City Research Online

Items where Schools and Departments is "Software Reliability" and Year is 2007

Up a level
Group by: Authors | Type | No Grouping
Number of items: 18.

Bishop, P. G., Gashi, I., Littlewood, B. & Wright, D. (2007). Reliability modeling of a 1-out-of-2 system: Research with diverse Off-the-shelf SQL database servers. In: OConner, L (Ed.), ISSRE 2007: 18TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS. The 18th IEEE International Symposium on Software Reliability (ISSRE '07), 5 - 9 Nov 2007, Trollhättan, Sweden.

Bloomfield, R. E., Littlewood, B. & Wright, D. (2007). Confidence: Its role in dependability cases for risk assessment. In: 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS. 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 25 - 28 June 2008, Edinburgh, UK. doi: 10.1109/DSN.2007.29

Gashi, I. (2007). Software dependability with off-the-shelf components. (Unpublished Doctoral thesis, City, University of London)

Gashi, I. & Popov, P. T. (2007). Uncertainty explicit assessment of off-the-shelf software: Selection of an optimal diverse pair. In: ICCBSS 2007: SIXTH INTERNATIONAL IEEE CONFERENCE ON COMMERCIAL-OFF-THE-SHELF (COTS)-BASED SOFTWARE SYSTEMS, PROCEEDINGS. Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, 26 Feb - 2 Mar 2007, Banff, Canada.

Gashi, I., Popov, P. T. & Strigini, L. (2007). Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers. IEEE Transactions on Dependable and Secure Computing, 4(4), pp. 280-294. doi: 10.1109/tdsc.2007.70208

Hunt, S., Clark, D. & Malacaria, P. (2007). A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3), pp. 321-371. doi: 10.3233/jcs-2007-15302

Kim, J., Jones, K. & Horowitz, M. (2007). Variable domain transformation for linear PAC analysis of mixed-signal systems. Paper presented at the International Conference on Computer-Aided Design, 2007. ICCAD 2007, 05 - 08 Nov 2007, San Jose, California, USA. doi: 10.1109/ICCAD.2007.4397376

Komninos, N. (2007). Morpheus: stream cipher for software & hardware applications. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N. & Dimitriou, T. (2007). Protecting biometric templates with image watermarking techniques. Advances in Biometrics: Lecture Notes in Computer Science, 4642, pp. 114-123. doi: 10.1007/978-3-540-74549-5_13

Komninos, N., Soroush, H. & Salajegheh, M. (2007). LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N., Vergados, D. & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5(3), pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. International Journal of Communication Systems, 20(12), pp. 1391-1406. doi: 10.1002/dac.882

Komninos, N., Vergados, D. D. & Douligeris, C. (2007). A two‐step authentication framework for Mobile ad hoc networks. China Communications Journal, 4(1), pp. 28-39.

Littlewood, B. & Wright, D. (2007). The use of multilegged arguments to increase confidence in safety claims for software-based systems: A study based on a BBN analysis of an idealized example. IEEE Transactions on Software Engineering, 33(5), pp. 347-365. doi: 10.1109/tse.2007.1002

Mitrokotsa, A., Komninos, N. & Douligeris, C. (2007). Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks. Paper presented at the The Sixth Annual Mediterranean Ad Hoc Networking WorkShop, 12th - 15th June 2007, Corfu, Greece.

Spanoudakis, G., Kloukinas, C. & Androutsopoulos, K. (2007). Towards security monitoring patterns. Paper presented at the 22nd Annual ACM Symposium on Applied Computing, 11 - 15 March 2007, Seoul, Korea.

Strigini, L. ORCID: 0000-0002-4246-2866 (2007). Achieving effective diversity between redundant software-based components. In: 6th International Conference on Control and Instrumentation in Nuclear Installations. 6th International Conference on Control and Instrumentation in Nuclear Installations, 11-13 Sep 2007, Manchester, UK.

This list was generated on Sun Dec 22 02:26:15 2024 UTC.