City Research Online

Items where Schools and Departments is "Software Reliability" and Year is 2011

Up a level
Group by: Authors | Type | No Grouping
Jump to: B | D | F | G | H | K | L | M | N | S
Number of items: 13.

B

Bishop, P. G., Bloomfield, R. E., Littlewood, B. , Povyakalo, A. A. & Wright, D. (2011). Toward a Formalism for Conservative Claims about the Dependability of Software-Based Systems. IEEE Transactions on Software Engineering, 37(5), pp. 708-717. doi: 10.1109/tse.2010.67

D

Del Tedesco, F., Hunt, S. & Sands, D. (2011). A semantic hierarchy for erasure policies. Lecture Notes in Computer Science, 7093 L, pp. 352-369. doi: 10.1007/978-3-642-25560-1_24

F

Fengou, M. A., Mantas, G., Lymberopoulos, D. & Komninos, N. (2011). Ubiquitous healthcare profile management applying smart card technology. In: Nikita, KS, Lin, JC, Fotiadis, DI & Waldmeyer, MTA (Eds.), MobiHealth. Second International ICST Conference, MobiHealth 2011, 5 - 7 October 2011, Kos Island, Greece. doi: 10.1007/978-3-642-29734-2_34

G

Garcia, M., Bessani, A. N., Gashi, I. , Neves, N. & Obelheiro, R. R. (2011). OS diversity for intrusion tolerance: Myth or reality? In: Proceedings of the International Conference on Dependable Systems and Networks. 41st International Conference on Dependable Systems & Networks (DSN), 27 - 30 Jun 2011, Hong Kong.

H

Hunt, S. & Sands, D. (2011). From exponential to polynomial-time security typing via principal types. In: Lecture Notes in Computer Science. European Symposium on Programming, 26 March 2011 - 3 Apr 2011, Saarbrücken, Germany.

K

Komninos, N. & Mantas, G. (2011). PEA: Polymorphic Encryption Algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3(1), pp. 1-18. doi: 10.1504/ijscc.2011.039222

L

Littlewood, B. & Rushby, J. (2011). Reasoning about the Reliability of Diverse Two-Channel Systems in which One Channel is "Possibly Perfect". IEEE Transactions on Software Engineering, 38(5), pp. 1178-1194. doi: 10.1109/TSE.2011.80

Littlewood, B. & Strigini, L. (2011). "Validation of ultra-high dependability…" – 20 years on. Safety Systems, the Newsletter of the Safety-Critical Systems Club, 30(3),

M

Michalas, A., Komninos, N. & Prasad, N. R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, pp. 1-5. doi: 10.1109/wirelessvitae.2011.5940931

Michalas, A., Oleshchuk, V. A., Komninos, N. & Prasad, N. R. (2011). Privacy-preserving scheme for mobile ad hoc networks. In: ISCC. 2011 IEEE Symposium on Computers and Communications (ISCC), 28 June - 1 July 2011, Kerkyra, Greece. doi: 10.1109/ISCC.2011.5983930

N

Netkachova, K. & Pokrova, S. V. (2011). Оценка и обеспечение безопасности систем электронного образования на основе веб-сервисов. Бизнес Информ, 6, pp. 183-186.

S

Sabouri, A., Komninos, N. & Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, 1, pp. 422-427. doi: 10.1109/cts.2011.5898962

Stankovic, V. ORCID: 0000-0002-8740-6526, Bloomfield, R. E., Bishop, P. G. & Gashi, I. (2011). Diversity for Security: a Study with Off-The-Shelf AntiVirus Engines. Paper presented at the 21st International Symposium on Software Reliability Engineering (ISSRE 2011), Hiroshima, Japan.

This list was generated on Sun Dec 22 02:26:17 2024 UTC.