City Research Online

Items where Schools and Departments is "Software Reliability" and Year is 2008

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Authors | Type | No Grouping
Jump to: A | B | D | G | H | J | K | L | S | T | V
Number of items: 16.


Alberdi, E., Povyakalo, A. A., Strigini, L., Ayton, P. and Given-Wilson, R. M. (2008). CAD in mammography: lesion-level versus case-level analysis of the effects of prompts on human decisions. International Journal of Computer Assisted Radiology and Surgery, 3(1-2), pp. 115-122. doi: 10.1007/s11548-008-0213-x


Bessani, A. N., Reiser, H. P., Sousa, P., Gashi, I., Stankovic, V., Distler, T., Kapitza, R., Daidone, A. and Obelheiro, R. R. (2008). FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. Paper presented at the ACM/IFIP/USENIX Middleware '08 Conference.

Bloomfield, R. E., Gashi, I., Povyakalo, A. A. and Stankovic, V. (2008). Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. Paper presented at the 19th International Symposium on Software Reliability Engineering, 2008, 10 - 14 Nov 2008, Seattle, USA.


Devey, C. (2008). Electronic Discovery/Disclosure: From Litigation to International Commercial Arbitration. Arbitration, 74, pp. 369-384.


Gashi, I. and Bloomfield, R. E. (2008). Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems. Centre for Software Reliability, City University London.


Hunt, S., Askarov, A., Sabelfeld, A. and Sands, D. (2008). Termination-insensitive noninterference leaks more than just a bit. Paper presented at the 13th European Symposium on Research in Computer Security, Oct 2008, Malaga, Spain.

Hunt, S. and Clark, D. (2008). Non-interference for deterministic interactive programs. Paper presented at the 5th International Workshop on Formal Aspects in Security and Trust (FAST2008), Oct 2008, Malaga, Spain.

Hunt, S. and Sands, D. (2008). Just forget it - The semantics and enforcement of information erasure. Lecture Notes in Computer Science, 4960, pp. 239-253. ISSN 0302-9743


Jones, K. (2008). Analog and Mixed Signal Verification. Paper presented at the FMCAD 2008 Formal Methods in Computer Aided Design, 17 - 20 Nov 2008, Portland, OR, USA.


Komninos, N. and Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications(545), pp. 25-28.


Littlewood, B. (2008). Comments on "Multi-objective genetic algorithm for solving N-version program design problem". Reliability Engineering & System Safety, 93(8), p. 1287. doi: 10.1016/j.ress.2007.06.005


Stankovic, V. (2008). Performance Implications of Using Diverse Redundancy for Database Replication. (Unpublished Doctoral thesis, City, University of London)

Stankovic, V., Alata, E., Leita, C., Serafini, M., Thonnard, O., Viniikka, J. and Zurutuza, U. (2008). Malicious Fault Characterization Exploiting Honeypot Data. Paper presented at the 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.

Stankovic, V., Lin, S., Pareaud, T., Robert, T. and Zutautaite-Seputiene, I. (2008). Toward Adaptable Software Architecture for Dependability: ASAP. Paper presented at the 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.


Tselikis, C., Douligeris, C., Mitropoulos, S. and Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. Paper presented at the IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.


van der Meulen, M. (2008). The Effectiveness of Software Diversity. (Unpublished Doctoral thesis, City University London)

This list was generated on Fri Dec 3 04:29:49 2021 UTC.