Centre for Software Reliability
  1. News
  2. Staff
  3. Research
  4. Publications
  5. Courses
  6. Consultancy & Advisory Services
  7. CSR Seminars
  8. Contact CSR
Centre for Software Reliability

Centre for Software Reliability Publications

Results

Date is between 2014 and 2020 inclusive AND Divisions matches any of "Centre for Software Reliability" - City Research Online

Date is between 2014 and 2020 inclusive AND Divisions matches any of "Centre for Software Reliability"

Displaying results 1 to 20 of 30.
Refine search | New search | 1 | 2 | Next
Order the results:
Export 30 results as [feed] RSS 2.0 [feed] RSS
1. Andongabo, A. & Gashi, I. (2017). vepRisk - A Web Based Analysis Tool for Public Security Data. Paper presented at the 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.
[img]
Preview
2. Movahedi, Y., Cukier, M., Andongabo, A. & Gashi, I. (2017). Cluster-based Vulnerability Assessment Applied to Operating Systems. Paper presented at the 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.
[img]
Preview
3. Bloomfield, R. E., Popov, P. T., Salako, K., Stankovic, V. & Wright, D. (2017). Preliminary Interdependency Analysis: An Approach to Support Critical Infrastructure Risk Assessment. Reliability Engineering and System Safety, doi: 10.1016/j.ress.2017.05.030 Item availability may be restricted.
[img]
4. Tselikis, C., Mitropoulos, S., Douligeris, C., Tselikis, G. & Komninos, N. (2017). Adaptation of a Conference Key Distribution System for the Wireless Ad Hoc Network. 2017 2016 IEEE International Conference on Communications (ICC),
[img]
Preview
5. Zhao, X., Littlewood, B., Povyakalo, A. A., Strigini, L. & Wright, D. (2017). Modeling the probability of failure on demand (pfd) of a 1-out-of-2 system in which one channel is “quasi-perfect”. Reliability Engineering & System Safety, 158, pp. 230-245. doi: 10.1016/j.ress.2016.09.002 Item availability may be restricted.
[img] [img]
Preview
6. Mourouzis, T., Wojcik, M. & Komninos, N. (2016). On The Security Evaluation of Partial Password Implementations. .
[img]
Preview
7. Algaith, A., Gashi, I., Sobesto, B., Cukier, M., Haxhijaha, S. & Bajrami, G. (2016). Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop. (pp. 48-53). IEEE. ISBN 978-1-5090-3688-2
[img]
Preview
8. Bishop, P. G. & Povyakalo, A. A. (2016). Deriving a frequentist conservative confidence bound for probability of failure per demand for systems with different operational and test profiles. Reliability Engineering & System Safety, Item availability may be restricted.
[img] [img]
9. Bloomfield, R. E., Bendele, M., Bishop, P. G., Stroud, R. & Tonks, S. (2016). The risk assessment of ERTMS-based railway systems from a cyber security perspective: Methodology and lessons learned. Paper presented at the First International Conference, RSSRail 2016, 28-30 Jun 2016, Paris, France.
[img]
Preview
10. Bishop, P. G. (2015). Modeling the Impact of Testing on Diverse Programs. Paper presented at the 34th International Conference, SAFECOMP 2015, 23-09-2015 - 25-09-2015, Delft, The Netherlands.
[img]
Preview
11. Popov, P. T., Salako, K. & Stankovic, V. (2015). Stochastic modeling for performance evaluation of database replication protocols. Lecture Notes in Computer Science, 9259(9259), pp. 21-37. doi: 10.1007/978-3-319-22264-6_2 ISSN 0302-9743
[img]
Preview
12. Popov, P. T. (2015). A SAN model for safety and security analysis of the eMotor, an ASIL-D device
[img]
13. Bloomfield, R. E. & Parisaca-Vargas, A. (2015). Using Ontologies to Support Model-based Exploration of the Dependencies between Causes and Consequences of Hazards. Paper presented at the 7th International Conference on Knowledge Engineering and Ontology Development, 12-11-2015 - 14-11-2015, Lisbon, Portugal.
[img]
Preview
14. Komninos, N. & Junejo, A. K. (2015). Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. Paper presented at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 07-12-2015 - 09-12-2015, Limassol, Cyprus.
[img]
Preview
15. Mantas, G., Komninos, N., Rodriuez, J., Logota, E. & Marques, H. (2015). Security for 5G Communications. In: J. Rodriguez (Ed.), Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.. ISBN 9781118867464
[img]
Preview
16. Procopiou, A. & Komninos, N. (2015). Current and Future Threats Framework in Smart Grid Domain. Paper presented at the 5th Annual IEEE International Conference on CYBER Technology in Automation Control and Intelligence Systems, 8-06-2015 - 12-06-2015, Shenyang, China.
[img]
Preview
17. Salako, K., Stankovic, V. & Popov, P. T. (2015). Stochastic model for performance evaluation of database replication protocols
[img]
18. Van Delft, B., Hunt, S. & Sands, D. (2015). Very static enforcement of dynamic policies. Lecture Notes in Computer Science, 9036, pp. 32-52. doi: 10.1007/978-3-662-46666-7_3
[img]
Preview
19. Zhao, X., Littlewood, B., Povyakalo, A. A. & Wright, D. (2015). Conservative Claims about the Probability of Perfection of Software-based Systems. Paper presented at the The 26th IEEE International Symposium on Software Reliability Engineering, 02-11-2015 - 05-11-2015, Washington DC, USA.
[img]
Preview
20. Bishop, P. G., Bloomfield, R. E., Littlewood, B., Popov, P. T., Povyakalo, A. A. & Strigini, L. (2014). A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train. Reliability Engineering & System Safety, 130, pp. 61-68. doi: 10.1016/j.ress.2014.04.002
[img]
Preview
Displaying results 1 to 20 of 30.
Refine search | New search | 1 | 2 | Next
Order the results:
\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n
\n \n
\n

Date is between 2014 and 2020 inclusive AND Divisions matches any of \"Centre for Software Reliability\"

\n
Displaying results 1 to 20 of 30.
Refine search | New search | 1 | 2 | Next
Order the results:
\n\n \n \n\n\n \n\n
Export 30 results as \"[feed]\" RSS 2.0 \"[feed]\" RSS
\n \n
\n\n
\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n\n \n \n \n \n \n
1.\n \n\n\n \n Andongabo, A. & Gashi, I. (2017).\n vepRisk - A Web Based Analysis Tool for Public Security Data.\n Paper presented at the 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.\n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
2.\n \n\n\n \n Movahedi, Y., Cukier, M., Andongabo, A. & Gashi, I. (2017).\n Cluster-based Vulnerability Assessment Applied to Operating Systems.\n Paper presented at the 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.\n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
3.\n \n\n\n Bloomfield, R. E., Popov, P. T., Salako, K., Stankovic, V. & Wright, D. (2017).\n Preliminary Interdependency Analysis: An Approach to Support Critical Infrastructure Risk Assessment.\n Reliability Engineering and System Safety,\n \n doi: 10.1016/j.ress.2017.05.030\n \n\n\n \n Item availability may be restricted.\n \n \n \n
\n \n \"[img]\"\n \n
\n \n \n \n
4.\n \n\n\n Tselikis, C., Mitropoulos, S., Douligeris, C., Tselikis, G. & Komninos, N. (2017).\n Adaptation of a Conference Key Distribution System for the Wireless Ad Hoc Network.\n 2017 2016 IEEE International Conference on Communications (ICC),\n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
5.\n \n\n\n Zhao, X., Littlewood, B., Povyakalo, A. A., Strigini, L. & Wright, D. (2017).\n Modeling the probability of failure on demand (pfd) of a 1-out-of-2 system in which one channel is “quasi-perfect”.\n Reliability Engineering & System Safety, 158,\n pp. 230-245.\n doi: 10.1016/j.ress.2016.09.002\n \n\n\n \n Item availability may be restricted.\n \n \n \n
\n \n \"[img]\"\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
6.\n \n\n\n Mourouzis, T., Wojcik, M. & Komninos, N. (2016).\n On The Security Evaluation of Partial Password Implementations.\n .\n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
7.\n \n\n\n Algaith, A., Gashi, I., Sobesto, B., Cukier, M., Haxhijaha, S. & Bajrami, G. (2016).\n Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors.\n In: \n 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop.\n \n (pp. 48-53). IEEE.\n ISBN 978-1-5090-3688-2\n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
8.\n \n\n\n Bishop, P. G. & Povyakalo, A. A. (2016).\n Deriving a frequentist conservative confidence bound for probability of failure per demand for systems with different operational and test profiles.\n Reliability Engineering & System Safety,\n \n \n \n\n\n \n Item availability may be restricted.\n \n \n \n
\n \n \"[img]\"\n \n \"[img]\"\n \n
\n \n \n \n
9.\n \n\n\n \n \n \n \n \n Bloomfield, R. E., Bendele, M., Bishop, P. G., Stroud, R. & Tonks, S. (2016).\n The risk assessment of ERTMS-based railway systems from a cyber security perspective: Methodology and lessons learned.\n Paper presented at the First International Conference, RSSRail 2016, 28-30 Jun 2016, Paris, France.\n \n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
10.\n \n\n\n \n \n \n \n \n Bishop, P. G. (2015).\n Modeling the Impact of Testing on Diverse Programs.\n Paper presented at the 34th International Conference, SAFECOMP 2015, 23-09-2015 - 25-09-2015, Delft, The Netherlands.\n \n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
11.\n \n\n\n \n \n \n \n Popov, P. T., Salako, K. & Stankovic, V. (2015).\n Stochastic modeling for performance evaluation of database replication protocols.\n Lecture Notes in Computer Science, 9259(9259),\n pp. 21-37.\n doi: 10.1007/978-3-319-22264-6_2\n ISSN 0302-9743\n \n \n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
12.\n \n\n\n Popov, P. T. (2015).\n A SAN model for safety and security analysis of the eMotor, an ASIL-D device\n \n \n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"\n \n
\n \n \n \n
13.\n \n\n\n \n \n \n \n \n \n Bloomfield, R. E. & Parisaca-Vargas, A. (2015).\n Using Ontologies to Support Model-based Exploration of the Dependencies between Causes and Consequences of Hazards.\n Paper presented at the 7th International Conference on Knowledge Engineering and Ontology Development, 12-11-2015 - 14-11-2015, Lisbon, Portugal.\n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
14.\n \n\n\n \n \n \n \n \n \n Komninos, N. & Junejo, A. K. (2015).\n Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment.\n Paper presented at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 07-12-2015 - 09-12-2015, Limassol, Cyprus.\n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
15.\n \n\n\n Mantas, G., Komninos, N., Rodriuez, J., Logota, E. & Marques, H. (2015).\n Security for 5G Communications.\n In: J. Rodriguez (Ed.), \n Fundamentals of 5G Mobile Networks.\n \n (pp. 207-220). John Wiley & Sons, Ltd..\n ISBN 9781118867464\n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
16.\n \n\n\n \n \n \n \n \n \n Procopiou, A. & Komninos, N. (2015).\n Current and Future Threats Framework in Smart Grid Domain.\n Paper presented at the 5th Annual IEEE International Conference on CYBER Technology in Automation Control and Intelligence Systems, 8-06-2015 - 12-06-2015, Shenyang, China.\n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
17.\n \n\n\n Salako, K., Stankovic, V. & Popov, P. T. (2015).\n Stochastic model for performance evaluation of database replication protocols\n \n \n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"\n \n
\n \n \n \n
18.\n \n\n\n Van Delft, B., Hunt, S. & Sands, D. (2015).\n Very static enforcement of dynamic policies.\n Lecture Notes in Computer Science, 9036,\n pp. 32-52.\n doi: 10.1007/978-3-662-46666-7_3\n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
19.\n \n\n\n \n \n \n \n \n \n Zhao, X., Littlewood, B., Povyakalo, A. A. & Wright, D. (2015).\n Conservative Claims about the Probability of Perfection of Software-based Systems.\n Paper presented at the The 26th IEEE International Symposium on Software Reliability Engineering, 02-11-2015 - 05-11-2015, Washington DC, USA.\n \n \n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
20.\n \n\n\n Bishop, P. G., Bloomfield, R. E., Littlewood, B., Popov, P. T., Povyakalo, A. A. & Strigini, L. (2014).\n A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train.\n Reliability Engineering & System Safety, 130,\n pp. 61-68.\n doi: 10.1016/j.ress.2014.04.002\n \n\n\n \n \n \n \n \n
\n \n \"[img]\"
\"\"
Preview
\n \n
\n \n \n \n
Displaying results 1 to 20 of 30.
Refine search | New search | 1 | 2 | Next
Order the results:
\n
\n
\n\n\n\n\n \n","fixedProperties":{"divisions":"IICSWR"}}

Find us

City, University of London

Northampton Square

London EC1V 0HB

United Kingdom

Back to top

City, University of London is an independent member institution of the University of London. Established by Royal Charter in 1836, the University of London consists of 18 independent member institutions with outstanding global reputations and several prestigious central academic bodies and activities.