Browse by Schools and Department by Authors
- City, University of London (24728)
- School of Science & Technology (7469)
- Computer Science (2535)
- Software Reliability (302)
- Computer Science (2535)
- School of Science & Technology (7469)
Article
Alberdi, E., Becher, J.-C., Gilhooly, K. J. , Hunter, J., Logie, R., Lyon, A., McIntosh, N. & Reiss, J. (2001). Expertise and the interpretation of computerized physiological data: implications for the design of computerized monitoring in neonatal intensive care. International Journal of Human-Computer Studies, 55(3), pp. 191-216. doi: 10.1006/ijhc.2001.0477
Alberdi, E., Gilhooly, K. J., Hunter, J. , Logie, R., Lyon, A., McIntosh, N. & Reiss, J. (2000). Computerisation and decision making in neonatal intensive care: a cognitive engineering investigation. Journal of Clinical Monitoring and Computing, 16(2), pp. 85-94. doi: 10.1023/a:1009954623304
Alberdi, E., Povyakalo, A. A., Strigini, L. & Ayton, P. (2004). Effects of incorrect computer-aided detection (CAD) output on human decision-making in mammography. Academic Radiology, 11(8), pp. 909-918. doi: 10.1016/j.acra.2004.05.012
Alberdi, E., Povyakalo, A. A., Strigini, L. , Ayton, P. & Given-Wilson, R. M. (2008). CAD in mammography: lesion-level versus case-level analysis of the effects of prompts on human decisions. International Journal of Computer Assisted Radiology and Surgery, 3(1-2), pp. 115-122. doi: 10.1007/s11548-008-0213-x
Alberdi, E., Povyakalo, A. A., Strigini, L. , Ayton, P., Hartswood, M., Procter, R. & Slack, R. (2005). Use of computer-aided detection (CAD) tools in screening mammography: a multidisciplinary investigation. British Journal of Radiology, 78(suppl_), S31-S40. doi: 10.1259/bjr/37646417
Alberdi, E., Strigini, L., Povyakalo, A. A. & Ayton, P. (2009). Why Are People's Decisions Sometimes Worse with Computer Support?. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 5775, pp. 18-31. doi: 10.1007/978-3-642-04468-7_3
Alberdi, E., Taylor, P. & Lee, R. (2004). Elicitation and representation of expert knowledge for computer aided diagnosis in mammography. Methods of Information in Medicine, 43(03), pp. 239-246. doi: 10.1055/s-0038-1633864
Andongabo, A. & Gashi, I. (2017). vepRisk - A Web Based Analysis Tool for Public Security Data. 2017 13th European Dependable Computing Conference (EDCC), pp. 135-138. doi: 10.1109/EDCC.2017.30
Bayer, J., Flege, O. & Gacek, C. (2000). Creating product line architectures. Lecture Notes in Computer Science, 1951, pp. 210-216. doi: 10.1007/978-3-540-44542-5_23
Behbehani, D., Komninos, N. ORCID: 0000-0003-2776-1283, Al-Begain, K. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2023). Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment. Journal of Cloud Computing, 12(1), article number 79. doi: 10.1186/s13677-023-00454-2
Bertolino, A. & Strigini, L. (1998). Assessing the Risk due to Software Faults: Estimates of Failure Rate versus Evidence of Perfection.. Software Testing, Verification and Reliability, 8(3), pp. 155-166. doi: 10.1002/(SICI)1099-1689(1998090)8:3<155::AID-STVR163>3.0.CO;2-B
Bertolino, A. & Strigini, L. (1996). On the use of testability measures for dependability assessment. IEEE Transactions on Software Engineering, 22(2), pp. 97-108. doi: 10.1109/32.485220
Bishop, P. G. (2005). SILS and Software. Safety-Critical Systems Club Newsletter, 14(2),
Bishop, P. G. (1993). The Variation of Software Survival Time for Different Operational Input Profiles. Fault-Tolerant Computing, 1993. FTCS-23. Digest of Papers., The Twenty-Third International Symposium on, 4, pp. 98-107. doi: 10.1109/ftcs.1993.627312
Bishop, P. G., Bloomfield, R. E., Littlewood, B. , Popov, P. T., Povyakalo, A. A. & Strigini, L. (2014). A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train. Reliability Engineering & System Safety, 130, pp. 61-68. doi: 10.1016/j.ress.2014.04.002
Bishop, P. G., Bloomfield, R. E., Littlewood, B. , Povyakalo, A. A. & Wright, D. (2011). Toward a Formalism for Conservative Claims about the Dependability of Software-Based Systems. IEEE Transactions on Software Engineering, 37(5), pp. 708-717. doi: 10.1109/tse.2010.67
Bishop, P. G. & Cyra, L. (2010). Overcoming Non-determinism in Testing Smart Devices: A Case Study. Lecture Notes in Computer Science, 6351 L, pp. 237-250. doi: 10.1007/978-3-642-15651-9_18
Bishop, P. G. & Povyakalo, A. A. (2017). Deriving a frequentist conservative confidence bound for probability of failure per demand for systems with different operational and test profiles. Reliability Engineering & System Safety, 158, pp. 246-253. doi: 10.1016/j.ress.2016.08.019
Bishop, P. G. ORCID: 0000-0003-3307-5159 & Povyakalo, A. A. ORCID: 0000-0002-4068-422X (2020). A conservative confidence bound for the probability of failure on demand of a software-based system based on failure-free tests of its components. Reliability Engineering and System Safety, 203, article number 107060. doi: 10.1016/j.ress.2020.107060
Bloomfield, R. E., Courtois, P.-J., Littlewood, B. , Strigini, L., Yih, S. & Fan, C.-F. (2002). Search for the Unnecessary: Letter to the Editor. Nuclear Engineering International, 47(570), 11-.
Bloomfield, R. E., Popov, P. T., Salako, K. ORCID: 0000-0003-0394-7833 , Stankovic, V. ORCID: 0000-0002-8740-6526 & Wright, D. (2017). Preliminary Interdependency Analysis: An Approach to Support Critical Infrastructure Risk Assessment. Reliability Engineering and System Safety, 167, pp. 198-217. doi: 10.1016/j.ress.2017.05.030
Brain, M. ORCID: 0000-0003-4216-7151, Schanda, F. & Sun, Y. (2019). Building Better Bit-Blasting for Floating-Point Problems. Tools and Algorithms for the Construction and Analysis of Systems, 11427, pp. 79-98. doi: 10.1007/978-3-030-17462-0_5
Clark, D., Hunt, S. & Malacaria, P. (2005). Quantified Interference for a While Language. Electronic Notes in Theoretical Computer Science, 112(SPEC. ), pp. 149-166. doi: 10.1016/j.entcs.2004.01.018
Del Tedesco, F., Hunt, S. & Sands, D. (2011). A semantic hierarchy for erasure policies. Lecture Notes in Computer Science, 7093 L, pp. 352-369. doi: 10.1007/978-3-642-25560-1_24
Devey, C. (2008). Electronic Discovery/Disclosure: From Litigation to International Commercial Arbitration. Arbitration, 74, pp. 369-384.
Egyed, A., Medvidovic, N. & Gacek, C. (2000). Component-based perspective on software mismatch detection and resolution. IEE Proceedings: Software, 147(6), pp. 225-236. doi: 10.1049/ip-sen:20000915
Favaro, J., Mazzini, S., Popov, P. T. ORCID: 0000-0002-3434-5272 & Strigini, L. (2018). AQUAS: A project to bridge the gaps between safety and security processes. Ada User Journal, 39(4), pp. 261-263.
Fengou, M. A., Mantas, G., Lymberopoulos, D. , Komninos, N., Fengos, S. & Lazarou, N. (2013). A new framework architecture for next generation e-Health services. IEEE Journal of Biomedical and Health Informatics, 17(1), pp. 9-18. doi: 10.1109/titb.2012.2224876
Fernando, D. W. & Komninos, N. ORCID: 0000-0003-2776-1283 (2024). FeSAD ransomware detection framework with machine learning using adaption to concept drift. Computers & Security, 137, article number 103629. doi: 10.1016/j.cose.2023.103629
Fernando, D. W., Komninos, N. ORCID: 0000-0003-2776-1283 & Chen, T. ORCID: 0000-0001-8037-1685 (2020). A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques. IoT, 1(2), pp. 551-604. doi: 10.3390/iot1020030
Frankl, P. G., Hamlet, R. G., Littlewood, B. & Strigini, L. (1998). Evaluating testing methods by delivered reliability. IEEE Transactions on Software Engineering, 24(8), pp. 586-601. doi: 10.1109/32.707695
Garcia, M., Bessani, A. N., Gashi, I. , Neves, N. & Obelheiro, R. R. (2013). Analysis of operating system diversity for intrusion tolerance. Software: Practice and Experience, 44(6), pp. 735-770. doi: 10.1002/spe.2180
Gashi, I., Popov, P. T. & Stankovic, V. ORCID: 0000-0002-8740-6526 (2009). Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach. Information and Software Technology, 51(2), pp. 497-511. doi: 10.1016/j.infsof.2008.06.003
Gashi, I., Popov, P. T., Stankovic, V. ORCID: 0000-0002-8740-6526 & Strigini, L. (2004). On designing dependable services with diverse off-the-shelf SQL servers. Lecture Notes in Computer Science, 3069, pp. 191-214. doi: 10.1007/978-3-540-25939-8_9
Gashi, I., Popov, P. T. & Strigini, L. (2007). Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers. IEEE Transactions on Dependable and Secure Computing, 4(4), pp. 280-294. doi: 10.1109/tdsc.2007.70208
Gashi, I., Sobesto, B., Mason, S. , Stankovic, V. ORCID: 0000-0002-8740-6526 & Cukier, M. (2014). A Study of the Relationship Between Antivirus Regressions and Label Changes. 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp. 441-450. doi: 10.1109/ISSRE.2013.6698897
Georgakakis, E., Komninos, N. & Douligeris, C. (2012). NAVI: Novel authentication with visual information. 2012 IEEE Symposium on Computers and Communications (ISCC), 000588-000595. doi: 10.1109/ISCC.2012.6249360
Huang, F. & Strigini, L. ORCID: 0000-0002-4246-2866 (2023). HEDF: A Method for Early Forecasting Software Defects Based on Human Error Mechanisms. IEEE Access, 11, pp. 3626-3652. doi: 10.1109/access.2023.3234490
Hunt, S., Clark, D. & Malacaria, P. (2002). Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science, 59(3), pp. 1-14. doi: 10.1016/S1571-0661(04)00290-7
Hunt, S., Clark, D. & Malacaria, P. (2007). A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3), pp. 321-371. doi: 10.3233/jcs-2007-15302
Izonin, I., Hovorushchenko, T. & Popov, P. T. ORCID: 0000-0002-3434-5272 (2023). Assurance of Information Systems' Quality and Security. Journal of Cyber Security and Mobility, 12(3), pp. V-XI.
Jones, K., Kim, J. & Horowitz, M. (2010). Fast, non-monte-carlo estimation of transient performance variation due to device mismatch. IEEE Transactions on Circuits and Systems, 57(7), pp. 1746-1755. doi: 10.1109/tcsi.2009.2035418
Jones, K., Konrad, V. & Nickovic, D. (2010). Analog Property Checkers: A Ddr2 Case Study. Formal Methods in System Design, 36(2), pp. 114-130. doi: 10.1007/s10703-009-0085-x
Junejo, A. K., Komninos, N. ORCID: 0000-0003-2776-1283 & McCann, J. A. (2021). A Secure Integrated Framework for Fog-Assisted Internet of Things Systems. IEEE Internet of Things Journal, 8(8), pp. 6840-6852. doi: 10.1109/jiot.2020.3035474
Kamilaris, A., Pitsillides, A., Kondepudi, S. & Komninos, N. (2016). Privacy Concerns in Sharing Personal Consumption Data through Online Applications. 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), doi: 10.1109/IWCMC.2016.7577124
Keizer, N. V., Ascigil, O., Król, M. ORCID: 0000-0002-3437-8621 , Kutscher, D. & Pavlou, G. (2024). A Survey on Content Retrieval on the Decentralised Web. ACM Computing Surveys, 56(8), pp. 1-39. doi: 10.1145/3649132
Kharchenko, V. S., Popov, P. T., Odarushchenko, O. & Zhadan, V. (2012). Empirical evaluation of accuracy of mathematical software used for availability assessment of fault-tolerant computer systems. Reliability: Theory & Applications, 7(3),
Komninos, N. & Dimitriou, T. (2007). Protecting biometric templates with image watermarking techniques. Advances in Biometrics: Lecture Notes in Computer Science, 4642, pp. 114-123. doi: 10.1007/978-3-540-74549-5_13
Komninos, N. & Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7(1), pp. 171-182. doi: 10.1016/j.adhoc.2008.01.001
Komninos, N. & Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications(545 CP), pp. 25-28. doi: 10.1049/cp:20080928
Komninos, N. & Mantas, G. (2011). PEA: Polymorphic Encryption Algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3(1), pp. 1-18. doi: 10.1504/ijscc.2011.039222
Komninos, N., Phillppou, E. & Pitsillides, A. (2014). Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures. Communications Surveys & Tutorials, 16(4), pp. 1933-1954. doi: 10.1109/comst.2014.2320093
Komninos, N., Saxena, N., Shen, H. , Raymond Choo, K-K. & Chaudhari, N. S. (2020). BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. IEEE Transactions on Dependable and Secure Computing, 17(3), pp. 550-565. doi: 10.1109/tdsc.2018.2799223
Komninos, N., Vergados, D. & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5(3), pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005
Komninos, N., Vergados, D. & Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25(2), pp. 121-130. doi: 10.1016/j.cose.2005.09.005
Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011
Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. International Journal of Communication Systems, 20(12), pp. 1391-1406. doi: 10.1002/dac.882
Komninos, N., Vergados, D. D. & Douligeris, C. (2007). A two‐step authentication framework for Mobile ad hoc networks. China Communications Journal, 4(1), pp. 28-39.
Krol, M. ORCID: 0000-0002-3437-8621, Sonnino, A., Al-Bassam, M. , Tasiopoulos, A. G., Riviere, E. & Psaras, I. (2021). Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks. ACM Transactions on Internet Technology (TOIT), 21(2), pp. 1-27. doi: 10.1145/3419483
Littlewood, B. (2008). Comments on "Multi-objective genetic algorithm for solving N-version program design problem". Reliability Engineering & System Safety, 93(8), p. 1287. doi: 10.1016/j.ress.2007.06.005
Littlewood, B. (2006). Comments on 'Evolutionary neural network modelling for software cumulative failure time prediction' by Liang Tian and Afzel Noore [Reliability Engineering and System Safety 87 (2005) 45-51]. Reliability Engineering & System Safety, 91(4), pp. 485-486. doi: 10.1016/j.ress.2005.02.001
Littlewood, B. (1996). The impact of diversity upon common mode failures. Reliability Engineering & System Safety, 51(1), pp. 101-113. doi: 10.1016/0951-8320(95)00120-4
Littlewood, B. (2000). The use of proofs in diversity arguments. IEEE Transactions on Software Engineering, 26(10), pp. 1022-1023. doi: 10.1109/32.879822
Littlewood, B., Brocklehurst, S., Fenton, N. , Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J. & Gollmann, D. (1993). Towards operational measures of computer security. Journal of Computer Security, 2(2-3), pp. 211-229. doi: 10.3233/jcs-1993-22-308
Littlewood, B., Popov, P. T. & Strigini, L. (2002). Assessing the reliability of diverse fault-tolerant software-based systems. Safety Science, 40(9), pp. 781-796. doi: 10.1016/s0925-7535(01)00084-4
Littlewood, B., Popov, P. T. & Strigini, L. (2001). Modeling software design diversity. ACM Computer Surveys, 33(2), pp. 177-208. doi: 10.1145/384192.384195
Littlewood, B., Popov, P. T. & Strigini, L. (1999). A note on reliability estimation of functionally diverse systems. Reliability Engineering & System Safety, 66(1), pp. 93-95. doi: 10.1016/s0951-8320(99)00014-9
Littlewood, B., Popov, P. T., Strigini, L. & Shryane, N. (2000). Modeling the effects of combining diverse software fault detection techniques. IEEE Transactions on Software Engineering, 26(12), pp. 1157-1167. doi: 10.1109/32.888629
Littlewood, B. & Povyakalo, A. A. (2013). Conservative bounds for the pfd of a 1-out-of-2 software-based system based on an assessor’s subjective probability of “not worse than independence”. IEEE Transactions on Software Engineering, 39(12), pp. 1641-1653. doi: 10.1109/TSE.2013.31
Littlewood, B. & Povyakalo, A. A. (2013). Conservative reasoning about epistemic uncertainty for the probability of failure on demand of a 1-out-of-2 software-based system in which one channel is “possibly perfect”. IEEE Transactions on Software Engineering, 39(11), pp. 1521-1530. doi: 10.1109/TSE.2013.35
Littlewood, B. & Rushby, J. (2011). Reasoning about the Reliability of Diverse Two-Channel Systems in which One Channel is "Possibly Perfect". IEEE Transactions on Software Engineering, 38(5), pp. 1178-1194. doi: 10.1109/TSE.2011.80
Littlewood, B. ORCID: 0000-0002-6397-8685, Salako, K. ORCID: 0000-0003-0394-7833, Strigini, L. & Zhao, X. (2020). On Reliability Assessment When a Software-based System Is Replaced by a Thought-to-be-Better One. Reliability Engineering & System Safety, 197, article number 106752. doi: 10.1016/j.ress.2019.106752
Littlewood, B. ORCID: 0000-0002-6397-8685 & Strigini, L. ORCID: 0000-0002-4246-2866 (2022). Letter to the Editor: A Critical Response to a Recent Paper by Daniels and Tudor. Safety-Critical Systems eJournal, 1(2),
Littlewood, B. & Strigini, L. (1993). Validation of Ultrahigh Dependability for Software-Based Systems. Communications of the ACM (CACM), 36(11), pp. 69-80. doi: 10.1145/163359.163373
Littlewood, B. & Strigini, L. (2011). "Validation of ultra-high dependability…" – 20 years on. Safety Systems, the Newsletter of the Safety-Critical Systems Club, 30(3),
Littlewood, B. & Wright, D. (1997). Some conservative stopping rules for the operational testing of safety-critical software. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 23(11), pp. 673-683. doi: 10.1109/32.637384
Littlewood, B. & Wright, D. (2007). The use of multilegged arguments to increase confidence in safety claims for software-based systems: A study based on a BBN analysis of an idealized example. IEEE Transactions on Software Engineering, 33(5), pp. 347-365. doi: 10.1109/tse.2007.1002
Mantas, G., Lymberopoulos, D. & Komninos, N. (2012). PKI security in large-scale healthcare networks. Journal of Medical Systems, 36(3), pp. 1107-1116. doi: 10.1007/s10916-010-9573-1
Mantas, G., Lymberopoulos, D. & Komninos, N. (2010). A new framework for ubiquitous context-aware healthcare applications. Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB, 3468, pp. 1-4. doi: 10.1109/itab.2010.5687758
Marques, P., Rhode, M. & Gashi, I. ORCID: 0000-0002-8017-3184 (2021). Waste not: using diverse neural networks from hyperparameter search for improved malware detection. Computers & Security, 108, article number 102339. doi: 10.1016/j.cose.2021.102339
Michalas, A., Dimitriou, T., Giannetsos, T. , Komninos, N. & Prasad, N. R. (2012). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wireless Personal Communications, 66(3), pp. 559-575. doi: 10.1007/s11277-012-0734-z
Michalas, A., Komninos, N. & Prasad, N. R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, pp. 1-5. doi: 10.1109/wirelessvitae.2011.5940931
Michalas, A., Komninos, N., Prasad, N. R. & Oleshchuk, V. A. (2010). New client puzzle approach for DoS resistance in ad hoc networks. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp. 568-573. doi: 10.1109/icitis.2010.5689528
Mitrokotsa, A., Komninos, N. & Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10(2), pp. 93-106.
Mohavedi, Y., Cukier, M. & Gashi, I. ORCID: 0000-0002-8017-3184 (2019). Vulnerability Prediction Capability: A Comparison between Vulnerability Discovery Models and Neural Network Models. Computers and Security, 87, article number 101596. doi: 10.1016/j.cose.2019.101596
Netkachov, O., Popov, P. T. & Salako, K. ORCID: 0000-0003-0394-7833 (2014). Model-based Evaluation of the Resilience of Critical Infrastructures under Cyber Attacks. Lecture Notes in Computer Science, 8985, pp. 231-243. doi: 10.1007/978-3-319-31664-2_24
Netkachova, K. & Bloomfield, R. E. (2017). Is Chocolate Good for You-or, Is the Cloud Secure?. Computer, 50(8), pp. 74-78. doi: 10.1109/mc.2017.3001250
Netkachova, K. & Pokrova, S. V. (2011). Оценка и обеспечение безопасности систем электронного образования на основе веб-сервисов. Бизнес Информ, 6, pp. 183-186.
Pietrantuono, R., Popov, P. T. ORCID: 0000-0002-3434-5272 & Russo, S. (2020). Reliability assessment of service-based software under operational profile uncertainty. Reliability Engineering & System Safety, 204, article number 107193. doi: 10.1016/j.ress.2020.107193
Popov, P. T., Netkachov, A. & Salako, K. ORCID: 0000-0003-0394-7833 (2014). Quantification of the Impact of Cyber Attack in Critical Infrastructures. Lecture Notes in Computer Science, 8696 L, pp. 316-327. doi: 10.1007/978-3-319-10557-4_35
Popov, P. T., Strigini, L., Riddle, S. & Romanovsky, A. (2001). On Systematic Design of Protectors for Employing OTS Items. Euromicro Conference, 2001. Proceedings. 27th, 2001, pp. 22-29. doi: 10.1109/EURMIC.2001.952434
Povyakalo, A. A., Alberdi, E., Strigini, L. & Ayton, P. (2013). How to discriminate between computer-aided and computer-hindered decisions: a case study in mammography. Medical Decision Making, 33(1), pp. 98-107. doi: 10.1177/0272989x12465490
Robbins, E., King, A. & Howe, J. M. ORCID: 0000-0001-8013-6941 (2020). Backjumping is Exception Handling. Theory and Practice of Logic Programming, 21(2), pp. 125-144. doi: 10.1017/S1471068420000435
Sabouri, A., Komninos, N. & Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, 1, pp. 422-427. doi: 10.1109/cts.2011.5898962
Salako, K. ORCID: 0000-0003-0394-7833 & Zhao, X. (2023). Demonstrating Software Reliability using Possibly Correlated Tests: Insights from a Conservative Bayesian Approach. Quality and Reliability Engineering International, 40(3), pp. 1197-1220. doi: 10.1002/qre.3460
Salako, K. ORCID: 0000-0003-0394-7833 & Strigini, L. (2013). When does "diversity" in development reduce common failures? Insights from probabilistic modelling. IEEE Transactions on Dependable and Secure Computing, 11(2), pp. 193-206. doi: 10.1109/tdsc.2013.32
Salako, K. ORCID: 0000-0003-0394-7833 & Zhao, X. (2023). The Unnecessity of Assuming Statistically Independent Tests in Bayesian Software Reliability Assessments. IEEE Transactions on Software Engineering, 49(4), pp. 2829-2838. doi: 10.1109/TSE.2022.3233802
Schmid, K. & Gacek, C. (2000). Implementation issues in product line scoping. Lecture notes in computer science, 1844, pp. 38-82. doi: 10.1007/978-3-540-44995-9_11
Schrammel, P., Kroening, D., Brain, M. ORCID: 0000-0003-4216-7151 , Martins, R., Teige, T. & Bienmüller, T. (2017). Incremental bounded model checking for embedded software. Formal Aspects of Computing, 29(5), pp. 911-931. doi: 10.1007/s00165-017-0419-1
Spurgin, A. J. & Stupples, D. (2012). Impact of accidents on organizational aspects of nuclear utilities. International Journal of Economics and Management Engineering, 2(4), pp. 132-144.
Strigini, L. & Wright, D. (2014). Bounds on survival probability given mean probability of failure per demand; And the paradoxical advantages of uncertainty. Reliability Engineering and System Safety, 128, pp. 66-83. doi: 10.1016/j.ress.2014.02.004
Tselikis, C., Douligeris, C., Mitropoulos, S. , Komninos, N. & Tselikis, G. (2017). Adaptation of a Conference Key Distribution System for the Wireless Ad Hoc Network. 2017 IEEE International Conference on Communications (ICC), doi: 10.1109/ICC.2017.7996339
Tselikis, C., Mitropoulos, S., Komninos, N. & Douligeris, C. (2012). Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Communications Letters, 16(5), pp. 619-621. doi: 10.1109/lcomm.2012.031912.112484
Van Delft, B., Hunt, S. & Sands, D. (2015). Very static enforcement of dynamic policies. Lecture Notes in Computer Science, 9036, pp. 32-52. doi: 10.1007/978-3-662-46666-7_3
Yamaguchi, T., Brain, M. ORCID: 0000-0003-4216-7151, Ryder, C. , Imai, Y. & Kawamura, Y. (2019). Application of Abstract Interpretation to the Automotive Electronic Control System. Lecture Notes in Computer Science (VMCAI 2019: Verification, Model Checking, and Abstract Interpretation), 11388, pp. 425-445. doi: 10.1007/978-3-030-11245-5_20
Zhang, Z., Krol, M. ORCID: 0000-0002-3437-8621, Sonnino, A. , Zhang, L. & Rivière, E. (2021). EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On. Proceedings on Privacy Enhancing Technologies, 2021(2), pp. 70-87. doi: 10.2478/popets-2021-0018
Zhao, X. ORCID: 0000-0002-3474-349X, Littlewood, B., Povyakalo, A. A. , Strigini, L. & Wright, D. (2018). Conservative Claims for the Probability of Perfection of a Software-based System Using Operational Experience of Previous Similar Systems. Reliability Engineering and System Safety, 175, pp. 265-282. doi: 10.1016/j.ress.2018.03.032
Zhao, X., Littlewood, B., Povyakalo, A. A. , Strigini, L. & Wright, D. (2017). Modeling the probability of failure on demand (pfd) of a 1-out-of-2 system in which one channel is “quasi-perfect”. Reliability Engineering & System Safety, 158, pp. 230-245. doi: 10.1016/j.ress.2016.09.002
Zhao, X., Salako, K. ORCID: 0000-0003-0394-7833, Strigini, L. ORCID: 0000-0002-4246-2866 , Robu, V. & Flynn, D. (2020). Assessing Safety-Critical Systems from Operational Testing: A Study on Autonomous Vehicles. Information and Software Technology, 128, article number 106393. doi: 10.1016/j.infsof.2020.106393
de Lemos, R., Gacek, C. & Romanovsky, A. (2003). Architectural mismatch tolerance. Lecture Notes in Computer Science, 2677, pp. 175-194. doi: 10.1007/3-540-45177-3_8
van der Meulen, M., Riddle, S., Strigini, L. & Jefferson, N. (2005). Protective wrapping of off-the-shelf components. COTS-based Software Systems, 3412, pp. 168-177. doi: 10.1007/978-3-540-30587-3_27
van der Meulen, M., Strigini, L. & Revilla, M. A. (2005). On the effectiveness of run-time checks. Computer Safety, Reliability and Security, 3688, pp. 151-164. doi: 10.1007/11563228_12
Book
Jones, C. B., Jones, K., Lindsay, P. A. & Moore, R. (1990). Mural: A formal development support system. London: Springer-Verlag.
Book Section
Algaith, A., Gashi, I., Sobesto, B. , Cukier, M., Haxhijaha, S. & Bajrami, G. (2016). Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop. (pp. 48-53). IEEE. doi: 10.1109/DSN-W.2016.45
Bayer, J., Gacek, C., Muthig, D. & Widen, T. (2000). PuLSE-I: Deriving instances from a product line infrastructure. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop. (pp. 237-245). London, UK: IEEE Computer Society. doi: 10.1109/ECBS.2000.839882
Bishop, P. G. & Bloomfield, R. E. (1998). A Methodology for Safety Case Development. In: Redmill, F. & Anderson, T. (Eds.), Industrial Perspectives of Safety-critical Systems: Proceedings of the Sixth Safety-critical Systems Symposium, Birmingham 1998. . London, UK: Springer.
Bishop, P. G. & Bloomfield, R. E. (1995). The SHIP Safety Case. In: Safecomp '95 : The 14th International Conference on Computer Safety, Reliability and Security. . London, UK: Springer.
Bishop, P. G. & Bloomfield, R. E. (2002). Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects. In: Software Reliability Engineering, 2002. ISSRE 2003. Proceedings. 13th International Symposium on. (pp. 295-303). IEEE.
Bishop, P. G., Bloomfield, R. E., Clement, T. , Guerra, S. & Jones, C. (2003). Integrity static analysis of COTS/SOUP. In: Anderson, S. O., Felici, M. & Littlewood, B. (Eds.), Knowledge-Based Intelligent Information and Engineering Systems 7th INternational Conference, KES 2003, Oxford, UK, September 2003. Proceedings, Part I. Lecture Notes in Computer Science, 2788. (pp. 63-76). London, UK: Springer. doi: 10.1007/b12002
Bishop, P. G., Bloomfield, R. E., Guerra, S. & Thuy, N. (2012). Safety justification frameworks: Integrating rule-based, goal-based and risk-informed approaches. In: 8th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies 2012, NPIC and HMIT 2012: Enabling the Future of Nuclear Energy. (pp. 1283-1290). Illinois, USA: American Nuclear Society.
Bishop, P. G., Penny, J., Eaton, A. & Bloomfield, R. E. (2001). The Practicalities of Goal-Based Safety Regulation. In: Redmill, F. & Anderson, T. (Eds.), Aspects of Safety Management: Proceedings of the Ninth Safety-critical Systems Symposium, Bristol, UK 2001. (pp. 35-48). London; New York: Springer.
Bishop, P. G., Tourlas, K. & Chozos, N. (2010). An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems. In: Schoitsch, E. (Ed.), Computer safety, reliability, and security. Lecture Notes in Computer Science, 6351. (pp. 375-388). London, UK: Springer. doi: 10.1007/978-3-642-15651-9_28
Littlewood, B. (1996). Evaluation of software dependability. In: Wand, I. C. & Milner, R. (Eds.), Computing Tomorrow: Future Research Directions in Computer Science. (pp. 198-216). New York, USA: Cambridge University Press.
Littlewood, B. & Strigini, L. (2000). Software reliability and dependability: a roadmap. In: Finkelstein, A (Ed.), The Future of Software Engineering. State of the Art Reports given at the 22nd Int. Conf. on Software Engineering. (pp. 177-188). ACM Press. doi: 10.1145/336512.336551
Mantas, G., Komninos, N., Rodriuez, J. , Logota, E. & Marques, H. (2015). Security for 5G Communications. In: Rodriguez, J. (Ed.), Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.. doi: 10.1002/9781118867464.ch9
Netkachov, O., Popov, P. T. ORCID: 0000-0002-3434-5272 & Salako, K. ORCID: 0000-0003-0394-7833 (2019). Quantitative Evaluation of the Efficacy of Defence-in-Depth in Critical Infrastructures. In: Resilience of Cyber-Physical Systems. (pp. 89-121). Berlin, Germany: Springer International Publishing. doi: 10.1007/978-3-319-95597-1_5
Strigini, L. (2005). Fault Tolerance Against Design Faults. In: Diab, H. & Zomaya, A. (Eds.), Dependable Computing Systems: Paradigms, Performance Issues, and Applications. (pp. 213-241). John Wiley & Sons.
Strigini, L. (2012). Fault tolerance and resilience: meanings, measures and assessment. In: Wolter, K., Avritzer, A., Vieira, M. & van Moorsel, A. (Eds.), Resilience Assessment and Evaluation of Computing Systems. . Berlin, Germany: Springer.
Strigini, L. & Bertolino, A. (1996). Acceptance Criteria for Critical Software Based on Testability Estimates and Test Results. In: Lecture notes in computer science. (pp. 83-94). Springer.
Conference or Workshop Item
Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China. doi: 10.1109/CyberC.2012.31
Aghazadeh Chakherlou, R., Salako, K. ORCID: 0000-0003-0394-7833 & Strigini, L. ORCID: 0000-0002-4246-2866 (2022). Arguing safety of an improved autonomous vehicle from safe operation before the change: new results. In: RAIS 2022 2nd International Workshop on Reliability of Autonomous Intelligent Systems. RAIS 2022 2nd International Workshop on Reliability of Autonomous Intelligent Systems, 31 Oct - 3 Nov 2022, Charlotte, NC, USA. doi: 10.1109/ISSREW55968.2022.00085
Alberdi, E., Strigini, L., Leach, K. , Ryan, P., Palanque, P. & Winckler, M. (2009). Gaining assurance in a voter-verifiable voting system. In: Proceedings - 2009 2nd International Conference on Dependability, DEPEND 2009. 2009 Second International Conference on Dependability, 18 - 23 Jun 2009, Athens, Greece.
Alves, F., Andongabo, A, Gashi, I. ORCID: 0000-0002-8017-3184 , Ferreira, P. M. & Bessani, A. (2020). Follow the blue bird: A study on threat data published on Twitter. Paper presented at the 25th European Symposium on Research in Computer Security (ESORICS) 2020, 14-18 Sep 2020, Guildford, UK.
Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N. ORCID: 0000-0003-3313-1560, Fuchs, G. , Scarlatti, D., Cordero Garcia, J. M., Vouros, G. A., Herranz, R. & Marcos, R. (2018). Visual analytics of flight trajectories for uncovering decision making strategies. In: SESAR Innovation Days. Eighth SESAR Innovation Days, 3-7 Dec 2018, Salzburg, Austria.
Bessani, A. N., Reiser, H. P., Sousa, P. , Gashi, I., Stankovic, V. ORCID: 0000-0002-8740-6526, Distler, T., Kapitza, R., Daidone, A. & Obelheiro, R. R. (2008). FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. In: Douglis, F (Ed.), Middleware (Companion). ACM/IFIP/USENIX Middleware '08 Conference doi: 10.1145/1462735.1462763
Bishop, P. ORCID: 0000-0003-3307-5159 & Povyakalo, A. A. ORCID: 0000-0002-4068-422X (2022). Optimising the Reliability that can be Claimed for a Software-based System based on Failure-free Tests of its components. In: Computer Safety, Reliability, and Security. 41st International Conference, SAFECOMP 2022, 6-9 Sep 2022, Munich, Germnay. doi: 10.1007/978-3-031-14835-4
Bishop, P. ORCID: 0000-0003-3307-5159, Povyakalo, A. ORCID: 0000-0002-4068-422X & Strigini, L. ORCID: 0000-0002-4246-2866 (2022). Bootstrapping confidence in future safety based on past safe operation. In: 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE). 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE 2022), 31 Oct - 3 Nov 2022, Charlotte, NC, USA. doi: 10.1109/ISSRE55969.2022.00020
Bishop, P. G. (2013). Does software have to be ultra reliable in safety critical systems?. Paper presented at the SAFECOMP 2013, 32nd International Conference on Computer Safety, Reliability and Security, 24 - 27 September 2013, Toulouse, France.
Bishop, P. G. (2002). Estimating Residual Faults from Code Coverage. Paper presented at the SAFECOMP 2002, 10 - 13 Sept 2002, Catania, Italy.
Bishop, P. G. (2003). MC/DC based estimation and detection of residual faults in PLC logic networks. In: Fast Abstracts, Supplementary Proceedings. 14th IEEE International Symposium on Software Reliability Engineering ISSRE 2003, 17 - 20 Nov 2003, Denver, Colorado.
Bishop, P. G. (2015). Modeling the Impact of Testing on Diverse Programs. In: Koornneef, F & van Gulijk, C (Eds.), LNCS Computer Safety, Reliabilty and Security. 34th International Conference, SAFECOMP 2015, 23-09-2015 - 25-09-2015, Delft, The Netherlands. doi: 10.1007/978-3-319-24255-2
Bishop, P. G. (1997). Using reversible computing to achieve fail-safety. In: EIGHTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS. Eighth International Symposium On Software Reliability Engineering, 2 - 5 Nov 1997, Albuquerque, NM , USA.
Bishop, P. G. & Bloomfield, R. E. (2003). Using a Log-normal Failure Rate Distribution for Worst Case Bound Reliability Prediction. Paper presented at the 14th IEEE International Symposium on Software Reliability Engineering (ISSRE 2003), 17 - 20 Nov 2003, Denver, Colorado.
Bishop, P. G., Bloomfield, R. E. & Cyra, L. (2013). Combining Testing and Proof to Gain High Assurance in Software: a Case Study. In: Not known (Ed.), TBD. IEEE International Symposium on Software Reliability Engineering (ISSRE 2013), 4 - 7 Nov 2013, Pasadena, CA, USA.
Bishop, P. G., Burns, G. & Anderson, S. O. (1993). Stepwise Development and Verification of a Boiler System Specification. Paper presented at the International Workshop on the Design and Review of Software Controlled Safety-related Systems, 28 - 29 Jun 1993, National Research Council, Ottawa, Canada.
Bishop, P. G. & Cyra, L. (2012). Overcoming non-determinism in testing smart devices: how to build models of device behaviour. Paper presented at the 11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliability Conference 2012 (PSAM11 & ESREL 2012), 25 - 29 June 2012, Helsinki, Finland.
Bishop, P. G., Gashi, I., Littlewood, B. & Wright, D. (2007). Reliability modeling of a 1-out-of-2 system: Research with diverse Off-the-shelf SQL database servers. In: OConner, L (Ed.), ISSRE 2007: 18TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS. The 18th IEEE International Symposium on Software Reliability (ISSRE '07), 5 - 9 Nov 2007, Trollhättan, Sweden.
Bishop, P. G. & Strigini, L. (2014). Estimating Worst Case Failure Dependency with Partial Knowledge of the Difficulty Function. In: Bondavalli, A & Di Giandomenico, F (Eds.), LNCS Computer Safety Reliability and Security. 33rd International Conference, SAFECOMP 2014, 10-09-2014 - 12-09-2014, Florence, Italy. doi: 10.1007/978-3-319-10506-1
Bloomfield, R. E., Bendele, M., Bishop, P. G. , Stroud, R. & Tonks, S. (2016). The risk assessment of ERTMS-based railway systems from a cyber security perspective: Methodology and lessons learned. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). First International Conference, RSSRail 2016, 28-30 Jun 2016, Paris, France. doi: 10.1007/978-3-319-33951-1_1
Bloomfield, R. E., Butler, E. & Netkachova, K. (2017). Assurance of open systems dependability: developing a framework for automotive security and safety. Paper presented at the Sixth Workshop on Open Systems Dependability, 21 Oct 2017, Tokyo, Japan.
Bloomfield, R. E., Buzna, L., Popov, P. T. , Salako, K. ORCID: 0000-0003-0394-7833 & Wright, D. (2010). Stochastic modelling of the effects of interdependencies between critical infrastructure. In: Lecture Notes in Computer Science. 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany.
Bloomfield, R. E., Chozos, N. & Salako, K. ORCID: 0000-0003-0394-7833 (2009). Current capabilities, requirements and a proposed strategy for interdependency analysis in the UK. In: Rome, E & Bloomfield, RE (Eds.), CRITIS. 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany. doi: 10.1007/978-3-642-14379-3_16
Bloomfield, R. E., Gashi, I., Povyakalo, A. A. & Stankovic, V. ORCID: 0000-0002-8740-6526 (2008). Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. In: ISSRE. 19th International Symposium on Software Reliability Engineering, 2008, 10 - 14 Nov 2008, Seattle, USA. doi: 10.1109/ISSRE.2008.62
Bloomfield, R. E., Littlewood, B. & Wright, D. (2007). Confidence: Its role in dependability cases for risk assessment. In: 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS. 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 25 - 28 June 2008, Edinburgh, UK. doi: 10.1109/DSN.2007.29
Bloomfield, R. E., Netkachova, K. & Stroud, R. (2013). Security-Informed Safety: If it's not secure, it's not safe. Paper presented at the 5th International Workshop on Software Engineering for Resilient Systems (SERENE 2013), 03rd - 04th October 2013, Kiev, Ukraine.
Bloomfield, R. E. & Parisaca-Vargas, A. (2015). Using Ontologies to Support Model-based Exploration of the Dependencies between Causes and Consequences of Hazards. Paper presented at the 7th International Conference on Knowledge Engineering and Ontology Development, 12-11-2015 - 14-11-2015, Lisbon, Portugal.
Bobrovnikova, K., Lysenko, S., Popov, P. T. ORCID: 0000-0002-3434-5272 , Denysiuk, D. & Goroshko, A. (2021). Technique for IoT cyberattacks detection based on the energy consumption analysis. In: CEUR Workshop Proceedings. IntelITSIS’2021: 2nd International Workshop on Intelligent Information Technologies and Systems of Information Security, 24-26 Mar 2021, Khmelnytskyi, Ukraine.
Brain, M. ORCID: 0000-0003-4216-7151, Niemetz, A., Preiner, M. , Reynolds, A., Barrett, C. & Tinelli, C. (2019). Invertibility Conditions for Floating-Point Formulae. In: Dillig, I. & Tasiran, S. (Eds.), Computer Aided Verification. CAV 2019.
Cukier, M., Gashi, I., Sobesto, B. & Stankovic, V. ORCID: 0000-0002-8740-6526 (2013). Does Malware Detection Improve With Diverse AntiVirus Products? An Empirical Study. Paper presented at the 32nd International Conference on Computer Safety, Reliability and Security (SAFECOMP), 24- - 27 September 2013, Toulouse, France.
Fengou, M. A., Mantas, G., Lymberopoulos, D. & Komninos, N. (2011). Ubiquitous healthcare profile management applying smart card technology. In: Nikita, KS, Lin, JC, Fotiadis, DI & Waldmeyer, MTA (Eds.), MobiHealth. Second International ICST Conference, MobiHealth 2011, 5 - 7 October 2011, Kos Island, Greece. doi: 10.1007/978-3-642-29734-2_34
Frankl, P. G., Hamlet, D., Littlewood, B. & Strigini, L. (1997). Choosing a testing method to deliver reliability. In: PROCEEDINGS OF THE 1997 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING. Software Engineering
Gacek, C. (2004). An interdisciplinary perspective of dependability in Open Source Software. In: Jacquart, R (Ed.), BUILDING THE INFORMATION SOCIETY. Building the Information Society, 22 - 27 August 2004, Toulouse, France.
Gacek, C., Arief, B. & Lawrie, T. (2001). Software architectures and Open Source Software: Where can research leverage the most?. Paper presented at the 1st Workshop on Open Source Software Engineering: Making Sense of the Bazaar (part of the 23rd IEEE International Conference on Software Engineering (ICSE 2001)), 15 May 2001, Toronto, Canada.
Gacek, C., Lawrie, T. & Arief, B. (2002). Interdisciplinary insights on Open Source. Paper presented at the Open Source Software Development Workshop, 25 - 26 Feb 2002, Newcastle upon Tyne, UK.
Gadala, M., Strigini, L. ORCID: 0000-0002-4246-2866 & Fujdiak, R. (2022). Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs. In: Proceedings of the 17th International Conference on Availability, Reliability and Security. ARES 20222: The 17th International Conference on Availability, Reliability and Security, 23-26 Aug 2022, Vienna, Austria. doi: 10.1145/3538969.3544474
Garcia, M., Bessani, A. N., Gashi, I. , Neves, N. & Obelheiro, R. R. (2011). OS diversity for intrusion tolerance: Myth or reality? In: Proceedings of the International Conference on Dependable Systems and Networks. 41st International Conference on Dependable Systems & Networks (DSN), 27 - 30 Jun 2011, Hong Kong.
Gashi, I., Bloomfield, R., Bloomfield, R. E. & Stroud, R. (2012). How secure is ERTMS?. Paper presented at the Workshop on Dependable and Secure Computing for Large-scale Complex Critical Infrastructures (DESEC4LCCI), 25 September 2012, Herrenkrug, Germany.
Gashi, I., Mason, S., Lugini, L. , Marasco, E. & Cukic, B. (2014). Interoperability between Fingerprint Biometric Systems: An Empirical Study. Paper presented at the IEEE International Conference on Dependable Systems and Networks, 23rd - 26th June 2014, Atlanta, GA, USA.
Gashi, I. & Popov, P. T. (2006). Rephrasing rules for off-the-shelf SQL database servers. In: Ceballos, S (Ed.), EDCC 2006: Sixth European Dependable Computing Conference, Proceedings. Sixth European Dependable Computing Conference, 2006 (EDCC '06), 18 - 20 Oct 2006, Coimbra, Portugal.
Gashi, I. & Popov, P. T. (2007). Uncertainty explicit assessment of off-the-shelf software: Selection of an optimal diverse pair. In: ICCBSS 2007: SIXTH INTERNATIONAL IEEE CONFERENCE ON COMMERCIAL-OFF-THE-SHELF (COTS)-BASED SOFTWARE SYSTEMS, PROCEEDINGS. Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, 26 Feb - 2 Mar 2007, Banff, Canada.
Gashi, I., Popov, P. T. & Strigini, L. (2004). Fault diversity among off-the-shelf SQL database servers. In: 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS. International Conference on Dependable Systems and Networks, 28 Jun - 1 Jul 2004
Gashi, I., Povyakalo, A. A., Strigini, L. , Matschnig, M, Hinterstoisser, T & Fischer, B (2014). Diversity for Safety and Security in Embedded Systems. Paper presented at the IEEE International Conference on Dependable Systems and Networks, 23-06-2014 - 26-06-2014, Atlanta, GA, USA.
Gashi, I., Stankovic, V. ORCID: 0000-0002-8740-6526, Cukier, M. & Sobesto, B. (2012). Diversity with AntiVirus products: Additional empirical studies. Paper presented at the 42nd IEEE International Conference on Dependable Systems and Networks (DSN) 2012, 25 - 28 June 2012, Boston, USA.
Gashi, I., Stankovic, V. ORCID: 0000-0002-8740-6526, Leita, C. & Thonnard, O. (2009). An Experimental Study of Diversity with Off-The-Shelf AntiVirus Engines. In: 2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS. Eighth IEEE International Symposium on Network Computing and Applications, 9 - 11 July 2009, Cambridge, MA, USA.
Gashi, I. ORCID: 0000-0002-8017-3184 & Ul Asad, H. (2018). Diversity in Open Source Intrusion Detection Systems. In: Computer Safety, Reliability, and Security. SAFECOMP 2018. SAFECOMP 2018, 18-21 Sep 2018, Västerås, Sweden.
Georgakakis, E., Komninos, N. & Douligeris, C. (2012). NAVI: Novel authentication with visual information. In: ISCC. IEEE Symposium on Computers and Communications (ISCC), 1 - 4 July 2012, Cappadocia, Turkey. doi: 10.1109/ISCC.2012.6249360
Gàmez Montolio, A., Florit, E., Brain, M. ORCID: 0000-0003-4216-7151 & Howe, J. ORCID: 0000-0001-8013-6941 (2024). Efficient Normalized Reduction and Generation of Equivalent Multivariate Binary Polynomials. Paper presented at the Workshop on Binary Analysis Research, 1 Mar 2024, San Diego, USA. doi: 10.14722/bar.2024.23014
Hovorushchenko, T., Aleksov, S., Ishtvan, E. , Voichur, O. & Popov, P. T. ORCID: 0000-0002-3434-5272 (2023). Recognizing the Situations and Supporting the Decision-Making in the Residential Luminosity Control Subsystem of «Smart House» Cyber-Physical System. In: CEUR Workshop Proceedings. Intelligent Information Technologies & Systems of Information Security 2023, 22-24 Mar 2023, Khmelnytskyi, Ukraine.
Hunt, S., Askarov, A., Sabelfeld, A. & Sands, D. (2008). Termination-insensitive noninterference leaks more than just a bit. In: Proc. 13th European Symposium on Research in Computer Security (ESORICS'08). 13th European Symposium on Research in Computer Security, Oct 2008, Malaga, Spain.
Hunt, S. & Clark, D. (2008). Non-interference for deterministic interactive programs. In: Proc. 5th International Workshop on Formal Aspects in Security and Trust. 5th International Workshop on Formal Aspects in Security and Trust (FAST2008), Oct 2008, Malaga, Spain.
Hunt, S. & Mastroeni, I. (2005). The PER model of abstract non-interference. In: Hankin, C. & Siveroni, I. (Eds.), Static Analysis. SAS 2005. Proc. Static Analysis, 12th International Symposium doi: 10.1007/11547662_13
Hunt, S. & Sands, D. (2011). From exponential to polynomial-time security typing via principal types. In: Lecture Notes in Computer Science. European Symposium on Programming, 26 March 2011 - 3 Apr 2011, Saarbrücken, Germany.
Hunt, S. & Sands, D. (2008). Just forget it - The semantics and enforcement of information erasure. In: Lecture Notes in Computer Science. European Symposium on Programming, 29 Mar 2008 - 6 Apr 2008, Budapest, Hungary.
Hunt, S. & Sands, D. (2006). On flow-sensitive security types. In: ACM SIGPLAN-SIGACT. Principles of Programming Languages, 11 Jan 2006 - 13 Jan 2006, Charleston, South Carolina, USA.
Hunt, S. ORCID: 0000-0001-7255-4465 & Sands, D. (2021). A Quantale of Information. In: 2021 IEEE 34th Computer Security Foundations Symposium (CSF). 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 21-25 Jun 2021, Dubrovnik, Croatia. doi: 10.1109/CSF51468.2021.00031
Jones, K. (2008). Analog and Mixed Signal Verification. Paper presented at the FMCAD 2008 Formal Methods in Computer Aided Design, 17 - 20 Nov 2008, Portland, OR, USA.
Jones, K. & Salako, K. ORCID: 0000-0003-0394-7833 (2013). Modeling Security Policy and the Effect for End-Users. In: Marinos, L. & Askoxylakis, I. (Eds.), Human Aspects of Information Security, Privacy, and Trust. HAS 2013. HCI International 2013: 15th International Conference on Human-Computer Interaction, 21 - 26 Jul 2013, Las Vegas, Nevada, US. doi: 10.1007/978-3-642-39345-7_27
Keizer, N. V., Ascigil, O., Król, M. ORCID: 0000-0002-3437-8621 & Pavlou, G. (2023). Ditto: Towards Decentralised Similarity Search for Web3 Services. In: 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 17-20 Jul 2023, Athens, Greece. doi: 10.1109/dapps57946.2023.00018
Kharchenko, V. S., Odarushchenko, O., Odarushchenko, V. & Popov, P. T. (2013). Selecting Mathematical Software for Dependability Assessment of Computer Systems Described by Stiff Markov Chains. In: Ermolayev, V, Mayr, HC, Nikitchenko, M , Spivakovsky, A, Zholtkevych, G, Zavileysky, M, Kravtsov, H, Kobets, V & Peschanenko, VS (Eds.), ICTERI. 9th International Conference on ICT in Education, Research and Industrial Applications: Integration, Harmonization and Knowledge Transfer, 19-06-2013 - 22-06-2013, Kherson, Ukraine.
Kim, J., Jones, K. & Horowitz, M. (2007). Variable domain transformation for linear PAC analysis of mixed-signal systems. Paper presented at the International Conference on Computer-Aided Design, 2007. ICCAD 2007, 05 - 08 Nov 2007, San Jose, California, USA. doi: 10.1109/ICCAD.2007.4397376
Komninos, N. (2007). Morpheus: stream cipher for software & hardware applications. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.
Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04 - 08 June 2006, Mykonos, Greece.
Komninos, N. & Honary, B. (2001). Modified WAP for secure voice and video communication. In: IEE Conference Publication. 2nd IEE International Conference on 3G Mobile Communication Technologies, 26 - 28 March 2001, London.
Komninos, N. & Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.
Komninos, N. & Honary, B. (2002). Security enhancement for A5/1 without losing hardware efficiency in future mobile systems. In: IEE Conference Publication. 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.
Komninos, N., Honary, B. & Darnell, M. (2000). Secure communication protocol for mobile multimedia applications. Paper presented at the 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC’2000), 12 - 15 November 2000, Bangkok, Thailand.
Komninos, N. & Junejo, A. K. (2015). Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. Paper presented at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 07-12-2015 - 09-12-2015, Limassol, Cyprus.
Komninos, N., Samarakoon, M. I. & Honary, B. (2000). Authentication and key distribution for wired and wireless systems. Paper presented at the 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 19 - 20 June 2000, Liverpool John Moores University, Liverpool, UK.
Komninos, N., Soroush, H. & Salajegheh, M. (2007). LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.
Komninos, N., Tselikis, C. & Douligeris, C. (2013). SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks. Paper presented at the 18th IEEE Symposium on Computers and Communication (ISCC’13), 07 - 10 July 2013, Croatia.
Komninos, N., Vergados, D. D. & Douligeris, C. (2006). Two‐Step Authentication in Mobile Ad Hoc Networks. Paper presented at the Global Mobile Congress, 11-16 Oct 2006, Beijing, China.
Krol, M. ORCID: 0000-0002-3437-8621, Ascigil, O., Rene, S. , Sonnino, A., Al-Bassam, M. & Rivière, E. (2021). Shard scheduler: object placement and migration in sharded account-based blockchains. In: AFT '21: Proceedings of the 3rd ACM Conference on Advances in Financial Technologies. AFT '21: 3rd ACM Conference on Advances in Financial Technologies, 26-28 Sep 2021, Arlington Virginia, USA. doi: 10.1145/3479722.3480989
Krol, M. ORCID: 0000-0002-3437-8621, Sonnino, A., Tasiopoulos, A. , Psaras, I. & Riviere, E. (2020). PASTRAMI: Privacy-preserving, Auditable, Scalable & Trustworthy Auctions for Multiple Items. In: Proceedings of the 21st International Middleware Conference. Middleware '20: 21st International Middleware Conference, 7-11 Dec 2020, Delft, Netherlands. doi: 10.1145/3423211.3425669
Król, M. ORCID: 0000-0002-3437-8621, Ascigil, O., Rene, S. , Sonnino, A., Pigaglio, M., Sadre, R., Lange, F. & Rivière, E. (2024). DISC-NG: Robust Service Discovery in the Ethereum Global Network. In: 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&amp;P). 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 8-12 Jul 2024, Vienna, Austria. doi: 10.1109/eurosp60621.2024.00019
Kysil, V., Popov, P. T. ORCID: 0000-0002-3434-5272, Drachuk, O. , Hnenna, V. & Martyniuk, I. (2024). Concept of Information Technology for Diagnosis and Prognosis of Glaucoma Based on Machine Learning Methods. In: CEUR Workshop Proceedings. IntelITSIS’2024: 5th International Workshop on Intelligent Information Technologies and Systems of Information Security, 28 Mar 2024, Khmelnytskyi, Ukraine.
Littlewood, B. (2000). The problems of assessing software reliability ...When you really need to depend on it. Paper presented at the Conference on Lessons in System Safety.
Littlewood, B. & Bloomfield, R. E. (2004). On the use of diverse arguments to increase confidence in dependability claims. Paper presented at the International Conference on Control and Instrumentation in Nuclear Installations, 2004, Liverpool, UK.
Littlewood, B. & Burns, A. (2010). Reasoning About the Reliability of Multi-version, Diverse Real-Time Systems. Paper presented at the 31st IEEE Real-Time Systems Symposium, 30 November - 03 December 2010, San Diego, USA. doi: 10.1109/RTSS.2010.43
Littlewood, B., Popov, P. T. & Strigini, L. (2001). Design diversity: an update from research on reliability modelling. In: Redmill, F & Anderson, T (Eds.), ASPECTS OF SAFETY MANAGEMENT. 9th Safety-critical Systems Symposium, 2001, Bristol, UK.
Littlewood, B. & Strigini, L. (2004). Redundancy and diversity in security. In: Samarati, P, Ryan, P, Gollmann, D & Molva, R (Eds.), COMPUTER SECURITY ESORICS 2004, PROCEEDINGS. 9th European Symposium on Research in Computer Security, Sept 2004, Sophia Antipolis, France.
Littlewood, B. & Wright, D. (1995). A Bayesian model that combines disparate evidence for the quantitative assessment of system dependability. Paper presented at the 14th International Conference on Computer Safety (SafeComp’95), 11 - 13 October 1995, Belgirate, Italy.
Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (2013). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. In: Proceedings of the RSDA Workshop, the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013). 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013), 24 - 27 June 2013, Budapest, Hungary.
Mereani, F. & Howe, J. M. ORCID: 0000-0001-8013-6941 (2021). Rule Extraction from Neural Networks and Other Classifiers Applied to XSS Detection. In: Morelo, J. J., Garibaldi, J., Linares-Barranco, A. , Warwick, K. & Madani, K. (Eds.), Computational Intelligence. 11th International Joint Conference, IJCCI 2019, 17-19 Sep 2019, Vienna, Austria. doi: 10.1007/978-3-030-70594-7_15
Michalas, A., Bakopoulos, M., Komninos, N. & Prasad, N. R. (2012). Secure & trusted communication in emergency situations. In: 35th IEEE Sarnoff Symposium, SARNOFF 2012 - Conference Proceedings. 35th IEEE Sarnoff Symposium (SARNOFF), 21 - 22 May 2012, Newark, USA. doi: 10.1109/SARNOF.2012.6222751
Michalas, A. & Komninos, N. (2014). The Lord of the Sense: A Privacy Preserving Reputation System for Participatory Sensing Applications. Paper presented at the 19th IEEE Symposium on Computers and Communication (ISCC’2014), 23rd - 26th June 2014, Madeira, Portugal.
Michalas, A., Oleshchuk, V. A., Komninos, N. & Prasad, N. R. (2011). Privacy-preserving scheme for mobile ad hoc networks. In: ISCC. 2011 IEEE Symposium on Computers and Communications (ISCC), 28 June - 1 July 2011, Kerkyra, Greece. doi: 10.1109/ISCC.2011.5983930
Mitrokotsa, A., Komninos, N. & Douligeris, C. (2007). Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks. Paper presented at the The Sixth Annual Mediterranean Ad Hoc Networking WorkShop, 12th - 15th June 2007, Corfu, Greece.
Mourouzis, T., Courtois, N. & Komninos, N. (2014). Advanced truncated differential cryptanalysis of GOST block cipher. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.
Mourouzis, T., Komninos, N. & Christofi, M. (2014). Towards a combined Rotational-Differential Cryptanalytic Framework. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.
Movahedi, Y., Cukier, M., Andongabo, A. & Gashi, I. (2017). Cluster-based Vulnerability Assessment Applied to Operating Systems. In: 2017 13th European Dependable Computing Conference (EDCC). 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.
Netkachova, K., Müller, K., Paulitsch, M. & Bloomfield, R. E. (2015). Investigation into a Layered Approach to Architecting Security-Informed Safety Cases. In: Digital Avionics Systems Conference (DASC), 2015 IEEE/AIAA 34th. 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), 13-09-2015 - 17-09-2015, Prague, Czech Republic. doi: 10.1109/DASC.2015.7311447
Nosyk, Y., Korczyński, M., Gañán, C. H. , Król, M. ORCID: 0000-0002-3437-8621, Lone, Q. & Duda, A. (2024). Don’t Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates. In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 1-3 Nov 2023, Exeter, UK. doi: 10.1109/trustcom60117.2023.00202
Peeroo, K. ORCID: 0000-0001-8601-4750, Popov, P. T. ORCID: 0000-0002-3434-5272, Stankovic, V. ORCID: 0000-0002-8740-6526 & Weyde, T. ORCID: 0000-0001-8028-9905 (2024). Machine Learning for Performance Prediction of Data Distribution Service (DDS). In: 2024 19th European Dependable Computing Conference (EDCC). European Dependable Computing Conference, 8-11 Apr 2024, Leuven, Belgium. doi: 10.1109/edcc61798.2024.00032
Pizza, M. & Strigini, L. (1998). Comparing the effectiveness of testing methods in improving programs: the effect of variations in program quality. In: NINTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS. The Ninth International Symposium on Software Reliability Engineering, 4 - 7 Nov 1998, Paderborn, Germany.
Pizza, M., Strigini, L., Bondavalli, A. & Di Giandomenico, F. (1998). Optimal discrimination between transient and permanent faults. In: THIRD IEEE INTERNATIONAL HIGH-ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS. High-Assurance Systems Engineering Symposium, 13 - 14 Nov 1998, Washington DC, USA.
Popov, P. T., Povyakalo, A. A., Stankovic, V. ORCID: 0000-0002-8740-6526 & Strigini, L. (2014). Software diversity as a measure for reducing development risk. Paper presented at the Tenth European Dependable Computing Conference - EDCC 2014, 13 - 16 May 2014, Newcastle upon Tyne, UK.
Popov, P. T. ORCID: 0000-0002-3434-5272, Buerkle, C., Oboril, F. , Paulitsch, M. & Strigini, L. ORCID: 0000-0002-4246-2866 (2022). Modelling road hazards and the effect on AV safety of hazardous failures. In: 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC). The 25th IEEE International Conference on Intelligent Transportation Systems (IEEE ITSC 2022), 8 Oct - 12 Oct 2022, Macau, China. doi: 10.1109/ITSC55140.2022.9922283
Popov, P. T. & Littlewood, B. (2004). The effect of testing on reliability of fault-tolerant software. In: International Conference on Dependable Systems and Networks, 2004. 2004 International Conference on dependable systems and networks, 28 Jun - 1 Jul 2004, Florence, Italy. doi: 10.1109/DSN.2004.1311896
Popov, P. T., Salako, K. ORCID: 0000-0003-0394-7833 & Stankovic, V. ORCID: 0000-0002-8740-6526 (2015). Stochastic modeling for performance evaluation of database replication protocols. In: Lecture Notes in Computer Science. doi: 10.1007/978-3-319-22264-6_2
Popov, P. T., Stankovic, V. ORCID: 0000-0002-8740-6526 & Strigini, L. (2012). An Empirical Study of the Effectiveness of 'Forcing Diversity' Based on a Large Population of Diverse Programs. Paper presented at the ISSRE 2012, International Symposium on Software Reliability Engineering, 27 - 30 November 2012, Dallas, Texas, USA.
Popov, P. T. & Strigini, L. (2010). Assessing Asymmetric Fault-Tolerant Software. In: ISSRE. Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on, 1 - 4 Nov 2010, San Jose, California. doi: 10.1109/ISSRE.2010.10
Popov, P. T. & Strigini, L. (2001). The reliability of diverse systems: a contribution using modelling of the fault creation process. In: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS. International Conference on Dependable Systems and Networks, 1 - 4 Jul 2001, Goteborg, Sweden.
Popov, P. T., Strigini, L. & Romanovsky, A. (1999). Choosing effective methods for design diversity - How to progress from intuition to science. In: Felici, M, Kanoun, K & Pasquini, A (Eds.), COMPUTER SAFETY, RELIABILITY AND SECURITY. SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security, 1999
Procopiou, A. & Komninos, N. (2015). Current and Future Threats Framework in Smart Grid Domain. Paper presented at the 5th Annual IEEE International Conference on CYBER Technology in Automation Control and Intelligence Systems, 8-06-2015 - 12-06-2015, Shenyang, China.
Salako, K. ORCID: 0000-0003-0394-7833 (2020). Loss-size and Reliability Trade-offs Amongst Diverse Redundant Binary Classifiers. In: Quantitative Evaluation of Systems 2020. 17th International Conference on the Quantitative Evaluation of SysTems (QEST 2020), 31 Aug - 3 Sep 2020, Online. doi: 10.1007/978-3-030-59854-9
Salako, K. ORCID: 0000-0003-0394-7833, Strigini, L. ORCID: 0000-0002-4246-2866 & Zhao, X. (2021). Conservative Confidence Bounds in Safety, from Generalised Claims of Improvement & Statistical Evidence. In: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). The 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 21-24 Jun 2021, Taipei, Taiwan. doi: 10.1109/DSN48987.2021.00055
Sokoto, S., Balduf, L., Trautwein, D. , Wei, Y., Tyson, G., Castro, I., Ascigil, O., Pavlou, G., Korczynski, M., Scheuermann, B. & Krol, M. ORCID: 0000-0002-3437-8621 (2024). Guardians of the Galaxy: Content Moderation in the InterPlanetary File System. In: Proceedings of the 33rd USENIX Security Symposium. USENIX Security Symposium, 14-16 Aug 2024, Philadelphia, USA.
Spanoudakis, G., Kloukinas, C. & Androutsopoulos, K. (2007). Towards security monitoring patterns. Paper presented at the 22nd Annual ACM Symposium on Applied Computing, 11 - 15 March 2007, Seoul, Korea.
Sridhar, S., Ascigil, O., Keizer, N. , Genon, F., Pierre, S., Psaras, Y., Rivière, E. & Krol, M. ORCID: 0000-0002-3437-8621 (2024). Content Censorship in the InterPlanetary File System. In: Proceedings 2024 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium, 26 Feb - 1 Mar 2024, San Diego, USA. doi: 10.14722/ndss.2024.23153
Stankovic, V. ORCID: 0000-0002-8740-6526, Alata, E., Leita, C. , Serafini, M., Thonnard, O., Viniikka, J. & Zurutuza, U. (2008). Malicious Fault Characterization Exploiting Honeypot Data. In: Proc. of the 7th European Dependable Computing Conference (EDCC 2008). 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.
Stankovic, V. ORCID: 0000-0002-8740-6526, Bessani, A. N., Daidone, A. , Gashi, I., Obelheiro, R. R. & Sousa, P. (2009). Enhancing Fault / Intrusion Tolerance through Design and Configuration Diversity. In: Proc. of the 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2009). 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2009), Jun 2009, Estoril, Lisbon, Portugal.
Stankovic, V. ORCID: 0000-0002-8740-6526, Bloomfield, R. E., Bishop, P. G. & Gashi, I. (2011). Diversity for Security: a Study with Off-The-Shelf AntiVirus Engines. Paper presented at the 21st International Symposium on Software Reliability Engineering (ISSRE 2011), Hiroshima, Japan.
Stankovic, V. ORCID: 0000-0002-8740-6526, Lin, S., Pareaud, T. , Robert, T. & Zutautaite-Seputiene, I. (2008). Toward Adaptable Software Architecture for Dependability: ASAP. In: Proc. of the 7th European Dependable Computing Conference (EDCC 2008). 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.
Stankovic, V. ORCID: 0000-0002-8740-6526 & Popov, P. T. (2006). Improving DBMS performance through diverse redundancy. In: Kawada, S (Ed.), SRDS 2006: 25th IEEE Symposium on Reliable Distributed Systems, Proceedings. 25th IEEE Symposium on Reliable Distributed Systems, 2 - 4 Oct 2006, Leeds, UK.
Strigini, L. ORCID: 0000-0002-4246-2866 (2007). Achieving effective diversity between redundant software-based components. In: 6th International Conference on Control and Instrumentation in Nuclear Installations. 6th International Conference on Control and Instrumentation in Nuclear Installations, 11-13 Sep 2007, Manchester, UK.
Strigini, L. ORCID: 0000-0002-4246-2866 (2014). Assessment techniques, certification and [what else we need for] confidence in software. Keynote Paper presented at the WoSoCer 2014, 3-6 Nov 2014, Naples, Italy.
Strigini, L. ORCID: 0000-0002-4246-2866 (2019). Ensuring and demonstrating diverse quality attributes of complex systems: problems of models and cultures. Keynote Paper presented at the GAUSS 2019, 28-31 Oct 2019, Berlin, Germany.
Strigini, L. (2004). Formalism and judgement in assurance cases. Paper presented at the Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities, held at International Conference on Dependable Systems and Networks (DSN 2004), Jun 2004, Florence, Italy.
Strigini, L., Bloomfield, R. E., Paulitsch, M. & Reiger, R. (2012). Evidence-Based Security in Aerospace. From Safety to Security and Back Again. Paper presented at the 23rd International Symposium on Software Reliability Engineering (ISSRE 2012), Fast Abstracts Track, 26 - 29 Nov 2012, Dallas, Texas, USA.
Strigini, L., Bosio, D., Littlewood, B. & Newby, M. J. (2002). Advantages of open source processes for reliability: clarifying the issues. Paper presented at the Workshop on Open Source Software Development, Feb 2002, Newcastle upon Tyne, UK.
Strigini, L., Delic, K. A. & Mazzanti, F. (1998). Formalising Engineering Judgement on Software Dependability via Belief Networks. In: Dependable Computing for Critical Applications (DCCA-6). Sixth IFIP International Working Conference "Can We Rely on Computers?", Mar 1997, Garmisch-Partenkirchen, Germany.
Strigini, L. & Fenton, N. (1996). Rigorously assessing software reliability and safety. In: European Space Agency, (Special Publication) ESA SP. Product Assurance Symposium and Software Product Assurance Workshop, 19-21 Mar 1996, ESTEC, Noordwijk, the Netherlands.
Strigini, L. ORCID: 0000-0002-4246-2866 & Gadala, M. ORCID: 0000-0002-9148-6522 (2020). Human Factors Standards and the Hard Human Factor Problems: Observations on Medical Usability Standards. In: Cabitza, F., Fred, A. & Gamboa, H. (Eds.), Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies. HEALTHINF 2020 - 13th International Conference on Health Informatics, 24-26 Feb 2020, Valletta, Malta.
Strigini, L., Popov, P. T. & Littlewood, B. (2000). Assessing the Reliability of Diverse Fault-Tolerant Systems. Paper presented at the INucE International Conference on Control and Instrumentation in Nuclear Installations, Bristol, UK.
Strigini, L., Popov, P. T. & Romanovsky, A. (2000). Diversity for off-the-shelf components. Paper presented at the International Conference on Dependable Systems & Networks (FTCS-30, DCCA-8), New York, NY, USA.
Strigini, L. & Povyakalo, A. A. (2013). Software fault-freeness and reliability predictions. In: Bitsch, F., Guiochet, J. & Kaaniche, M. (Eds.), Computer Safety, Reliability, and Security. SAFECOMP 2013. SAFECOMP 2013, 32nd International Conference on Computer Safety, Reliability and Security, 24 - 27 September 2013, Toulouse, France.
Strigini, L., Povyakalo, A. A. & Alberdi, E. (2003). Human-machine diversity in the use of computerised advisory systems: a case study. In: Martin, D (Ed.), 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS. International Conference on Dependable Systems and Networks (DSN'03), 22 - 25 Jun 2003, San Francisco, California.
Stroud, R. & Gashi, I. (2012). Methodology for a security audit of ERTMS. Paper presented at the 42nd IEEE International Conference on Dependable Systems and Networks (DSN) 2012, 25 - 28 June 2012, Boston, USA.
Terrosi, F., Strigini, L. ORCID: 0000-0002-4246-2866 & Bondavalli, A. (2022). Impact of Machine Learning on Safety Monitors. In: Lecture Notes in Computer Science. 41st International Conference, SAFECOMP 2022, 6-9 Sep 2022, Munich, Germnay. doi: 10.1007/978-3-031-14835-4_9
Tselikis, C., Douligeris, C., Mitropoulos, S. & Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. In: IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.
Tselikis, C., Mitropoulos, S., Douligeris, C. , Ladis, E., Georgouleas, K., Vangelatos, C. & Komninos, N. (2009). Empirical study of clustering algorithms for wireless ad hoc networks. In: 2009 16th International Conference on Systems, Signals and Image Processing, IWSSIP 2009. 16th International Conference on Systems, Signals and Image Processing (IWSSIP 2009), 18 - 20 June 2009, Chalkida, Greece.
Ul Asad, H., Jones, K. & Surre, F. (2014). Verifying robust frequency domain properties of non linear oscillators using SMT. In: Pleskacz, W., Renovell, M. & Kasprowicz, D. (Eds.), 17th International Symposium on Design and Diagnostics of Electronic Circuits & Systems. 17th Symposium on Design & Diagnostics of Electronic Circuits & Systems, 23rd - 25th April 2014, Warsaw, Poland. doi: 10.1109/DDECS.2014.6868816
Zatserkovnyi, R. ORCID: 0000-0001-6991-2866, Kutsyk, P. ORCID: 0000-0001-5795-9704, Zatserkovna, R. ORCID: 0000-0003-1011-053X , Maik, V. ORCID: 0000-0002-6650-2703 & Popov, P. T. ORCID: 0000-0002-3434-5272 (2024). Enhancing adapted print publication accessibility via text-to-image synthesis. In: CEUR Workshop Proceedings. 1st International Workshop on Intelligent & CyberPhysical Systems (ICyberPhyS 2024), 28 Jun 2024, Khmelnytskyi, Ukraine.
Zhao, X., Littlewood, B., Povyakalo, A. A. & Wright, D. (2015). Conservative Claims about the Probability of Perfection of Software-based Systems. Paper presented at the The 26th IEEE International Symposium on Software Reliability Engineering, 02-11-2015 - 05-11-2015, Washington DC, USA.
Zhao, X., Robu, V., Flynn, D. , Salako, K. ORCID: 0000-0003-0394-7833 & Strigini, L. (2020). Assessing the Safety and Reliability of Autonomous Vehicles from Road Testing. In: 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE). ISSRE 2019 - the 20th International Symposium on Software Reliability Engineering, 28 - 31 October 2019, Berlin, Germany. doi: 10.1109/ISSRE.2019.00012
Monograph
Bishop, P. G. ORCID: 0000-0003-3307-5159, Povyakalo, A. A. ORCID: 0000-0002-4068-422X & Strigini, L. ORCID: 0000-0002-4246-2866 (2021). Bootstrapping confidence in future safety based on past safe operation. .
Gadala, M., Strigini, L. ORCID: 0000-0002-4246-2866 & Ayton, P. (2021). Improving Human Decisions by Adjusting the Alerting Thresholds for Computer Alerting Tools According to User and Task Characteristics. .
Strigini, L. ORCID: 0000-0002-4246-2866 & Huang, F. (2021). HEDP: A Method for Early Forecasting Software Defects based on Human Error Mechanisms. .
Other
Mourouzis, T., Wojcik, M. & Komninos, N. (2016). On The Security Evaluation of Partial Password Implementations.
Report
Bishop, P. G., Bloomfield, R. E., Gashi, I. & Stankovic, V. (2012). Diverse protection systems for improving security: a study with AntiVirus engines. London, UK: City University London.
Bloomfield, R. E., Chozos, N., Popov, P. T. , Stankovic, V. ORCID: 0000-0002-8740-6526, Wright, D. & Howell-Morris, R. (2010). Preliminary Interdependency Analysis (PIA): Method and tool support (D/501/12102/2 v2.0). London: Adelard LLP and City University London.
Bloomfield, R. E. ORCID: 0000-0002-2050-6151, Fletcher, G., Khlaaf, H. , Ryan, P., Kinoshita, S., Kinoshit, Y., Takeyama, M., Matsubara, Y., Popov, P. T. ORCID: 0000-0002-3434-5272, Imai, K. & Tsutake, Y. (2020). Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1 (Project Ref: 01/18/05). London, UK: Adelard.
Bloomfield, R. E. ORCID: 0000-0002-2050-6151, Fletcher, G., Khlaaf, H. , Ryan, P., Kinoshita, S., Kinoshit, Y., Takeyama, M., Matsubara, Y., Popov, P. T. ORCID: 0000-0002-3434-5272, Imai, K. & Tsutake, Y. (2020). Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 2 (Project Ref: 01/18/05). London, UK: Adelard.
Bloomfield, R. E. ORCID: 0000-0002-2050-6151 & Rushby, J. (2022). Assessing Confidence with Assurance 2.0 (SRI-CSL-2022-02). California, USA: SRI International.
Bloomfield, R. E. & Wetherilt, A. (2012). Computer trading and systemic risk: a nuclear perspective (Driver Review DR26). London, UK: Government Office for Science.
Fenton, N., Littlewood, B., Neil, M. , Strigini, L., Wright, D. R. & Courtois, P.-J. (1997). Bayesian belief network model for the safety assessment of nuclear computer-based systems (52). Brussels: DeVa ESPRIT Long Term Research Project.
Gashi, I. & Bloomfield, R. E. (2008). Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems. Centre for Software Reliability, City University London.
Littlewood, B., Bainbridge, I. & Bloomfield, R. E. (1998). The use of computers in safety-critical applications. London, UK: Health and Safety Commission.
Littlewood, B. & Povyakalo, A. A. (2012). Conservative bounds for the pfd of a 1-out-of-2 software-based system based on an assessor’s subjective probability of "not worse than independence" (CSR Technical Report, 20 May 2012). London: Centre for Software Reliability, City University London.
Littlewood, B. & Povyakalo, A. A. (2012). Conservative reasoning about epistemic uncertainty for the probability of failure on demand of a 1-out-of-2 software-based system in which one channel is "possibly perfect" (CSR Technical Report 20 March 2012). London: Centre for Software Reliability, City University London.
Littlewood, B., Strigini, L., Wright, D. & Courtois, P.-J. (1998). Examination of Bayesian belief network for safety assessment of nuclear computer-based systems (70). Brussels: DeVa ESPRIT Long Term Research Project.
Littlewood, B. & Wright, D. (1996). Reliability prediction of a software product using testing data from other products or execution environment (10). Brussels: DeVa Project.
Littlewood, B. & Wright, D. (1996). Some conservative stopping rules for the operational testing of saftey-critical software (33). Brussels: DeVa ESPRIT Long Term Research Project.
Popov, P. T. (2012). Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Fault-Tolerant Off-the-Shelf Software. Centre for Software Reliability, City University London.
Salako, K. ORCID: 0000-0003-0394-7833, Strigini, L. ORCID: 0000-0002-4246-2866 & Zhao, X. (2021). Proofs of Conservative Confidence Bounds on PFD, Using Claims of Improved Reliability. London, UK: Centre for Software Reliability, City, University of London.
Stankovic, V. ORCID: 0000-0002-8740-6526 & Strigini, L. (2009). A survey on online monitoring approaches of computer-based systems. London, UK: Centre for Software Reliability, City University London.
Strigini, L. (1996). Engineering judgement in reliability and safety and its limits: what can we learn from research in psychology?. .
Strigini, L. & Littlewood, B. (1997). Guidelines for Statistical Testing (PASCON/WO6-CCN2/TN12). ESA/ESTEC project PASCON.
Strigini, L. & Littlewood, B. (2000). A discussion of practices for enhancing diversity in software designs. London, UK: Centre for Software Reliability, City University London.
Wright, D. & Strigini, L. (2013). Bounds on survival probability given mean probability of failure per demand; and the paradoxical advantages of uncertainty. London: City University London.
Software
Popov, P. T. ORCID: 0000-0002-3434-5272 Conservative reliability assessment of a 2-channel software system when one of the channels is probably perfect (MATLAB code used in section 5)
Popov, P. T. (2015). A SAN model for safety and security analysis of the eMotor, an ASIL-D device
Salako, K. ORCID: 0000-0003-0394-7833, Stankovic, V. ORCID: 0000-0002-8740-6526 & Popov, P. T. (2015). Stochastic model for performance evaluation of database replication protocols
Thesis
Chugh, S. (2020). Machine learning modelling, optimisation and thermal compensation of photonic waveguides. (Unpublished Doctoral thesis, City, University of London)
Finney, K. M. (1998). The application of Software Metrics to the area of Formal Specification. (Unpublished Doctoral thesis, City, University of London)
Gashi, I. (2007). Software dependability with off-the-shelf components. (Unpublished Doctoral thesis, City, University of London)
Hall, T. (1998). The Critical Success Factors of Quality Assurance and Measurement Practice in the Software Industry. (Unpublished Doctoral thesis, City University)
Salako, K. ORCID: 0000-0003-0394-7833 (2012). Extension to models of coincident failure in multiversion software. (Unpublished Doctoral thesis, City University London)
Stankovic, V. ORCID: 0000-0002-8740-6526 (2008). Performance Implications of Using Diverse Redundancy for Database Replication. (Unpublished Doctoral thesis, City, University of London)
Zhao, X. (2016). On the probability of perfection of Software-Based systems. (Unpublished Doctoral thesis, School of Mathematics, Computer Science & Engineering)
van der Meulen, M. (2008). The Effectiveness of Software Diversity. (Unpublished Doctoral thesis, City University London)
Working Paper
Bishop, P. G. ORCID: 0000-0003-3307-5159 & Povyakalo, A. A. (2022). Optimising the reliability that can be claimed for a software-based system based on failure-free tests of its components. .