymmetric Fault-Tolerant Software. Paper presented at the Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on, 1 - 4 Nov 2010, San Jose, California.

Popov, P. T. and Strigini, L. (2001). The reliability of diverse systems: a contribution using modelling of the fault creation process. Paper presented at the International Conference on Dependable Systems and Networks, 1 - 4 Jul 2001, Goteborg, Sweden.

Popov, P. T., Strigini, L. and Romanovsky, A. (1999). Choosing effective methods for design diversity - How to progress from intuition to science. COMPUTER SAFETY, RELIABILITY AND SECURITY, 1698, pp. 272-285. ISSN 0302-9743

Spanoudakis, G., Kloukinas, C. and Androutsopoulos, K. (2007). Towards security monitoring patterns. Paper presented at the 22nd Annual ACM Symposium on Applied Computing, 11 - 15 March 2007, Seoul, Korea.

Stankovic, V., Alata, E., Leita, C., Serafini, M., Thonnard, O., Viniikka, J. and Zurutuza, U. (2008). Malicious Fault Characterization Exploiting Honeypot Data. Paper presented at the 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.

Stankovic, V., Bessani, A. N., Daidone, A., Gashi, I., Obelheiro, R. R. and Sousa, P. (2009). Enhancing Fault / Intrusion Tolerance through Design and Configuration Diversity. Paper presented at the 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2009), Jun 2009, Estoril, Lisbon, Portugal.

Stankovic, V., Bloomfield, R. E., Bishop, P. G. and Gashi, I. (2011). Diversity for Security: a Study with Off-The-Shelf AntiVirus Engines. Paper presented at the 21st International Symposium on Software Reliability Engineering (ISSRE 2011), Hiroshima, Japan.

Stankovic, V., Lin, S., Pareaud, T., Robert, T. and Zutautaite-Seputiene, I. (2008). Toward Adaptable Software Architecture for Dependability: ASAP. Paper presented at the 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.

Stankovic, V. and Popov, P. T. (2006). Improving DBMS performance through diverse redundancy. SRDS 2006: 25th IEEE Symposium on Reliable Distributed Systems, Proceedings, pp. 391-400. ISSN 1060-9857

Strigini, L., Bosio, D., Littlewood, B. and Newby, M. J. (2002). Advantages of open source processes for reliability: clarifying the issues. Paper presented at the Workshop on Open Source Software Development, Feb 2002, Newcastle upon Tyne, UK.

Strigini, L., Delic, K. A. and Mazzanti, F. (1998). Formalising Engineering Judgement on Software Dependability via Belief Networks. Paper presented at the Sixth IFIP International Working Conference "Can We Rely on Computers?", Mar 1997, Garmisch-Partenkirchen, Germany.

Strigini, L. and Fenton, N. (1996). Rigorously assessing software reliability and safety. European Space Agency, (Special Publication) ESA SP(377), pp. 193-198. ISSN 0379-6566

Strigini, L. and Povyakalo, A. A. (2013). Software fault-freeness and reliability predictions. In: Bitsch, F., Guiochet, J. and Kaaniche, M. (Eds.), Computer Safety, Reliability, and Security. SAFECOMP 2013. (pp. 106-117). Cham: Springer. ISBN 978-3-642-40792-5

Stroud, R. and Gashi, I. (2012). Methodology for a security audit of ERTMS. Paper presented at the 42nd IEEE International Conference on Dependable Systems and Networks (DSN) 2012, 25 - 28 June 2012, Boston, USA.

Tselikis, C., Douligeris, C., Mitropoulos, S. and Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. Paper presented at the IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.

Tselikis, C., Mitropoulos, S., Douligeris, C., Ladis, E., Georgouleas, K., Vangelatos, C. and Komninos, N. (2009). Empirical study of clustering algorithms for wireless ad hoc networks. Paper presented at the 16th International Conference on Systems, Signals and Image Processing (IWSSIP 2009), 18 - 20 June 2009, Chalkida, Greece.

Tsigkritis, T. and Spanoudakis, G. (2008). A Temporal Abductive Diagnostic Process for Runtime Properties Violations. ExaCt, 391, ISSN CEUR Workshop Proceedings

Ul Asad, H., Jones, K. and Surre, F. (2014). Verifying robust frequency domain properties of non linear oscillators using SMT. Paper presented at the 17th Symposium on Design & Diagnostics of Electronic Circuits & Systems, 23rd - 25th April 2014, Warsaw, Poland.

Wissmann, Jens, Weyde, T. and Conklin, D. (2010). Representing chord sequences in OWL. Paper presented at the Sound and Music Computing Conference 2010, 21 - 24 June 2010, Barcelona, Spain.

Zachos, K. ORCID: 0000-0003-1977-7090, Paraskevopoulos, F., Ientsek, S., Maiden, N. ORCID: 0000-0001-6233-8320, Apostolou, D. and Mentzas, G. (2019). Creative Information Exploration in Journalism. In: 2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA). (pp. 150-156). New York, USA: IEEE. ISBN 978-1-5386-8161-9

Zhao, X., Robu, V., Flynn, D., Salako, K. and Strigini, L. (2019). Assessing the Safety and Reliability of Autonomous Vehicles from Road Testing. Paper presented at the ISSRE 2019 - the 20th International Symposium on Software Reliability Engineering, 28 - 31 October 2019, Berlin, Germany.

Thesis

Abro, F. I. (2018). Investigating Android permissions and intents for malware detection. (Unpublished Doctoral thesis, City, Universtiy of London)

Al-Malki, Dana Mohammed (2006). Development of virtual network computing (VNC) environment for networking and enhancing user experience. (Unpublished Doctoral thesis, City University London)

Algaith, A. (2019). Assessing the security benefits of defence in depth. (Unpublished Doctoral thesis, City, University of London)

Borges, Rafael (2012). A neural-symbolic system for temporal reasoning with application to model verification and learning. (Unpublished Doctoral thesis, City University London)

Chueke, J. (2016). Perceptible affordances and feedforward for gestural interfaces: Assessing effectiveness of gesture acquisition with unfamiliar interactions. (Unpublished Doctoral thesis, City, University of London)

Contreras, Ricardo (2013). Context Aware Web-Service Monitoring. (Unpublished Doctoral thesis, City University London)

Elmsley (né Lambert), A. (2017). Modelling metrical flux: an adaptive frequency neural network for expressive rhythmic perception and prediction. (Unpublished Doctoral thesis, City, University of London)

Filho, Gilberto Amado de Azevedo Cysneiros (2011). Software Traceability for Multi-Agent Systems Implemented Using BDI Architecture. (Unpublished Doctoral thesis, City University London)

Goddard, Kate (2012). Automation bias and prescribing decision support – rates, mediators and mitigators. (Unpublished Doctoral thesis, City University London)

Hafiz bin Haji Khozali, Muhammed (1981). Computer aided mathematical modelling of turbulent flow for orifice metering. (Unpublished Doctoral thesis, The City University)

Jones, Richard (2016). Measuring the business success of enterprise systems projects. (Unpublished Doctoral thesis, City, University of London)

Kaparias, I. (2008). Reliable dynamic in-vehicle navigation. (Unpublished Doctoral thesis, Imperial College)

Khani, S. (2018). Self-reconfigurable, intrusion-tolerant, web-service composition framework. (Unpublished Doctoral thesis, City, Universtiy of London)

Kloos, Reinhold (2013). ACTAS: Adaptive Composition and Trading with Agents for Services. (Unpublished Doctoral thesis, City University London)

Meng, X. (2018). An integrated networkbased mobile botnet detection system. (Unpublished Doctoral thesis, City, Universtiy of London)

Papakonstantinou, Stylianos (2012). Technological framework for ubiquitous interactions using context–aware mobile devices. (Unpublished Doctoral thesis, City University London)

Rangiha, M. E. (2016). A framework for social BPM based on social tagging. (Unpublished Doctoral thesis, City University London)

Salako, K. (2012). Extension to models of coincident failure in multiversion software. (Unpublished Doctoral thesis, City University London)

Sleat, Philip M. (1991). A static, transaction based design methodology for hard real-time systems. (Unpublished Doctoral thesis, City University)

Stankovic, V. (2008). Performance Implications of Using Diverse Redundancy for Database Replication. (Unpublished Doctoral thesis, City, University of London)

Tsigkritis, Theocharis (2010). Diagnosing runtime violations of security and dependability properties. (Unpublished Doctoral thesis, City University London)

Report

Bishop, P. G., Bloomfield, R. E., Gashi, I. and Stankovic, V. (2012). Diverse protection systems for improving security: a study with AntiVirus engines. London, UK: City University London.

Bloomfield, R. E., Chozos, N., Popov, P. T., Stankovic, V., Wright, D. and Howell-Morris, R. (2010). Preliminary Interdependency Analysis (PIA): Method and tool support (D/501/12102/2 v2.0). London: Adelard LLP and City University London.

Littlewood, B. and Povyakalo, A. A. (2012). Conservative bounds for the pfd of a 1-out-of-2 software-based system based on an assessor’s subjective probability of "not worse than independence" (CSR Technical Report, 20 May 2012). London: Centre for Software Reliability, City University London.

Littlewood, B. and Povyakalo, A. A. (2012). Conservative reasoning about epistemic uncertainty for the probability of failure on demand of a 1-out-of-2 software-based system in which one channel is "possibly perfect" (CSR Technical Report 20 March 2012). London: Centre for Software Reliability, City University London.

Littlewood, B. and Wright, D. (1996). Reliability prediction of a software product using testing data from other products or execution environment (10). Brussels: DeVa Project.

Littlewood, B. and Wright, D. (1996). Some conservative stopping rules for the operational testing of saftey-critical software (33). Brussels: DeVa ESPRIT Long Term Research Project.

Software

Gandrud, C. DataCombine: Tools for Easily Combining and Cleaning Data Sets

Gandrud, C., Williams, L. and Whitten, G. (2015). dynsim: Dynamic Simulations of Autoregressive Relationships

Popov, P. T. A SAN Model of effect of cyber-attacks on reliability of a 2-channel software system

Stankovic, V. and Popov, P. T. (2016). TPC-C Client - Java-based implementation of the industry standard benchmark for database performance evaluation

This list was generated on Fri Oct 25 04:19:16 2019 UTC.