Toggle Main Menu Toggle Search

Open Access padlockePrints

Browsing publications by Professor Aad van Moorsel.

Newcastle AuthorsTitleYearFull text
Dr Lei Shi
Professor Aad van Moorsel
The Face of Deception: The Impact of AI-Generated Photos on Malicious Social Bots2024
Professor Karen Elliott
Kumaran Coopamootoo
Edward Curran
Dr Paul Ezhilchelvan
Dave Horsfall
et al.
Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion2022
Dr Tasos Spiliotopoulos
Dave Horsfall
Dr Magdalene Ng
Dr Kovila Coopamootoo
Professor Aad van Moorsel
et al.
Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials2021
Dr Magdalene Ng
Dave Horsfall
Dr Kovila Coopamootoo
Professor Aad van Moorsel
Professor Karen Elliott
et al.
In pursuit of socially-minded data-intensive innovation in banking: A focus group study of public expectations of digital innovation in banking2021
Professor Karen Elliott
Dr Tasos Spiliotopoulos
Dr Magdalene Ng
Dr Kovila Coopamootoo
Professor Aad van Moorsel
et al.
Towards an Equitable Digital Society: Artificial Intelligence (AI) and Corporate Digital Responsibility (CDR)2021
Dr Deepak Puthal
Dr Zhenyu Wen
Professor Aad van Moorsel
Professor Raj Ranjan
A User-centric Security Solution for Internet of Things and Edge Convergence2020
Isaac Matthews
Dr John Mace
Dr Sadegh Soudjani
Professor Aad van Moorsel
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach2020
Maher Alharby
Amjad Aldweesh
Professor Aad van Moorsel
Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma2020
Dr Mhairi Aitken
Dr Ehsan Toreini
Peter Carmichael
Dr Kovila Coopamootoo
Professor Karen Elliott
et al.
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices2020
Gladys -
Dr Magdalene Ng
Dr Ehsan Toreini
Professor Aad van Moorsel
Dr Kovila Coopamootoo
et al.
Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking2020
Dr Magdalene Ng
Dr Kovila Coopamootoo
Dr Ehsan Toreini
Gladys -
Professor Karen Elliott
et al.
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance2020
Dr Ehsan Toreini
Dr Mhairi Aitken
Dr Kovila Coopamootoo
Professor Karen Elliott
Dr Vlad Gonzalez
et al.
The relationship between trust in AI and trustworthy machine learning technologies2020
Mohammed Ali
Dr Muhammad Ajmal Azad
Mario Parreño Centeno
Professor Feng Hao
Professor Aad van Moorsel
et al.
Consumer-facing technology fraud: Economics, attack methods and potential solutions2019
Dr Mutaz Barika
Professor Aad van Moorsel
Professor Raj Ranjan
Orchestrating big data analysis workflows in the cloud: Research challenges, survey, and future directions2019
Dr Deepak Puthal
Professor Philip James
Professor Aad van Moorsel
Professor Raj Ranjan
Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World2019
Mario Parreño Centeno
Dr Yu Guan
Professor Aad van Moorsel
Mobile based continuous authentication using deep features2018
Dr Paul Ezhilchelvan
Amjad Aldweesh
Professor Aad van Moorsel
Non-Blocking Two Phase Commit Using Blockchain2018
Dr John Mace
Nipun Thekkummal
Dr Charles Morisset
Professor Aad van Moorsel
ADaCS: A tool for Analysing Data Collection Strategies2017
Dr John Mace
Nipun Thekkummal
Dr Charles Morisset
Professor Aad van Moorsel
ADaCS: A Tool for Analysing Data Collection Strategies2017
Dr Changyu Dong
Dr Yilei Wang
Amjad Aldweesh
Patrick Mccorry
Professor Aad van Moorsel
et al.
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing2017
Mohammed Ali
Dr Leonardus Arief
Dr Martin Emms
Professor Aad van Moorsel
Does The Online Card Payment Landscape Unwittingly Facilitate Fraud?2017
Professor Raj Ranjan
Top Phengsuwan
Professor Philip James
Professor Stuart Barr
Professor Aad van Moorsel
et al.
Urban Risk Analytics in the Cloud2017
Amjad Aldweesh
Professor Aad van Moorsel
A Survey about Blockchain Software Architectures2016
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Aad van Moorsel
Modeling and analysis of influence power for information security decisions2016
Dr Maryam Mehrnezhad
Mohammed Ali
Professor Feng Hao
Professor Aad van Moorsel
NFC Payment Spy: A Privacy Attack on Contactless Payments2016
Dr Iryna Yevseyeva
Professor Vitor Fernandes
Professor Aad van Moorsel
Two-stage security controls selection2016
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
WRAD: Tool Support for Workflow Resiliency Analysis and Design2016
Dr Iryna Yevseyeva
James Turland
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
et al.
Addressing consumerization of IT risks with nudging2015
Dr Stephen McGough
Dr Budi Arief
Dr Carl Gamble
Dr John Brennan
Professor John Fitzgerald
et al.
Detecting insider threats using ben-ware: Beneficial intelligent software for identifying anomalous human behaviour2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Impact of Policy Design on Workflow Resiliency Computation Time2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Impact of policy design on workflow resiliency computation time2015
Dr Stephen McGough
Dr John Brennan
Dr Leonardus Arief
Dr Carl Gamble
Professor Aad van Moorsel
et al.
Insider Threats: Identifying Anomalous Human Behaviour in Hereogeneous Systems Using Beneficial Intelligent Software (Ben-ware)2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling user availability in workflow resiliency analysis2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling user availability in workflow resiliency analysis2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Modelling User Availability in Workflow Resiliency Analysis2015
Dr James Turland
Dr Debora Jeske
Professor Pam Briggs
Professor Aad van Moorsel
Nudging towards security; Developing and application for wireless network selection for android phones2015
Rob Cain
Professor Aad van Moorsel
Optimisation of data collection strategies for model-based evaluation and decision-making: poster2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Quantitative Workflow Resiliency2015
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Resiliency Variance in Workflows with Choice2015
Dr Iryna Yevseyeva
Professor Aad van Moorsel
Selecting Optimal Subset of Security Controls2015
Dr Iryna Yevseyeva
Professor Aad van Moorsel
Selecting optimal subset of security controls2015
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
A Decision Making Model of Influencing Behavior in Information Security2014
Dr Iryna Yevseyeva
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
A Decision Making Model of Influencing Behavior in Information Security2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A Formal Model for Soft Enforcement: Influencing the Decision-Maker2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A formal model for soft enforcement: Influencing the decision-maker2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
A Formal Model for Soft Enforcement: Influencing the Decision-Maker2014
Dr Iryna Yevseyeva
Dr Charles Morisset
James Turland
Professor Thomas Gross
Christopher Laing
et al.
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging2014
Dr Iryna Yevseyeva
Dr Charles Morisset
James Turland
Professor Thomas Gross
Professor Aad van Moorsel
et al.
Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging2014
Dr Martin Emms
Dr Leonardus Arief
Professor Aad van Moorsel
Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors2014
Dr Charles Morisset
Dr Iryna Yevseyeva
Professor Thomas Gross
Professor Aad van Moorsel
Formalization of Influencing in Information Security2014
Dr Martin Emms
Dr Leonardus Arief
Dr Leo Freitas
Joe Hannon
Professor Aad van Moorsel
et al.
Harvesting high value foreign currency transactions from EMV contactless cards without the PIN2014
Dr Martin Emms
Dr Leonardus Arief
Dr Leo Freitas
Joe Hannon
Professor Aad van Moorsel
et al.
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN2014
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
Dr Iryna Yevseyeva
Nudging for Quantitative Access Control Systems2014
Dr Charles Morisset
Professor Thomas Gross
Professor Aad van Moorsel
Dr Iryna Yevseyeva
Nudging for quantitative access control systems2014
Wen Zeng
Professor Aad van Moorsel
Performance Modelling and Evaluation of Enterprise Information Security Technologies2014
Wen Zeng
Professor Maciej Koutny
Professor Aad van Moorsel
Performance Modelling and Evaluation of Enterprise Information Security Technologies2014
Dr John Mace
Dr Charles Morisset
Professor Aad van Moorsel
Quantitative Workflow Resiliency2014
Dr Martin Emms
Dr Leo Freitas
Professor Aad van Moorsel
Rigorous Design and Implementation of an Emulator for EMV Contactless Payments2014
Professor Pam Briggs
Dr Debora Jeske
Professor Aad van Moorsel
SCENE: A structured means for creating and evaluating behavioral nudges in a cyber security environment2014
Dr Leonardus Arief
Dr Kovila Coopamootoo
Dr Martin Emms
Professor Aad van Moorsel
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse2014
Winai Wongthai
Francisco Rocha Liberal Rocha
Professor Aad van Moorsel
A Generic Logging Template for Infrastructure as a Service Cloud2013
Suliman Alsuhibany
Dr Charles Morisset
Professor Aad van Moorsel
Detection of attack strategies2013
Suliman Alsuhibany
Ahmad Alonaizi
Dr Charles Morisset
Dr Christopher Smith
Professor Aad van Moorsel
et al.
Experimental investigation in the impact on security of the release order of defensive algorithms2013
Win Wongthai
Professor Aad van Moorsel
Logging Solutions to Mitigate Risks Associated With Threats in Infrastructure as a Service Cloud2013
Dr Martin Emms
Dr Leonardus Arief
Joe Hannon
Professor Aad van Moorsel
POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards2013
Dr Martin Emms
Dr Leonardus Arief
Joe Hannon
Professor Aad van Moorsel
POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards2013
Dr Martin Emms
Dr Leonardus Arief
Professor Aad van Moorsel
Risks of Offline Verify PIN on Contactless Cards2013
Dr Martin Emms
Dr Leonardus Arief
Professor Aad van Moorsel
Risks of Offline Verify PIN on Contactless Cards2013
Dr David Greathead
Dr Leonardus Arief
Professor Aad van Moorsel
Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults2012
Dr Christopher Smith
Professor Aad van Moorsel
Driving Privacy Controls with Social Context2012
Suliman Alsuhibany
Ahmad Alonaizi
Dr Christopher Smith
Professor Aad van Moorsel
Optimising the Release Order of Defensive Mechanisms2012
Professor Aad van Moorsel
Optimization of Data Collection Strategies for Model-Based Evaluation and Decision-Making2012
Dr Martin Emms
Dr Leonardus Arief
Fei Hao
Professor Aad van Moorsel
The Dangers of Verify PIN on Contactless Cards2012
Professor Feng Li
Dr Dariusz Pienkowski
Professor Aad van Moorsel
Dr Christopher Smith
A Holistic Framework for Trust in Online Transactions2011
Dr Simon Parkin
Professor Aad van Moorsel
Cooperative Information Security Knowledge: Content Validation and incentives to contribute2011
Emeritus Professor Richard Thomson
Fiona Beyer
Dr John Colquhoun
Professor Julia Critchley
Professor Martin Eccles
et al.
Development and usability testing of a shared decision support tool for cardiovascular risk reduction in primary care2011
Professor Aad van Moorsel
Dr Martin Emms
Dr Leonardus Arief
Digital Strategy for the Social Inclusion of Survivors of Domestic Violence2011
Rouaa Yassin Kassab
Professor Aad van Moorsel
Formal Mapping of WSLA Contracts on Stochastic Models2011
Wen Zeng
Professor Aad van Moorsel
Quantitative Evaluation of Enterprise DRM Technology2011
Dr John Mace
Professor Aad van Moorsel
Professor Paul Watson
The Case for Dynamic Security Solutions in Public Cloud Workflow Deployments2011
Dr Leonardus Arief
Dr David Greathead
Professor Aad van Moorsel
Towards the Implementation of an Internet-based Neighbourhood Watch Scheme: Impacts of Inclusive Technologies on Societies2011
Johari Abdullah
Professor Aad van Moorsel
Uncertainty and Uncertainty Tolerance in Service Provisioning2011
Dr John Mace
Dr Simon Parkin
Professor Aad van Moorsel
A Collaborative Ontology Development Tool for Information Security Managers2010
Dr Simon Parkin
Professor Aad van Moorsel
A Stealth Approach to Usable Security: Helping IT Security Managers to Identify Workable Security Solutions2010
Dr Simon Parkin
Professor Aad van Moorsel
A stealth approach to usable security: helping IT security managers to identify workable security solutions2010
Maciej Machulak
Professor Aad van Moorsel
Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications2010
Maciej Machulak
Professor Aad van Moorsel
Design and implementation of user-managed access framework for web 2.0 applications2010
Maciej Machulak
Lukasz Moren
Professor Aad van Moorsel
Design and Implementation of User-Managed Access Framework for Web 2.0 Applications2010
Dr Katinka Wolter
Professor Aad van Moorsel
Evaluating the adaptivity of computing systems2010
Dr Christopher Smith
Professor Aad van Moorsel
Mitigating Provider Uncertainty In Service Provision Contracts2010
Dr Rouaa Yassin Kassab
Professor Aad van Moorsel
Predicting Compliance of WSLA Contracts Using Automated Model Creation2010
Emeritus Professor Richard Thomson
Dr John Colquhoun
Fiona Beyer
Professor Julia Critchley
Dr Mark Lambert
et al.
Risk Communication and Shared Decision Making in High Risk Cardiovascular Patients - a Tool in Development2010
Maciej Machulak
Professor Aad van Moorsel
User-managed access to web resources2010
Maciej Machulak
Professor Aad van Moorsel
User-Managed Access to Web Resources2010
Daria Stepanova
Dr Simon Parkin
Professor Aad van Moorsel
A Knowledge Base for Justified Information Security Decision-Making2009
Daria Stepanova
Dr Simon Parkin
Professor Aad van Moorsel
A Knowledge Base for Justified Information Security Decision-Making2009
Maciej Machulak
Professor Aad van Moorsel
A Novel Approach to Access Control for the Web2009
Dr Christopher Smith
Professor Aad van Moorsel
An Architecture for Cross-Cloud System Management2009
Christopher Smith
Professor Aad van Moorsel
An architecture for cross-cloud system management2009
Dr Christopher Smith
Professor Aad van Moorsel
An Architecture for Cross-Cloud System Management2009
Dr Christopher Smith
Professor Aad van Moorsel
An Empirical Evaluation Of Web Services Architectures From An Economic Perspective2009
Dr Simon Parkin
Professor Aad van Moorsel
An Information Security Ontology Incorporating Human-Behavioral Implications2009
Dr Simon Parkin
Professor Aad van Moorsel
An Information Security Ontology Incorporating Human-Behavioural Implications2009
Dr Christopher Smith
Professor Aad van Moorsel
Dr Dariusz Pienkowski
Dr Fei Li
An Institutional Approach to Trust in Electronic Transactions2009
Maciej Machulak
Dr Simon Parkin
Professor Aad van Moorsel
Architecting Dependable Access Control Systems for Multi Domain Computing Environments2009
Maciej Machulak
Dr Simon Parkin
Professor Aad van Moorsel
Architecting dependable access control systems for multi-domain computing environments2009
Dr John Colquhoun
Fiona Beyer
Professor Julia Critchley
Dr Mark Lambert
Robert Sugden
et al.
Cardiovascular Risk Communication Software for Patients and Clinicians2009
Marios Andreou
Professor Aad van Moorsel
COTraSE: Connection Oriented Traceback in Switched Ethernet2009
Professor Aad van Moorsel
Dependability in the cloud: Challenges and opportunities2009
Huqui Zhang
Professor Aad van Moorsel
Fast generation of scale free networks with directed arcs2009
Huqui Zhang
Professor Aad van Moorsel
Fast Generation of Scale Free Networks with Directed Arcs2009
Huqui Zhang
Professor Aad van Moorsel
Fast Generation of Scale Free Networks with Directed Arcs2009
Professor Aad van Moorsel
Introduction to the Proceedings of the EDOC 2009 Workshop Middleware for Web Services (MWS) 20092009
Dr John Mace
Dr Simon Parkin
Professor Aad van Moorsel
Ontology Editing Tool for Information Security and Human Factors Experts2009
Maciej Machulak
Dr Simon Parkin
Professor Aad van Moorsel
Proceedings of the First Trust Economics Workshop2009
Dr Simon Parkin
Professor Aad van Moorsel
Risk Modelling of Access Control Policies with Human Behavioural Factors2009
Maciej Machulak
Professor Aad van Moorsel
Use Cases for User-Centric Access Control for the Web2009
Marios Andreou
Professor Aad van Moorsel
COTraSE: Connection Oriented Traceback in Switched Ethernet2008
Marios Andreou
Professor Aad van Moorsel
COTraSE: Connection Oriented Traceback in Switched Ethernet2008
Professor Aad van Moorsel
Professor Graham Morgan
Efficient Resource Management for Game Server Hosting2008
Huqui Zhang
Professor Aad van Moorsel
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust2008
Huqui Zhang
Professor Aad van Moorsel
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust2008
Huqui Zhang
Professor Aad van Moorsel
Evaluation of P2P algorithms for probabilistic trust inference in a web of trust2008
Professor Aad van Moorsel
International workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)2008
Professor Aad van Moorsel
Introduction to the proceedings of the EDOC 2008 workshop Middleware for Web Services (MWS) 20082008
Marios Andreou
Professor Aad van Moorsel
Logging Based IP Traceback in Switched Ethernets2008
Rouaa Yassin Kassab
Professor Aad van Moorsel
Mapping WSLA on Reward Constructs in Möbius2008
Christiaan Lamprecht
Professor Aad van Moorsel
Runtime security adaptation using adaptive SSL2008
Dr Simon Parkin
Rouaa Yassin Kassab
Professor Aad van Moorsel
The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies2008
Dr Simon Parkin
Dr Rouaa Yassin Kassab
Professor Aad van Moorsel
The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies2008
Dr Simon Parkin
Professor Aad van Moorsel
Trust Economics Feasibility Study2008
Dr Simon Parkin
Professor Aad van Moorsel
Trust Economics Feasibility Study2008
Dr Simon Parkin
Professor Aad van Moorsel
A Trust-economic Perspective on Information Security Technologies2007
Christiaan Lamprecht
Professor Aad van Moorsel
Adaptive SSL: Design, Implementation and Overhead Analysis2007
Christiaan Lamprecht
Professor Aad van Moorsel
Adaptive SSL: Design, implementation and overhead analysis2007
Professor Aad van Moorsel
Evaluation of P2P search algorithms for discovering trust paths2007
Emerson Ribeiro De Mello
Professor Aad van Moorsel
Evaluation of P2P Search Algorithms for Discovering Trust Paths2007
Emerson Ribeiro De Mello
Professor Aad van Moorsel
Evaluation of P2P Search Algorithms for Discovering Trust Paths2007
Professor Aad van Moorsel
Introduction to the proceedings of the EDOC 2007 Workshop Middleware for Web Services (MWS) 20072007
Marios Andreou
Professor Aad van Moorsel
IP Traceback in a Switched Ethernet Network2007
Dr Christopher Smith
Professor Aad van Moorsel
Mitigating Provider Uncertainty in Service Provision Contracts2007
Dr Christopher Smith
Professor Aad van Moorsel
Mitigating Provider Uncertainty in Service Provision Contracts2007
Professor Aad van Moorsel
PMCCS-8. The Eighth International Workshop on Performability Modeling of Computer and Communication Systems, September 20-21, 2007, Edinburgh, Scotland2007
Professor Aad van Moorsel
Service Availability: 4th International Service Availability Symposium, (ISAS 2007). Durham, NH, USA. 21-22 May.2007
Professor Aad van Moorsel
Dr Katinka Wolter
Analysis of restart mechanisms in software systems2006
Professor Aad van Moorsel
Dr Katinka Wolter
Experimental analysis of the correlation of HTTP GET invocations2006
Professor Aad van Moorsel
Dr Katinka Wolter
Experimental analysis of the correlation of HTTP GET invocations2006
Professor Aad van Moorsel
Introduction to the Proceedings of the EDOC 2006 workshop Middleware for Web Services (MWS) 20062006
Christiaan Lamprecht
Professor Aad van Moorsel
Dr Nigel Thomas
Investigating the efficiency of cryptographic algorithms in online transactions2006
Dr Christopher Smith
Professor Aad van Moorsel
On Efficient Stateful Resource Management2006
Emerson Ribeiro De Mello
Professor Savas Parastatidis
Dr Christopher Smith
Professor Aad van Moorsel
Professor Jim Webber
et al.
Secure and Provable Service Support for Human-Intensive Real-Estate Processes2006
Emerson Ribeiro De Mello
Professor Savas Parastatidis
Dr Christopher Smith
Professor Aad van Moorsel
Professor Jim Webber
et al.
Secure and Provable Service Support for Human-Intensive Real-Estate Processes2006
Professor Savas Parastatidis
Professor Aad van Moorsel
Professor Jim Webber
Secure and provable service support for human-intensive real-estate processes2006
Professor Aad van Moorsel
Dr Katinka Wolter
The fast and the fair: A fault-injection-driven comparison of restart oracles for reliable Web Services2006
Professor Aad van Moorsel
Grid, management and self-management2005
Professor Aad van Moorsel
Method and Apparatus for Use in Specifying and Insuring Service-Level Quality of Service in Computer Networks2005
Professor Aad van Moorsel
On best-effort and dependability, service-orientation and panacea2005
Professor Aad van Moorsel
On best-effort and dependability, service-orientation and panacea2005
Christiaan Lamprecht
Professor Aad van Moorsel
Performance Measurement of Web Services Security Software2005
Professor Aad van Moorsel
Self-Star Properties in Complex Information Systems: Conceptual and Practical Foundations2005
Dr Carlos Molina-Jimenez
Professor Aad van Moorsel
The Role of Agreements in IT Management Software2005
Dr Carlos Molina-Jimenez
Professor Aad van Moorsel
The role of agreements in IT management software2005
Professor Aad van Moorsel
Dr Katinka Wolter
A Measurement Study of the Interplay between Application Level Restart and Transport Protocol2004
Professor Aad van Moorsel
Analysis and algorithms for restart2004
Professor Aad van Moorsel
Dr Katinka Wolter
Meeting Deadlines Through Restart2004
Professor Aad van Moorsel
Method and Apparatus for use in Specifying and Insuring Policies for Management of Computer Networks2004
Professor Aad van Moorsel
Methods and Apparatus for Managing Middleware Service in a Distributed System2004
Dr Nigel Thomas
Professor Aad van Moorsel
Open issues in grid performability2004
Professor Aad van Moorsel
Dr Katinka Wolter
Optimal restart times for moments of completion time2004
Professor Aad van Moorsel
Optimal Restart Times for Moments of Completion Time2004
Professor Aad van Moorsel
Impact of Virtualization on Management Systems2003
Professor Aad van Moorsel
Managed Utility Computing: The Grid as Management Backplane2003
Professor Aad van Moorsel
Management += Grid2003
Professor Aad van Moorsel
Optimization of Failure Detection Retry Times2003
Professor Aad van Moorsel
Specifying and Monitoring Guarantees in Commercial Grids through SLA2003
Professor Aad van Moorsel
Web Services Management Network: An Overlay Network for Federated Service Management2003
Professor Aad van Moorsel
Automated SLA Monitoring for Web Services2002
Professor Aad van Moorsel
Design of a Business Process Analyzer2002
Professor Aad van Moorsel
Optimal Allocation of Test Resources for Software Reliability Growth Modeling in Software Development2002
Professor Aad van Moorsel
Quality of Business Driven Service Composition and Utility Computing2002
Professor Aad van Moorsel
Ten-Step Survival Guide for the Emerging Business Web2002
Professor Aad van Moorsel
A Peer-to-Peer Architecture for Delivering E-Services2001
Professor Aad van Moorsel
Metrics for the Internet Age: Quality of Experience and Quality of Business2001
Professor Aad van Moorsel
Metrics for the Internet Age: Quality of Experience and Quality of Business2001
Dr Katinka Wolter
Professor Aad van Moorsel
The Relationship between Quality of Service and Business Metrics: Monitoring, Notification and Optimization2001
Professor Aad van Moorsel
Bridging the Gap between Application Semantics and Group Communication Protocols2000
Professor Aad van Moorsel
Building Dependable Internet Services with E-speak2000
Professor Aad van Moorsel
Gallifrey: A Component-Based Framework for Building Policy-Based Management Applications2000
Professor Aad van Moorsel
User-Centric QoS Policies, or Saying What and How2000
Professor Aad van Moorsel
Design of a Resource Manager for Fault-Tolerant CORBA1999
Professor Aad van Moorsel
The 'QoS Query Service' for Improved Quality-of-Service Decision Making in CORBA1999
Professor Aad van Moorsel
A Management Interface for Distributed Fault Tolerance CORBA Services1998
Professor Aad van Moorsel
A Methodology for Detection and Estimation of Software Aging1998
Professor Aad van Moorsel
Action Models: A Reliability Modeling Formalism for Fault-Tolerant Distributed Computing Systems1998
Professor Aad van Moorsel
Design and Implementation of an SNMP Agent for Managing NTSwift1998
Professor Aad van Moorsel
Metrics for Representing Performance as Rewards in Performability Models1998
Professor Aad van Moorsel
Numerical Solution of Non-homogeneous Markov Processes through Uniformization1998
Professor Aad van Moorsel
Reusable Software Components for Performability Tools, and Their Utilization for Web-Based Configurable Tools1998
Professor Aad van Moorsel
A Suite of Internet-Accessible Analysis Tools1997
Professor Aad van Moorsel
Offering Computing Services Through Networks of Simple HTTP Servers1997
Professor Aad van Moorsel
Optimization of Reliability Allocation and Testing Schedule for Software Systems1997
Professor Aad van Moorsel
Providing System Analysis Tools over the Internet1997
Professor Aad van Moorsel
Transient Solution of Markov Models by Combining Adaptive and Standard Uniformization1997
Professor Aad van Moorsel
Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures1996
Professor Aad van Moorsel
Combining Adaptive and Standard Uniformization1996
Professor Aad van Moorsel
Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models1996
Professor Aad van Moorsel
Mehar Afroz Qureshi
Expected Impulse Rewards in Markov Regenerative Stochastic Petri Nets1996
Professor Aad van Moorsel
Probabilistic Evaluation for the Analytical Solution of Large Markov Models: Algorithms and Tool Support1996
Professor Aad van Moorsel
Towards Performability Modeling of Software Rejuvenation1996
Professor Aad van Moorsel
Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures1995
Professor Aad van Moorsel
UltraSAN Version 3.0 Overview1995
Professor Aad van Moorsel
Using the Probabilistic Evaluation Tool for the Analytical Solution of Large Markov Models1995
Professor Aad van Moorsel
Adaptive Uniformization1994
Professor Aad van Moorsel
Xmgm: Performance Modeling Using Matrix Geometric Techniques1994
Professor Aad van Moorsel
A Unified Performability Evaluation Framework for Computer and Communication Systems1993
Professor Aad van Moorsel
MGMtool: A Performance Analysis Tool Based on Matrix Geometric Methods1993
Professor Aad van Moorsel
PhD Thesis: Performability Evaluation Concepts and Techniques1993
Professor Aad van Moorsel
A Method for Analysing the Performance Aspects of the Fault-Tolerance Mechanisms in FDDI1992
Professor Aad van Moorsel
Fault Injection Simulation: A Variance Reduction Technique for Systems with Rare Events1992
Professor Aad van Moorsel
Performance of a Connectionless Protocol over ATM1992
Professor Aad van Moorsel
Fault Injection Simulation1991
Professor Aad van Moorsel
[PhD Thesis] Optimal Routing in Simple Queueing Networks1989