Dr Lei Shi Professor Aad van Moorsel
| The Face of Deception: The Impact of AI-Generated Photos on Malicious Social Bots | 2024 |
|
Professor Karen Elliott Kumaran Coopamootoo Edward Curran Dr Paul Ezhilchelvan Dave Horsfall et al. | Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion | 2022 |
|
Dr Tasos Spiliotopoulos Dave Horsfall Dr Magdalene Ng Dr Kovila Coopamootoo Professor Aad van Moorsel et al. | Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials | 2021 |
|
Dr Magdalene Ng Dave Horsfall Dr Kovila Coopamootoo Professor Aad van Moorsel Professor Karen Elliott et al. | In pursuit of socially-minded data-intensive innovation in banking: A focus group study of public expectations of digital innovation in banking | 2021 |
|
Professor Karen Elliott Dr Tasos Spiliotopoulos Dr Magdalene Ng Dr Kovila Coopamootoo Professor Aad van Moorsel et al. | Towards an Equitable Digital Society: Artificial Intelligence (AI) and Corporate Digital Responsibility (CDR) | 2021 |
|
Dr Deepak Puthal Dr Zhenyu Wen Professor Aad van Moorsel Professor Raj Ranjan
| A User-centric Security Solution for Internet of Things and Edge Convergence | 2020 |
|
Isaac Matthews Dr John Mace Dr Sadegh Soudjani Professor Aad van Moorsel
| Cyclic Bayesian Attack Graphs: A Systematic Computational Approach | 2020 |
|
Maher Alharby Amjad Aldweesh Professor Aad van Moorsel
| Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma | 2020 |
|
Dr Mhairi Aitken Dr Ehsan Toreini Peter Carmichael Dr Kovila Coopamootoo Professor Karen Elliott et al. | Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices | 2020 |
|
Gladys - Dr Magdalene Ng Dr Ehsan Toreini Professor Aad van Moorsel Dr Kovila Coopamootoo et al. | Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking | 2020 |
|
Dr Magdalene Ng Dr Kovila Coopamootoo Dr Ehsan Toreini Gladys - Professor Karen Elliott et al. | Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance | 2020 |
|
Dr Ehsan Toreini Dr Mhairi Aitken Dr Kovila Coopamootoo Professor Karen Elliott Dr Vlad Gonzalez et al. | The relationship between trust in AI and trustworthy machine learning technologies | 2020 |
|
Mohammed Ali Dr Muhammad Ajmal Azad Mario Parreño Centeno Professor Feng Hao Professor Aad van Moorsel et al. | Consumer-facing technology fraud: Economics, attack methods and potential solutions | 2019 |
|
Dr Mutaz Barika Professor Aad van Moorsel Professor Raj Ranjan
| Orchestrating big data analysis workflows in the cloud: Research challenges, survey, and future directions | 2019 |
|
Dr Deepak Puthal Professor Philip James Professor Aad van Moorsel Professor Raj Ranjan
| Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World | 2019 |
|
Mario Parreño Centeno Dr Yu Guan Professor Aad van Moorsel
| Mobile based continuous authentication using deep features | 2018 |
|
Dr Paul Ezhilchelvan Amjad Aldweesh Professor Aad van Moorsel
| Non-Blocking Two Phase Commit Using Blockchain | 2018 |
|
Dr John Mace Nipun Thekkummal Dr Charles Morisset Professor Aad van Moorsel
| ADaCS: A tool for Analysing Data Collection Strategies | 2017 |
|
Dr John Mace Nipun Thekkummal Dr Charles Morisset Professor Aad van Moorsel
| ADaCS: A Tool for Analysing Data Collection Strategies | 2017 |
|
Dr Changyu Dong Dr Yilei Wang Amjad Aldweesh Patrick Mccorry Professor Aad van Moorsel et al. | Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing | 2017 |
|
Mohammed Ali Dr Leonardus Arief Dr Martin Emms Professor Aad van Moorsel
| Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? | 2017 |
|
Professor Raj Ranjan Top Phengsuwan Professor Philip James Professor Stuart Barr Professor Aad van Moorsel et al. | Urban Risk Analytics in the Cloud | 2017 |
|
Amjad Aldweesh Professor Aad van Moorsel
| A Survey about Blockchain Software Architectures | 2016 |
|
Dr Iryna Yevseyeva Dr Charles Morisset Professor Aad van Moorsel
| Modeling and analysis of influence power for information security decisions | 2016 |
|
Dr Maryam Mehrnezhad Mohammed Ali Professor Feng Hao Professor Aad van Moorsel
| NFC Payment Spy: A Privacy Attack on Contactless Payments | 2016 |
|
Dr Iryna Yevseyeva Professor Vitor Fernandes Professor Aad van Moorsel
| Two-stage security controls selection | 2016 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| WRAD: Tool Support for Workflow Resiliency Analysis and Design | 2016 |
|
Dr Iryna Yevseyeva James Turland Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel et al. | Addressing consumerization of IT risks with nudging | 2015 |
|
Dr Stephen McGough Dr Budi Arief Dr Carl Gamble Dr John Brennan Professor John Fitzgerald et al. | Detecting insider threats using ben-ware: Beneficial intelligent software for identifying anomalous human behaviour | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Impact of Policy Design on Workflow Resiliency Computation Time | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Impact of policy design on workflow resiliency computation time | 2015 |
|
Dr Stephen McGough Dr John Brennan Dr Leonardus Arief Dr Carl Gamble Professor Aad van Moorsel et al. | Insider Threats: Identifying Anomalous Human Behaviour in Hereogeneous Systems Using Beneficial Intelligent Software (Ben-ware) | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Modelling user availability in workflow resiliency analysis | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Modelling user availability in workflow resiliency analysis | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Modelling User Availability in Workflow Resiliency Analysis | 2015 |
|
Dr James Turland Dr Debora Jeske Professor Pam Briggs Professor Aad van Moorsel
| Nudging towards security; Developing and application for wireless network selection for android phones | 2015 |
|
Rob Cain Professor Aad van Moorsel
| Optimisation of data collection strategies for model-based evaluation and decision-making: poster | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Quantitative Workflow Resiliency | 2015 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Resiliency Variance in Workflows with Choice | 2015 |
|
Dr Iryna Yevseyeva Professor Aad van Moorsel
| Selecting Optimal Subset of Security Controls | 2015 |
|
Dr Iryna Yevseyeva Professor Aad van Moorsel
| Selecting optimal subset of security controls | 2015 |
|
Dr Iryna Yevseyeva Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel
| A Decision Making Model of Influencing Behavior in Information Security | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel
| A Decision Making Model of Influencing Behavior in Information Security | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A Formal Model for Soft Enforcement: Influencing the Decision-Maker | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A formal model for soft enforcement: Influencing the decision-maker | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| A Formal Model for Soft Enforcement: Influencing the Decision-Maker | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset James Turland Professor Thomas Gross Christopher Laing et al. | Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging | 2014 |
|
Dr Iryna Yevseyeva Dr Charles Morisset James Turland Professor Thomas Gross Professor Aad van Moorsel et al. | Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging | 2014 |
|
Dr Martin Emms Dr Leonardus Arief Professor Aad van Moorsel
| Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors | 2014 |
|
Dr Charles Morisset Dr Iryna Yevseyeva Professor Thomas Gross Professor Aad van Moorsel
| Formalization of Influencing in Information Security | 2014 |
|
Dr Martin Emms Dr Leonardus Arief Dr Leo Freitas Joe Hannon Professor Aad van Moorsel et al. | Harvesting high value foreign currency transactions from EMV contactless cards without the PIN | 2014 |
|
Dr Martin Emms Dr Leonardus Arief Dr Leo Freitas Joe Hannon Professor Aad van Moorsel et al. | Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN | 2014 |
|
Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel Dr Iryna Yevseyeva
| Nudging for Quantitative Access Control Systems | 2014 |
|
Dr Charles Morisset Professor Thomas Gross Professor Aad van Moorsel Dr Iryna Yevseyeva
| Nudging for quantitative access control systems | 2014 |
|
Wen Zeng Professor Aad van Moorsel
| Performance Modelling and Evaluation of Enterprise Information Security Technologies | 2014 |
|
Wen Zeng Professor Maciej Koutny Professor Aad van Moorsel
| Performance Modelling and Evaluation of Enterprise Information Security Technologies | 2014 |
|
Dr John Mace Dr Charles Morisset Professor Aad van Moorsel
| Quantitative Workflow Resiliency | 2014 |
|
Dr Martin Emms Dr Leo Freitas Professor Aad van Moorsel
| Rigorous Design and Implementation of an Emulator for EMV Contactless Payments | 2014 |
|
Professor Pam Briggs Dr Debora Jeske Professor Aad van Moorsel
| SCENE: A structured means for creating and evaluating behavioral nudges in a cyber security environment | 2014 |
|
Dr Leonardus Arief Dr Kovila Coopamootoo Dr Martin Emms Professor Aad van Moorsel
| Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse | 2014 |
|
Winai Wongthai Francisco Rocha Liberal Rocha Professor Aad van Moorsel
| A Generic Logging Template for Infrastructure as a Service Cloud | 2013 |
|
Suliman Alsuhibany Dr Charles Morisset Professor Aad van Moorsel
| Detection of attack strategies | 2013 |
|
Suliman Alsuhibany Ahmad Alonaizi Dr Charles Morisset Dr Christopher Smith Professor Aad van Moorsel et al. | Experimental investigation in the impact on security of the release order of defensive algorithms | 2013 |
|
Win Wongthai Professor Aad van Moorsel
| Logging Solutions to Mitigate Risks Associated With Threats in Infrastructure as a Service Cloud | 2013 |
|
Dr Martin Emms Dr Leonardus Arief Joe Hannon Professor Aad van Moorsel
| POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards | 2013 |
|
Dr Martin Emms Dr Leonardus Arief Joe Hannon Professor Aad van Moorsel
| POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards | 2013 |
|
Dr Martin Emms Dr Leonardus Arief Professor Aad van Moorsel
| Risks of Offline Verify PIN on Contactless Cards | 2013 |
|
Dr Martin Emms Dr Leonardus Arief Professor Aad van Moorsel
| Risks of Offline Verify PIN on Contactless Cards | 2013 |
|
Dr David Greathead Dr Leonardus Arief Professor Aad van Moorsel
| Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults | 2012 |
|
Dr Christopher Smith Professor Aad van Moorsel
| Driving Privacy Controls with Social Context | 2012 |
|
Suliman Alsuhibany Ahmad Alonaizi Dr Christopher Smith Professor Aad van Moorsel
| Optimising the Release Order of Defensive Mechanisms | 2012 |
|
Professor Aad van Moorsel
| Optimization of Data Collection Strategies for Model-Based Evaluation and Decision-Making | 2012 |
|
Dr Martin Emms Dr Leonardus Arief Fei Hao Professor Aad van Moorsel
| The Dangers of Verify PIN on Contactless Cards | 2012 |
|
Professor Feng Li Dr Dariusz Pienkowski Professor Aad van Moorsel Dr Christopher Smith
| A Holistic Framework for Trust in Online Transactions | 2011 |
|
Dr Simon Parkin Professor Aad van Moorsel
| Cooperative Information Security Knowledge: Content Validation and incentives to contribute | 2011 |
|
Emeritus Professor Richard Thomson Fiona Beyer Dr John Colquhoun Professor Julia Critchley Professor Martin Eccles et al. | Development and usability testing of a shared decision support tool for cardiovascular risk reduction in primary care | 2011 |
|
Professor Aad van Moorsel Dr Martin Emms Dr Leonardus Arief
| Digital Strategy for the Social Inclusion of Survivors of Domestic Violence | 2011 |
|
Rouaa Yassin Kassab Professor Aad van Moorsel
| Formal Mapping of WSLA Contracts on Stochastic Models | 2011 |
|
Wen Zeng Professor Aad van Moorsel
| Quantitative Evaluation of Enterprise DRM Technology | 2011 |
|
Dr John Mace Professor Aad van Moorsel Professor Paul Watson
| The Case for Dynamic Security Solutions in Public Cloud Workflow Deployments | 2011 |
|
Dr Leonardus Arief Dr David Greathead Professor Aad van Moorsel
| Towards the Implementation of an Internet-based Neighbourhood Watch Scheme: Impacts of Inclusive Technologies on Societies | 2011 |
|
Johari Abdullah Professor Aad van Moorsel
| Uncertainty and Uncertainty Tolerance in Service Provisioning | 2011 |
|
Dr John Mace Dr Simon Parkin Professor Aad van Moorsel
| A Collaborative Ontology Development Tool for Information Security Managers | 2010 |
|
Dr Simon Parkin Professor Aad van Moorsel
| A Stealth Approach to Usable Security: Helping IT Security Managers to Identify Workable Security Solutions | 2010 |
|
Dr Simon Parkin Professor Aad van Moorsel
| A stealth approach to usable security: helping IT security managers to identify workable security solutions | 2010 |
|
Maciej Machulak Professor Aad van Moorsel
| Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications | 2010 |
|
Maciej Machulak Professor Aad van Moorsel
| Design and implementation of user-managed access framework for web 2.0 applications | 2010 |
|
Maciej Machulak Lukasz Moren Professor Aad van Moorsel
| Design and Implementation of User-Managed Access Framework for Web 2.0 Applications | 2010 |
|
Dr Katinka Wolter Professor Aad van Moorsel
| Evaluating the adaptivity of computing systems | 2010 |
|
Dr Christopher Smith Professor Aad van Moorsel
| Mitigating Provider Uncertainty In Service Provision Contracts | 2010 |
|
Dr Rouaa Yassin Kassab Professor Aad van Moorsel
| Predicting Compliance of WSLA Contracts Using Automated Model Creation | 2010 |
|
Emeritus Professor Richard Thomson Dr John Colquhoun Fiona Beyer Professor Julia Critchley Dr Mark Lambert et al. | Risk Communication and Shared Decision Making in High Risk Cardiovascular Patients - a Tool in Development | 2010 |
|
Maciej Machulak Professor Aad van Moorsel
| User-managed access to web resources | 2010 |
|
Maciej Machulak Professor Aad van Moorsel
| User-Managed Access to Web Resources | 2010 |
|
Daria Stepanova Dr Simon Parkin Professor Aad van Moorsel
| A Knowledge Base for Justified Information Security Decision-Making | 2009 |
|
Daria Stepanova Dr Simon Parkin Professor Aad van Moorsel
| A Knowledge Base for Justified Information Security Decision-Making | 2009 |
|
Maciej Machulak Professor Aad van Moorsel
| A Novel Approach to Access Control for the Web | 2009 |
|
Dr Christopher Smith Professor Aad van Moorsel
| An Architecture for Cross-Cloud System Management | 2009 |
|
Christopher Smith Professor Aad van Moorsel
| An architecture for cross-cloud system management | 2009 |
|
Dr Christopher Smith Professor Aad van Moorsel
| An Architecture for Cross-Cloud System Management | 2009 |
|
Dr Christopher Smith Professor Aad van Moorsel
| An Empirical Evaluation Of Web Services Architectures From An Economic Perspective | 2009 |
|
Dr Simon Parkin Professor Aad van Moorsel
| An Information Security Ontology Incorporating Human-Behavioral Implications | 2009 |
|
Dr Simon Parkin Professor Aad van Moorsel
| An Information Security Ontology Incorporating Human-Behavioural Implications | 2009 |
|
Dr Christopher Smith Professor Aad van Moorsel Dr Dariusz Pienkowski Dr Fei Li
| An Institutional Approach to Trust in Electronic Transactions | 2009 |
|
Maciej Machulak Dr Simon Parkin Professor Aad van Moorsel
| Architecting Dependable Access Control Systems for Multi Domain Computing Environments | 2009 |
|
Maciej Machulak Dr Simon Parkin Professor Aad van Moorsel
| Architecting dependable access control systems for multi-domain computing environments | 2009 |
|
Dr John Colquhoun Fiona Beyer Professor Julia Critchley Dr Mark Lambert Robert Sugden et al. | Cardiovascular Risk Communication Software for Patients and Clinicians | 2009 |
|
Marios Andreou Professor Aad van Moorsel
| COTraSE: Connection Oriented Traceback in Switched Ethernet | 2009 |
|
Professor Aad van Moorsel
| Dependability in the cloud: Challenges and opportunities | 2009 |
|
Huqui Zhang Professor Aad van Moorsel
| Fast generation of scale free networks with directed arcs | 2009 |
|
Huqui Zhang Professor Aad van Moorsel
| Fast Generation of Scale Free Networks with Directed Arcs | 2009 |
|
Huqui Zhang Professor Aad van Moorsel
| Fast Generation of Scale Free Networks with Directed Arcs | 2009 |
|
Professor Aad van Moorsel
| Introduction to the Proceedings of the EDOC 2009 Workshop Middleware for Web Services (MWS) 2009 | 2009 |
|
Dr John Mace Dr Simon Parkin Professor Aad van Moorsel
| Ontology Editing Tool for Information Security and Human Factors Experts | 2009 |
|
Maciej Machulak Dr Simon Parkin Professor Aad van Moorsel
| Proceedings of the First Trust Economics Workshop | 2009 |
|
Dr Simon Parkin Professor Aad van Moorsel
| Risk Modelling of Access Control Policies with Human Behavioural Factors | 2009 |
|
Maciej Machulak Professor Aad van Moorsel
| Use Cases for User-Centric Access Control for the Web | 2009 |
|
Marios Andreou Professor Aad van Moorsel
| COTraSE: Connection Oriented Traceback in Switched Ethernet | 2008 |
|
Marios Andreou Professor Aad van Moorsel
| COTraSE: Connection Oriented Traceback in Switched Ethernet | 2008 |
|
Professor Aad van Moorsel Professor Graham Morgan
| Efficient Resource Management for Game Server Hosting | 2008 |
|
Huqui Zhang Professor Aad van Moorsel
| Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust | 2008 |
|
Huqui Zhang Professor Aad van Moorsel
| Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust | 2008 |
|
Huqui Zhang Professor Aad van Moorsel
| Evaluation of P2P algorithms for probabilistic trust inference in a web of trust | 2008 |
|
Professor Aad van Moorsel
| International workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008) | 2008 |
|
Professor Aad van Moorsel
| Introduction to the proceedings of the EDOC 2008 workshop Middleware for Web Services (MWS) 2008 | 2008 |
|
Marios Andreou Professor Aad van Moorsel
| Logging Based IP Traceback in Switched Ethernets | 2008 |
|
Rouaa Yassin Kassab Professor Aad van Moorsel
| Mapping WSLA on Reward Constructs in Möbius | 2008 |
|
Christiaan Lamprecht Professor Aad van Moorsel
| Runtime security adaptation using adaptive SSL | 2008 |
|
Dr Simon Parkin Rouaa Yassin Kassab Professor Aad van Moorsel
| The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies | 2008 |
|
Dr Simon Parkin Dr Rouaa Yassin Kassab Professor Aad van Moorsel
| The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies | 2008 |
|
Dr Simon Parkin Professor Aad van Moorsel
| Trust Economics Feasibility Study | 2008 |
|
Dr Simon Parkin Professor Aad van Moorsel
| Trust Economics Feasibility Study | 2008 |
|
Dr Simon Parkin Professor Aad van Moorsel
| A Trust-economic Perspective on Information Security Technologies | 2007 |
|
Christiaan Lamprecht Professor Aad van Moorsel
| Adaptive SSL: Design, Implementation and Overhead Analysis | 2007 |
|
Christiaan Lamprecht Professor Aad van Moorsel
| Adaptive SSL: Design, implementation and overhead analysis | 2007 |
|
Professor Aad van Moorsel
| Evaluation of P2P search algorithms for discovering trust paths | 2007 |
|
Emerson Ribeiro De Mello Professor Aad van Moorsel
| Evaluation of P2P Search Algorithms for Discovering Trust Paths | 2007 |
|
Emerson Ribeiro De Mello Professor Aad van Moorsel
| Evaluation of P2P Search Algorithms for Discovering Trust Paths | 2007 |
|
Professor Aad van Moorsel
| Introduction to the proceedings of the EDOC 2007 Workshop Middleware for Web Services (MWS) 2007 | 2007 |
|
Marios Andreou Professor Aad van Moorsel
| IP Traceback in a Switched Ethernet Network | 2007 |
|
Dr Christopher Smith Professor Aad van Moorsel
| Mitigating Provider Uncertainty in Service Provision Contracts | 2007 |
|
Dr Christopher Smith Professor Aad van Moorsel
| Mitigating Provider Uncertainty in Service Provision Contracts | 2007 |
|
Professor Aad van Moorsel
| PMCCS-8. The Eighth International Workshop on Performability Modeling of Computer and Communication Systems, September 20-21, 2007, Edinburgh, Scotland | 2007 |
|
Professor Aad van Moorsel
| Service Availability: 4th International Service Availability Symposium, (ISAS 2007). Durham, NH, USA. 21-22 May. | 2007 |
|
Professor Aad van Moorsel Dr Katinka Wolter
| Analysis of restart mechanisms in software systems | 2006 |
|
Professor Aad van Moorsel Dr Katinka Wolter
| Experimental analysis of the correlation of HTTP GET invocations | 2006 |
|
Professor Aad van Moorsel Dr Katinka Wolter
| Experimental analysis of the correlation of HTTP GET invocations | 2006 |
|
Professor Aad van Moorsel
| Introduction to the Proceedings of the EDOC 2006 workshop Middleware for Web Services (MWS) 2006 | 2006 |
|
Christiaan Lamprecht Professor Aad van Moorsel Dr Nigel Thomas
| Investigating the efficiency of cryptographic algorithms in online transactions | 2006 |
|
Dr Christopher Smith Professor Aad van Moorsel
| On Efficient Stateful Resource Management | 2006 |
|
Emerson Ribeiro De Mello Professor Savas Parastatidis Dr Christopher Smith Professor Aad van Moorsel Professor Jim Webber et al. | Secure and Provable Service Support for Human-Intensive Real-Estate Processes | 2006 |
|
Emerson Ribeiro De Mello Professor Savas Parastatidis Dr Christopher Smith Professor Aad van Moorsel Professor Jim Webber et al. | Secure and Provable Service Support for Human-Intensive Real-Estate Processes | 2006 |
|
Professor Savas Parastatidis Professor Aad van Moorsel Professor Jim Webber
| Secure and provable service support for human-intensive real-estate processes | 2006 |
|
Professor Aad van Moorsel Dr Katinka Wolter
| The fast and the fair: A fault-injection-driven comparison of restart oracles for reliable Web Services | 2006 |
|
Professor Aad van Moorsel
| Grid, management and self-management | 2005 |
|
Professor Aad van Moorsel
| Method and Apparatus for Use in Specifying and Insuring Service-Level Quality of Service in Computer Networks | 2005 |
|
Professor Aad van Moorsel
| On best-effort and dependability, service-orientation and panacea | 2005 |
|
Professor Aad van Moorsel
| On best-effort and dependability, service-orientation and panacea | 2005 |
|
Christiaan Lamprecht Professor Aad van Moorsel
| Performance Measurement of Web Services Security Software | 2005 |
|
Professor Aad van Moorsel
| Self-Star Properties in Complex Information Systems: Conceptual and Practical Foundations | 2005 |
|
Dr Carlos Molina-Jimenez Professor Aad van Moorsel
| The Role of Agreements in IT Management Software | 2005 |
|
Dr Carlos Molina-Jimenez Professor Aad van Moorsel
| The role of agreements in IT management software | 2005 |
|
Professor Aad van Moorsel Dr Katinka Wolter
| A Measurement Study of the Interplay between Application Level Restart and Transport Protocol | 2004 |
|
Professor Aad van Moorsel
| Analysis and algorithms for restart | 2004 |
|
Professor Aad van Moorsel Dr Katinka Wolter
| Meeting Deadlines Through Restart | 2004 |
|
Professor Aad van Moorsel
| Method and Apparatus for use in Specifying and Insuring Policies for Management of Computer Networks | 2004 |
|
Professor Aad van Moorsel
| Methods and Apparatus for Managing Middleware Service in a Distributed System | 2004 |
|
Dr Nigel Thomas Professor Aad van Moorsel
| Open issues in grid performability | 2004 |
|
Professor Aad van Moorsel Dr Katinka Wolter
| Optimal restart times for moments of completion time | 2004 |
|
Professor Aad van Moorsel
| Optimal Restart Times for Moments of Completion Time | 2004 |
|
Professor Aad van Moorsel
| Impact of Virtualization on Management Systems | 2003 |
|
Professor Aad van Moorsel
| Managed Utility Computing: The Grid as Management Backplane | 2003 |
|
Professor Aad van Moorsel
| Management += Grid | 2003 |
|
Professor Aad van Moorsel
| Optimization of Failure Detection Retry Times | 2003 |
|
Professor Aad van Moorsel
| Specifying and Monitoring Guarantees in Commercial Grids through SLA | 2003 |
|
Professor Aad van Moorsel
| Web Services Management Network: An Overlay Network for Federated Service Management | 2003 |
|
Professor Aad van Moorsel
| Automated SLA Monitoring for Web Services | 2002 |
|
Professor Aad van Moorsel
| Design of a Business Process Analyzer | 2002 |
|
Professor Aad van Moorsel
| Optimal Allocation of Test Resources for Software Reliability Growth Modeling in Software Development | 2002 |
|
Professor Aad van Moorsel
| Quality of Business Driven Service Composition and Utility Computing | 2002 |
|
Professor Aad van Moorsel
| Ten-Step Survival Guide for the Emerging Business Web | 2002 |
|
Professor Aad van Moorsel
| A Peer-to-Peer Architecture for Delivering E-Services | 2001 |
|
Professor Aad van Moorsel
| Metrics for the Internet Age: Quality of Experience and Quality of Business | 2001 |
|
Professor Aad van Moorsel
| Metrics for the Internet Age: Quality of Experience and Quality of Business | 2001 |
|
Dr Katinka Wolter Professor Aad van Moorsel
| The Relationship between Quality of Service and Business Metrics: Monitoring, Notification and Optimization | 2001 |
|
Professor Aad van Moorsel
| Bridging the Gap between Application Semantics and Group Communication Protocols | 2000 |
|
Professor Aad van Moorsel
| Building Dependable Internet Services with E-speak | 2000 |
|
Professor Aad van Moorsel
| Gallifrey: A Component-Based Framework for Building Policy-Based Management Applications | 2000 |
|
Professor Aad van Moorsel
| User-Centric QoS Policies, or Saying What and How | 2000 |
|
Professor Aad van Moorsel
| Design of a Resource Manager for Fault-Tolerant CORBA | 1999 |
|
Professor Aad van Moorsel
| The 'QoS Query Service' for Improved Quality-of-Service Decision Making in CORBA | 1999 |
|
Professor Aad van Moorsel
| A Management Interface for Distributed Fault Tolerance CORBA Services | 1998 |
|
Professor Aad van Moorsel
| A Methodology for Detection and Estimation of Software Aging | 1998 |
|
Professor Aad van Moorsel
| Action Models: A Reliability Modeling Formalism for Fault-Tolerant Distributed Computing Systems | 1998 |
|
Professor Aad van Moorsel
| Design and Implementation of an SNMP Agent for Managing NTSwift | 1998 |
|
Professor Aad van Moorsel
| Metrics for Representing Performance as Rewards in Performability Models | 1998 |
|
Professor Aad van Moorsel
| Numerical Solution of Non-homogeneous Markov Processes through Uniformization | 1998 |
|
Professor Aad van Moorsel
| Reusable Software Components for Performability Tools, and Their Utilization for Web-Based Configurable Tools | 1998 |
|
Professor Aad van Moorsel
| A Suite of Internet-Accessible Analysis Tools | 1997 |
|
Professor Aad van Moorsel
| Offering Computing Services Through Networks of Simple HTTP Servers | 1997 |
|
Professor Aad van Moorsel
| Optimization of Reliability Allocation and Testing Schedule for Software Systems | 1997 |
|
Professor Aad van Moorsel
| Providing System Analysis Tools over the Internet | 1997 |
|
Professor Aad van Moorsel
| Transient Solution of Markov Models by Combining Adaptive and Standard Uniformization | 1997 |
|
Professor Aad van Moorsel
| Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures | 1996 |
|
Professor Aad van Moorsel
| Combining Adaptive and Standard Uniformization | 1996 |
|
Professor Aad van Moorsel
| Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models | 1996 |
|
Professor Aad van Moorsel Mehar Afroz Qureshi
| Expected Impulse Rewards in Markov Regenerative Stochastic Petri Nets | 1996 |
|
Professor Aad van Moorsel
| Probabilistic Evaluation for the Analytical Solution of Large Markov Models: Algorithms and Tool Support | 1996 |
|
Professor Aad van Moorsel
| Towards Performability Modeling of Software Rejuvenation | 1996 |
|
Professor Aad van Moorsel
| Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures | 1995 |
|
Professor Aad van Moorsel
| UltraSAN Version 3.0 Overview | 1995 |
|
Professor Aad van Moorsel
| Using the Probabilistic Evaluation Tool for the Analytical Solution of Large Markov Models | 1995 |
|
Professor Aad van Moorsel
| Adaptive Uniformization | 1994 |
|
Professor Aad van Moorsel
| Xmgm: Performance Modeling Using Matrix Geometric Techniques | 1994 |
|
Professor Aad van Moorsel
| A Unified Performability Evaluation Framework for Computer and Communication Systems | 1993 |
|
Professor Aad van Moorsel
| MGMtool: A Performance Analysis Tool Based on Matrix Geometric Methods | 1993 |
|
Professor Aad van Moorsel
| PhD Thesis: Performability Evaluation Concepts and Techniques | 1993 |
|
Professor Aad van Moorsel
| A Method for Analysing the Performance Aspects of the Fault-Tolerance Mechanisms in FDDI | 1992 |
|
Professor Aad van Moorsel
| Fault Injection Simulation: A Variance Reduction Technique for Systems with Rare Events | 1992 |
|
Professor Aad van Moorsel
| Performance of a Connectionless Protocol over ATM | 1992 |
|
Professor Aad van Moorsel
| Fault Injection Simulation | 1991 |
|
Professor Aad van Moorsel
| [PhD Thesis] Optimal Routing in Simple Queueing Networks | 1989 |
|