Items where Schools and Departments is "Software Reliability" and Year is 2008
Article
Alberdi, E., Povyakalo, A. A., Strigini, L. , Ayton, P. & Given-Wilson, R. M. (2008). CAD in mammography: lesion-level versus case-level analysis of the effects of prompts on human decisions. International Journal of Computer Assisted Radiology and Surgery, 3(1-2), pp. 115-122. doi: 10.1007/s11548-008-0213-x
Devey, C. (2008). Electronic Discovery/Disclosure: From Litigation to International Commercial Arbitration. Arbitration, 74, pp. 369-384.
Komninos, N. & Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications(545 CP), pp. 25-28. doi: 10.1049/cp:20080928
Littlewood, B. (2008). Comments on "Multi-objective genetic algorithm for solving N-version program design problem". Reliability Engineering & System Safety, 93(8), p. 1287. doi: 10.1016/j.ress.2007.06.005
Conference or Workshop Item
Bessani, A. N., Reiser, H. P., Sousa, P. , Gashi, I., Stankovic, V. ORCID: 0000-0002-8740-6526, Distler, T., Kapitza, R., Daidone, A. & Obelheiro, R. R. (2008). FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. In: Douglis, F (Ed.), Middleware (Companion). ACM/IFIP/USENIX Middleware '08 Conference doi: 10.1145/1462735.1462763
Bloomfield, R. E., Gashi, I., Povyakalo, A. A. & Stankovic, V. ORCID: 0000-0002-8740-6526 (2008). Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. In: ISSRE. 19th International Symposium on Software Reliability Engineering, 2008, 10 - 14 Nov 2008, Seattle, USA. doi: 10.1109/ISSRE.2008.62
Hunt, S., Askarov, A., Sabelfeld, A. & Sands, D. (2008). Termination-insensitive noninterference leaks more than just a bit. In: Proc. 13th European Symposium on Research in Computer Security (ESORICS'08). 13th European Symposium on Research in Computer Security, Oct 2008, Malaga, Spain.
Hunt, S. & Clark, D. (2008). Non-interference for deterministic interactive programs. In: Proc. 5th International Workshop on Formal Aspects in Security and Trust. 5th International Workshop on Formal Aspects in Security and Trust (FAST2008), Oct 2008, Malaga, Spain.
Hunt, S. & Sands, D. (2008). Just forget it - The semantics and enforcement of information erasure. In: Lecture Notes in Computer Science. European Symposium on Programming, 29 Mar 2008 - 6 Apr 2008, Budapest, Hungary.
Jones, K. (2008). Analog and Mixed Signal Verification. Paper presented at the FMCAD 2008 Formal Methods in Computer Aided Design, 17 - 20 Nov 2008, Portland, OR, USA.
Stankovic, V. ORCID: 0000-0002-8740-6526, Alata, E., Leita, C. , Serafini, M., Thonnard, O., Viniikka, J. & Zurutuza, U. (2008). Malicious Fault Characterization Exploiting Honeypot Data. In: Proc. of the 7th European Dependable Computing Conference (EDCC 2008). 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.
Stankovic, V. ORCID: 0000-0002-8740-6526, Lin, S., Pareaud, T. , Robert, T. & Zutautaite-Seputiene, I. (2008). Toward Adaptable Software Architecture for Dependability: ASAP. In: Proc. of the 7th European Dependable Computing Conference (EDCC 2008). 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.
Tselikis, C., Douligeris, C., Mitropoulos, S. & Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. In: IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.
Report
Gashi, I. & Bloomfield, R. E. (2008). Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems. Centre for Software Reliability, City University London.
Thesis
Stankovic, V. ORCID: 0000-0002-8740-6526 (2008). Performance Implications of Using Diverse Redundancy for Database Replication. (Unpublished Doctoral thesis, City, University of London)
van der Meulen, M. (2008). The Effectiveness of Software Diversity. (Unpublished Doctoral thesis, City University London)