Items where Schools and Departments is "Software Reliability" and Year is 2008
Alberdi, E., Povyakalo, A. A., Strigini, L. , Ayton, P. & Given-Wilson, R. M. (2008). CAD in mammography: lesion-level versus case-level analysis of the effects of prompts on human decisions. International Journal of Computer Assisted Radiology and Surgery, 3(1-2), pp. 115-122. doi: 10.1007/s11548-008-0213-x
Bessani, A. N., Reiser, H. P., Sousa, P. , Gashi, I., Stankovic, V. ORCID: 0000-0002-8740-6526, Distler, T., Kapitza, R., Daidone, A. & Obelheiro, R. R. (2008). FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. In: Douglis, F (Ed.), Middleware (Companion). ACM/IFIP/USENIX Middleware '08 Conference doi: 10.1145/1462735.1462763
Bloomfield, R. E., Gashi, I., Povyakalo, A. A. & Stankovic, V. ORCID: 0000-0002-8740-6526 (2008). Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. In: ISSRE. 19th International Symposium on Software Reliability Engineering, 2008, 10 - 14 Nov 2008, Seattle, USA. doi: 10.1109/ISSRE.2008.62
Devey, C. (2008). Electronic Discovery/Disclosure: From Litigation to International Commercial Arbitration. Arbitration, 74, pp. 369-384.
Gashi, I. & Bloomfield, R. E. (2008). Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems. Centre for Software Reliability, City University London.
Hunt, S., Askarov, A., Sabelfeld, A. & Sands, D. (2008). Termination-insensitive noninterference leaks more than just a bit. In: Proc. 13th European Symposium on Research in Computer Security (ESORICS'08). 13th European Symposium on Research in Computer Security, Oct 2008, Malaga, Spain.
Hunt, S. & Clark, D. (2008). Non-interference for deterministic interactive programs. In: Proc. 5th International Workshop on Formal Aspects in Security and Trust. 5th International Workshop on Formal Aspects in Security and Trust (FAST2008), Oct 2008, Malaga, Spain.
Hunt, S. & Sands, D. (2008). Just forget it - The semantics and enforcement of information erasure. In: Lecture Notes in Computer Science. European Symposium on Programming, 29 Mar 2008 - 6 Apr 2008, Budapest, Hungary.
Jones, K. (2008). Analog and Mixed Signal Verification. Paper presented at the FMCAD 2008 Formal Methods in Computer Aided Design, 17 - 20 Nov 2008, Portland, OR, USA.
Komninos, N. & Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications(545 CP), pp. 25-28. doi: 10.1049/cp:20080928
Littlewood, B. (2008). Comments on "Multi-objective genetic algorithm for solving N-version program design problem". Reliability Engineering & System Safety, 93(8), p. 1287. doi: 10.1016/j.ress.2007.06.005
Stankovic, V. ORCID: 0000-0002-8740-6526 (2008). Performance Implications of Using Diverse Redundancy for Database Replication. (Unpublished Doctoral thesis, City, University of London)
Stankovic, V. ORCID: 0000-0002-8740-6526, Alata, E., Leita, C. , Serafini, M., Thonnard, O., Viniikka, J. & Zurutuza, U. (2008). Malicious Fault Characterization Exploiting Honeypot Data. In: Proc. of the 7th European Dependable Computing Conference (EDCC 2008). 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.
Stankovic, V. ORCID: 0000-0002-8740-6526, Lin, S., Pareaud, T. , Robert, T. & Zutautaite-Seputiene, I. (2008). Toward Adaptable Software Architecture for Dependability: ASAP. In: Proc. of the 7th European Dependable Computing Conference (EDCC 2008). 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.
Tselikis, C., Douligeris, C., Mitropoulos, S. & Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. In: IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.
van der Meulen, M. (2008). The Effectiveness of Software Diversity. (Unpublished Doctoral thesis, City University London)