ACM Transactions on Computer Systems (TOCS)
Quantitative system performance: computer system analysis using queueing network models
Quantitative system performance: computer system analysis using queueing network models
An experimental evaluation of the assumption of independence in multiversion programming
IEEE Transactions on Software Engineering
Software reliability: measurement, prediction, application
Software reliability: measurement, prediction, application
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Performability Analysis: Measures, an Algorithm, and a Case Study
IEEE Transactions on Computers - Fault-Tolerant Computing
Survey of software tools for evaluating reliability, availability, and serviceability
ACM Computing Surveys (CSUR)
Probabilistic reasoning in intelligent systems: networks of plausible inference
Probabilistic reasoning in intelligent systems: networks of plausible inference
From defects to failures: a view of dependable computing
ACM SIGARCH Computer Architecture News - Special Issue: Architectural Support for Operating Systems
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Multiparty unconditionally secure protocols
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
The Effect of Execution Policies on the Semantics and Analysis of Stochastic Petri Nets
IEEE Transactions on Software Engineering
Recalibrating Software Reliability Models
IEEE Transactions on Software Engineering
Fault Injection for Dependability Validation: A Methodology and Some Applications
IEEE Transactions on Software Engineering
Fault Injection Experiments Using FIAT
IEEE Transactions on Computers
Handbook of theoretical computer science (vol. A)
Prediction of Software Reliability Using Connectionist Models
IEEE Transactions on Software Engineering
Introduction to parallel computing: design and analysis of algorithms
Introduction to parallel computing: design and analysis of algorithms
FERRARI: A Flexible Software-Based Fault and Error Injection System
IEEE Transactions on Computers - Special issue on fault-tolerant computing
Performability modelling tools and techniques
Performance Evaluation
Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package
Self-similarity in World Wide Web traffic: evidence and possible causes
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Software reliability modeling survey
Handbook of software reliability engineering
Techniques for prediction analysis and recalibration
Handbook of software reliability engineering
Security in computing
Trace-driven memory simulation: a survey
ACM Computing Surveys (CSUR)
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Why do some (weird) people inject faults?
ACM SIGSOFT Software Engineering Notes
The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A Critique of Software Defect Prediction Models
IEEE Transactions on Software Engineering
Software metrics: success, failures and new directions
Journal of Systems and Software - Special issue on invited articles on top systems and software engineering scholars
ACM Computing Surveys (CSUR)
Communications of the ACM
Software reliability and dependability: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Model-checking continuous-time Markov chains
ACM Transactions on Computational Logic (TOCL)
Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing
The Operational Analysis of Queueing Network Models
ACM Computing Surveys (CSUR)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Dhrystone: a synthetic systems programming benchmark
Communications of the ACM
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
Applying the dependability paradigm to computer security
NSPW '95 Proceedings of the 1995 workshop on New security paradigms
Theory of software reliability based on components
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
ACM Transactions on Information and System Security (TISSEC)
Performance solutions: a practical guide to creating responsive, scalable software
Performance solutions: a practical guide to creating responsive, scalable software
Probability and statistics with reliability, queuing and computer science applications
Probability and statistics with reliability, queuing and computer science applications
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
The Basics of Item Response Theory
The Basics of Item Response Theory
Introduction to Bayesian Networks
Introduction to Bayesian Networks
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
Capacity Planning for Web Services: metrics, models, and methods
Capacity Planning for Web Services: metrics, models, and methods
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Dependability: Basic Concepts and Terminology
Dependability: Basic Concepts and Terminology
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Managing Information Security Risks: The Octave Approach
Managing Information Security Risks: The Octave Approach
A case study in software adaptation
WOSS '02 Proceedings of the first workshop on Self-healing systems
Early reliability assessment of UML based software models
WOSP '02 Proceedings of the 3rd international workshop on Software and performance
Extracting guarantees from chaos
Communications of the ACM
Computer
Fault Injection Techniques and Tools
Computer
Using Neural Networks in Reliability Prediction
IEEE Software
Operational Profiles in Software-Reliability Engineering
IEEE Software
Qualitative and Quantitative Reliability Assessment
IEEE Software
Performance Evaluation of Client-Server Systems
IEEE Transactions on Parallel and Distributed Systems
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
IEEE Transactions on Software Engineering
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
IEEE Transactions on Software Engineering
Quantitative Analysis of Faults and Failures in a Complex Software System
IEEE Transactions on Software Engineering
A framework for using insurance for cyber-risk management
Communications of the ACM
RIFLE: A General Purpose Pin-level Fault Injector
EDCC-1 Proceedings of the First European Dependable Computing Conference on Dependable Computing
An Evaluation of the Error Detection Mechanisms in MARS Using Software-Implemented Fault Injection
EDCC-2 Proceedings of the Second European Dependable Computing Conference on Dependable Computing
Discrete Time Stochastic Petri Nets for the Modeling and Evaluation of Real-Time Systems
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Accommodating QoS Prediction in an Adaptive Resource Management Framework
IPDPS '00 Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing
Efficient Byzantine Agreement Secure Against General Adversaries
DISC '98 Proceedings of the 12th International Symposium on Distributed Computing
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Responsive Systems: A Marriage Betwenn Real time and Fault Tolenrance
Proceedings of the 5th International GI/ITG/GMA Conference on Fault-Tolerant Computing Systems, Tests, Diagnosis, Fault Treatment
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
On Petri nets with deterministic and exponentially distributed firing times
Advances in Petri Nets 1987, covers the 7th European Workshop on Applications and Theory of Petri Nets
Transient Analysis of Deterministic and Stochastic Petri Nets
Proceedings of the 14th International Conference on Application and Theory of Petri Nets
Performance Evaluation of Dependable Real-Time Communication with Elastic QoS
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Taxonomy of security considerations and software quality
Communications of the ACM - E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
Guidelines for eliciting expert judgment as probabilities or fuzzy logic
Fuzzy logic and probability applications
Software Component Reliability Analysis
ASSET '99 Proceedings of the 1999 IEEE Symposium on Application - Specific Systems and Software Engineering and Technology
A Technique for Automated Validation of Fault Tolerant Designs Using Laser Fault Injection (LFI)
FTCS '98 Proceedings of the The Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing
How to measure software reliability, and how not to
ICSE '78 Proceedings of the 3rd international conference on Software engineering
Structural models for software reliability prediction
ICSE '76 Proceedings of the 2nd international conference on Software engineering
Analysis of error processes in computer software
Proceedings of the international conference on Reliable software
Insurability of Electronic Commerce Risks
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Assessing the Risk in E-commerce
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
A Dynamic Real-time Benchmark for Assessment of QoS and Resource Management Technology
RTAS '99 Proceedings of the Fifth IEEE Real-Time Technology and Applications Symposium
On the Use of Model Checking Techniques for Dependability Evaluation
SRDS '00 Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems
From Byzantine Agreement to Practical Survivability
SRDS '02 Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems
Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model
SRDS '02 Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems
Real-time computing cornerstones: a system engineer's view
WPDRTS '95 Proceedings of the 3rd Workshop on Parallel and Distributed Real-Time Systems
Synchronous Consensus for Dependent Process Failures
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Using fault injection to assess software engineering standards
ISESS '95 Proceedings of the 2nd IEEE Software Engineering Standards Symposium
On The Estimation Of Reliability Of A Software System Using Reliabilities Of Its Components
ISSRE '97 Proceedings of the Eighth International Symposium on Software Reliability Engineering
Reliability Simulation of Component-based Software Systems
ISSRE '98 Proceedings of the The Ninth International Symposium on Software Reliability Engineering
Emulation of Software Faults by Educated Mutations at Machine-Code Level
ISSRE '02 Proceedings of the 13th International Symposium on Software Reliability Engineering
Model-Checking Algorithms for Continuous-Time Markov Chains
IEEE Transactions on Software Engineering
Reliability prediction for component-based software architectures
Journal of Systems and Software - Special issue on: Software architecture - Engineering quality attributes
Computer Systems Performance Evaluation and Prediction
Computer Systems Performance Evaluation and Prediction
Universally Composable Security: A New Paradigm for Cryptographic Protocols
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
Software Rejuvenation: Analysis, Module and Applications
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Measurement of Failure Rate in Widely Distributed Software
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Online Prediction of the Running Time of Tasks
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
Journal of Computer Security - IFIP 2000
DOCTOR: an integrated software fault injection environment for distributed real-time systems
IPDS '95 Proceedings of the International Computer Performance and Dependability Symposium on Computer Performance and Dependability Symposium
Performability evaluation: where it is and what lies ahead
IPDS '95 Proceedings of the International Computer Performance and Dependability Symposium on Computer Performance and Dependability Symposium
Stochastic Petri nets: accomplishments and open problems
IPDS '95 Proceedings of the International Computer Performance and Dependability Symposium on Computer Performance and Dependability Symposium
CSP and determinism in security modelling
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Evaluation of Intrusion Detectors: A Decision Theory Approach
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Teaching network security through live exercises
Security education and critical infrastructures
Real Time Systems: A Tutorial
On the integration of delay and throughput measures in distributed processing models
On the integration of delay and throughput measures in distributed processing models
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Automatic generation of two-party computations
Proceedings of the 10th ACM conference on Computer and communications security
A composable cryptographic library with nested operations
Proceedings of the 10th ACM conference on Computer and communications security
A Bayesian Belief Network for Assessing the Likelihood of Fault Content
ISSRE '03 Proceedings of the 14th International Symposium on Software Reliability Engineering
Computing System Failure Frequencies and Reliability Importance Measures Using OBDD
IEEE Transactions on Computers
Real Time UML: Advances in the UML for Real-Time Systems (3rd Edition)
Real Time UML: Advances in the UML for Real-Time Systems (3rd Edition)
QoS-Aware Middleware for Web Services Composition
IEEE Transactions on Software Engineering
Model-Based Performance Prediction in Software Development: A Survey
IEEE Transactions on Software Engineering
Toward a Software Testing and Reliability Early Warning Metric Suite
Proceedings of the 26th International Conference on Software Engineering
Precise Service Level Agreements
Proceedings of the 26th International Conference on Software Engineering
The random oracle methodology, revisited
Journal of the ACM (JACM)
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Toward understanding distributed blackhole placement
Proceedings of the 2004 ACM workshop on Rapid malcode
Software Reliability Engineering: More Reliable Software Faster and Cheaper
Software Reliability Engineering: More Reliable Software Faster and Cheaper
Computer security strength and risk: a quantitative approach
Computer security strength and risk: a quantitative approach
Evaluating information security investments using the analytic hierarchy process
Communications of the ACM - Medical image modeling
Proactive Fault Handling for System Availability Enhancement
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 16 - Volume 17
Dynamic Delay-Fault Injection for Reconfigurable Hardware
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 16 - Volume 17
Dependability assessment of software-based systems: state of the art
Proceedings of the 27th international conference on Software engineering
An approach for quality of service adaptation in service-oriented Grids: Research Articles
Concurrency and Computation: Practice & Experience - Middleware for Grid Computing
The Economic Incentives for Sharing Security Information
Information Systems Research
Early estimation of software quality using in-process testing metrics: a controlled case study
3-WoSQ Proceedings of the third workshop on Software quality
Software quality and reliability prediction using dempster-shafer theory
Software quality and reliability prediction using dempster-shafer theory
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
Proceedings of the twentieth ACM symposium on Operating systems principles
EDOC '05 Proceedings of the Ninth IEEE International EDOC Enterprise Computing Conference
Budgeting process for information security expenditures
Communications of the ACM - Personal information management
Analyzing Software Quality with Limited Fault-Proneness Defect Data
HASE '05 Proceedings of the Ninth IEEE International Symposium on High-Assurance Systems Engineering
Solving Consensus Using Structural Failure Models
SRDS '06 Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Fairplay—a secure two-party computation system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
International Journal of Electronic Commerce
A User-Oriented Software Reliability Model
IEEE Transactions on Software Engineering
Using In-Process Testing Metrics to Estimate Post-Release Field Quality
ISSRE '07 Proceedings of the The 18th IEEE International Symposium on Software Reliability
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Virtual honeypots: from botnet tracking to intrusion detection
Virtual honeypots: from botnet tracking to intrusion detection
Unsupervised learning for expert-based software quality estimation
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
Performance specifications and metrics for adaptive real-time systems
RTSS'10 Proceedings of the 21st IEEE conference on Real-time systems symposium
A comparison of market approaches to software vulnerability disclosure
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Quantifying the security of composed systems
PPAM'05 Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics
On the estimation of software reliability of component-based dependable distributed systems
QoSA'05 Proceedings of the First international conference on Quality of Software Architectures and Software Quality, and Proceedings of the Second International conference on Software Quality
Empirical evaluation of model-based performance prediction methods in software development
QoSA'05 Proceedings of the First international conference on Quality of Software Architectures and Software Quality, and Proceedings of the Second International conference on Software Quality
A pointillist approach for comparing honeypots
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Improved security analyses for CBC MACs
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Annotating UML models with non-functional properties for quantitative analysis
MoDELS'05 Proceedings of the 2005 international conference on Satellite Events at the MoDELS
Gracefully degrading fair exchange with security modules
EDCC'05 Proceedings of the 5th European conference on Dependable Computing
The nepenthes platform: an efficient approach to collect malware
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
The security of triple encryption and a framework for code-based game-playing proofs
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Performance prediction of component-based systems
Proceedings of the 2004 international conference on Architecting Systems with Trustworthy Components
Hi-index | 0.00 |