Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Aad P. A. van Moorsel
@article{DBLP:journals/ijisec/ToreiniMM24, author = {Ehsan Toreini and Maryam Mehrnezhad and Aad van Moorsel}, title = {Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {2}, pages = {981--997}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00774-z}, doi = {10.1007/S10207-023-00774-Z}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ToreiniMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ToreiniMM23, author = {Ehsan Toreini and Maryam Mehrnezhad and Aad van Moorsel}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {569--584}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_34}, doi = {10.1007/978-3-031-54129-2\_34}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ToreiniMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/ZiliusSM23, author = {Karolis Zilius and Tasos Spiliotopoulos and Aad van Moorsel}, editor = {Yu{-}Ru Lin and Meeyoung Cha and Daniele Quercia}, title = {A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns}, booktitle = {Proceedings of the Seventeenth International {AAAI} Conference on Web and Social Media, {ICWSM} 2023, June 5-8, 2023, Limassol, Cyprus}, pages = {1112--1121}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/icwsm.v17i1.22219}, doi = {10.1609/ICWSM.V17I1.22219}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/ZiliusSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-06601, author = {Karolis Zilius and Tasos Spiliotopoulos and Aad van Moorsel}, title = {A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns}, journal = {CoRR}, volume = {abs/2301.06601}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.06601}, doi = {10.48550/ARXIV.2301.06601}, eprinttype = {arXiv}, eprint = {2301.06601}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-06601.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-01706, author = {Zilong Zhao and Han Wu and Aad van Moorsel and Lydia Y. Chen}, title = {{GTV:} Generating Tabular Data via Vertical Federated Learning}, journal = {CoRR}, volume = {abs/2302.01706}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.01706}, doi = {10.48550/ARXIV.2302.01706}, eprinttype = {arXiv}, eprint = {2302.01706}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-01706.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-06061, author = {Ehsan Toreini and Maryam Mehrnezhad and Aad van Moorsel}, title = {Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems}, journal = {CoRR}, volume = {abs/2309.06061}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.06061}, doi = {10.48550/ARXIV.2309.06061}, eprinttype = {arXiv}, eprint = {2309.06061}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-06061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/AlharbyM22, author = {Maher Alharby and Aad van Moorsel}, title = {Simulating permissionless blockchains: Distribution fitting, tool support, and a case study}, journal = {Int. J. Netw. Manag.}, volume = {32}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/nem.2184}, doi = {10.1002/NEM.2184}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AlharbyM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/Wu0CM22, author = {Han Wu and Zilong Zhao and Lydia Y. Chen and Aad van Moorsel}, title = {Federated Learning for Tabular Data: Exploring Potential Risk to Privacy}, booktitle = {{IEEE} 33rd International Symposium on Software Reliability Engineering, {ISSRE} 2022, Charlotte, NC, USA, October 31 - Nov. 3, 2022}, pages = {193--204}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISSRE55969.2022.00028}, doi = {10.1109/ISSRE55969.2022.00028}, timestamp = {Wed, 11 Jan 2023 13:11:43 +0100}, biburl = {https://dblp.org/rec/conf/issre/Wu0CM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/WuQWM22, author = {Han Wu and Holland Qian and Huaming Wu and Aad van Moorsel}, editor = {Irena Koprinska and Paolo Mignone and Riccardo Guidotti and Szymon Jaroszewicz and Holger Fr{\"{o}}ning and Francesco Gullo and Pedro M. Ferreira and Damian Roqueiro and Gaia Ceddia and Slawomir Nowaczyk and Jo{\~{a}}o Gama and Rita P. Ribeiro and Ricard Gavald{\`{a}} and Elio Masciari and Zbigniew W. Ras and Ettore Ritacco and Francesca Naretto and Andreas Theissler and Przemyslaw Biecek and Wouter Verbeke and Gregor Schiele and Franz Pernkopf and Michaela Blott and Ilaria Bordino and Ivan Luciano Danesi and Giovanni Ponti and Lorenzo Severini and Annalisa Appice and Giuseppina Andresini and Ib{\'{e}}ria Medeiros and Guilherme Gra{\c{c}}a and Lee A. D. Cooper and Naghmeh Ghazaleh and Jonas Richiardi and Diego Saldana Miranda and Konstantinos Sechidis and Arif Canakoglu and Sara Pid{\`{o}} and Pietro Pinoli and Albert Bifet and Sepideh Pashami}, title = {LDRNet: Enabling Real-Time Document Localization on Mobile Devices}, booktitle = {Machine Learning and Principles and Practice of Knowledge Discovery in Databases - International Workshops of {ECML} {PKDD} 2022, Grenoble, France, September 19-23, 2022, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {1752}, pages = {618--629}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23618-1\_42}, doi = {10.1007/978-3-031-23618-1\_42}, timestamp = {Mon, 26 Jun 2023 20:44:31 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/WuQWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/SmusevaMMMR22, author = {Daria Smuseva and Ivan Malakhov and Andrea Marin and Aad van Moorsel and Sabina Rossi}, editor = {Erika {\'{A}}brah{\'{a}}m and Marco Paolieri}, title = {Verifier's Dilemma in Ethereum Blockchain: {A} Quantitative Analysis}, booktitle = {Quantitative Evaluation of Systems - 19th International Conference, {QEST} 2022, Warsaw, Poland, September 12-16, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13479}, pages = {317--336}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16336-4\_16}, doi = {10.1007/978-3-031-16336-4\_16}, timestamp = {Tue, 21 Mar 2023 20:54:44 +0100}, biburl = {https://dblp.org/rec/conf/qest/SmusevaMMMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-10344, author = {Magdalene Ng and Kovila P. L. Coopamootoo and Tasos Spiliotopoulos and Dave Horsfall and Mhairi Aitken and Ehsan Toreini and Karen Elliott and Aad van Moorsel}, title = {In Private, Secure, Conversational FinBots We Trust}, journal = {CoRR}, volume = {abs/2204.10344}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.10344}, doi = {10.48550/ARXIV.2204.10344}, eprinttype = {arXiv}, eprint = {2204.10344}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-10344.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-06856, author = {Han Wu and Zilong Zhao and Lydia Y. Chen and Aad van Moorsel}, title = {Federated Learning for Tabular Data: Exploring Potential Risk to Privacy}, journal = {CoRR}, volume = {abs/2210.06856}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.06856}, doi = {10.48550/ARXIV.2210.06856}, eprinttype = {arXiv}, eprint = {2210.06856}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-06856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/AldweeshAMM21, author = {Amjad Aldweesh and Maher Alharby and Maryam Mehrnezhad and Aad van Moorsel}, title = {The OpBench Ethereum opcode benchmark framework: Design, implementation, validation and experiments}, journal = {Perform. Evaluation}, volume = {146}, pages = {102168}, year = {2021}, url = {https://doi.org/10.1016/j.peva.2020.102168}, doi = {10.1016/J.PEVA.2020.102168}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pe/AldweeshAMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MatthewsSM21, author = {Isaac Matthews and Sadegh Soudjani and Aad van Moorsel}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {171--186}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_12}, doi = {10.1007/978-3-030-89137-4\_12}, timestamp = {Mon, 15 Aug 2022 09:54:01 +0200}, biburl = {https://dblp.org/rec/conf/scisec/MatthewsSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-10212, author = {Isaac Matthews and Sadegh Soudjani and Aad van Moorsel}, title = {Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs}, journal = {CoRR}, volume = {abs/2103.10212}, year = {2021}, url = {https://arxiv.org/abs/2103.10212}, eprinttype = {arXiv}, eprint = {2103.10212}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-10212.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-06053, author = {Tasos Spiliotopoulos and Dave Horsfall and Magdalene Ng and Kovila P. L. Coopamootoo and Aad van Moorsel and Karen Elliott}, title = {Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: {A} Use Case Using Decentralised Identifiers and Verifiable Credentials}, journal = {CoRR}, volume = {abs/2106.06053}, year = {2021}, url = {https://arxiv.org/abs/2106.06053}, eprinttype = {arXiv}, eprint = {2106.06053}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-06053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-09767, author = {Karen Elliott and Kovila P. L. Coopamootoo and Edward Curran and Paul D. Ezhilchelvan and Samantha Finnigan and Dave Horsfall and Zhichao Ma and Magdalene Ng and Tasos Spiliotopoulos and Han Wu and Aad van Moorsel}, title = {Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion}, journal = {CoRR}, volume = {abs/2112.09767}, year = {2021}, url = {https://arxiv.org/abs/2112.09767}, eprinttype = {arXiv}, eprint = {2112.09767}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-09767.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdatasociety/AitkenTCCEM20, author = {Mhairi Aitken and Ehsan Toreini and Peter Carmichael and Kovila P. L. Coopamootoo and Karen Elliott and Aad van Moorsel}, title = {Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices}, journal = {Big Data Soc.}, volume = {7}, number = {1}, pages = {205395172090889}, year = {2020}, url = {https://doi.org/10.1177/2053951720908892}, doi = {10.1177/2053951720908892}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bigdatasociety/AitkenTCCEM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/EzhilchelvanAM20, author = {Paul D. Ezhilchelvan and Amjad Aldweesh and Aad van Moorsel}, title = {Non-blocking two-phase commit using blockchain}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {12}, year = {2020}, url = {https://doi.org/10.1002/cpe.5276}, doi = {10.1002/CPE.5276}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/EzhilchelvanAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fbloc/AlharbyM20, author = {Maher Alharby and Aad van Moorsel}, title = {BlockSim: An Extensible Simulation Tool for Blockchain Systems}, journal = {Frontiers Blockchain}, volume = {3}, pages = {28}, year = {2020}, url = {https://doi.org/10.3389/fbloc.2020.00028}, doi = {10.3389/FBLOC.2020.00028}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fbloc/AlharbyM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/PuthalYDWSMR20, author = {Deepak Puthal and Laurence T. Yang and Schahram Dustdar and Zhenyu Wen and Jun Song and Aad van Moorsel and Rajiv Ranjan}, title = {A User-centric Security Solution for Internet of Things and Edge Convergence}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {4}, number = {3}, pages = {32:1--32:19}, year = {2020}, url = {https://doi.org/10.1145/3351882}, doi = {10.1145/3351882}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcps/PuthalYDWSMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/LunardiANZDM20, author = {Roben Castagna Lunardi and Maher Alharby and Henry C. Nunes and Avelino F. Zorzo and Changyu Dong and Aad van Moorsel}, title = {Context-based consensus for appendable-block blockchains}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes, Greece, November 2-6, 2020}, pages = {401--408}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/Blockchain50366.2020.00058}, doi = {10.1109/BLOCKCHAIN50366.2020.00058}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/LunardiANZDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/brains/AlharbyM20, author = {Maher Alharby and Aad van Moorsel}, title = {Fitting and Regression for Distributions of Ethereum Smart Contracts}, booktitle = {2nd Conference on Blockchain Research {\&} Applications for Innovative Networks and Services, {BRAINS} 2020, Paris, France, September 28-30, 2020}, pages = {248--255}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BRAINS49436.2020.9223314}, doi = {10.1109/BRAINS49436.2020.9223314}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/brains/AlharbyM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/AlharbyLAM20, author = {Maher Alharby and Roben Castagna Lunardi and Amjad Aldweesh and Aad van Moorsel}, title = {Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma}, booktitle = {50th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2020, Valencia, Spain, June 29 - July 2, 2020}, pages = {209--220}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSN48063.2020.00038}, doi = {10.1109/DSN48063.2020.00038}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/AlharbyLAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AitkenNTMCE20, author = {Mhairi Aitken and Magdalene Ng and Ehsan Toreini and Aad van Moorsel and Kovila P. L. Coopamootoo and Karen Elliott}, editor = {Ioana Boureanu and Constantin Catalin Dragan and Mark Manulis and Thanassis Giannetsos and Christoforos Dadoyan and Panagiotis Gouvas and Roger A. Hallman and Shujun Li and Victor Chang and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse}, title = {Keeping it Human: {A} Focus Group Study of Public Attitudes Towards {AI} in Banking}, booktitle = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12580}, pages = {21--38}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66504-3\_2}, doi = {10.1007/978-3-030-66504-3\_2}, timestamp = {Sun, 10 Dec 2023 06:07:27 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AitkenNTMCE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/NgCTAEM20, author = {Magdalene Ng and Kovila P. L. Coopamootoo and Ehsan Toreini and Mhairi Aitken and Karen Elliott and Aad van Moorsel}, title = {Simulating the Effects of Social Presence on Trust, Privacy Concerns {\&} Usage Intentions in Automated Bots for Finance}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {190--199}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00034}, doi = {10.1109/EUROSPW51379.2020.00034}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/NgCTAEM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fat/ToreiniACEZM20, author = {Ehsan Toreini and Mhairi Aitken and Kovila P. L. Coopamootoo and Karen Elliott and Carlos Gonzalez Zelaya and Aad van Moorsel}, editor = {Mireille Hildebrandt and Carlos Castillo and L. Elisa Celis and Salvatore Ruggieri and Linnet Taylor and Gabriela Zanfir{-}Fortuna}, title = {The relationship between trust in {AI} and trustworthy machine learning technologies}, booktitle = {FAT* '20: Conference on Fairness, Accountability, and Transparency, Barcelona, Spain, January 27-30, 2020}, pages = {272--283}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3351095.3372834}, doi = {10.1145/3351095.3372834}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fat/ToreiniACEZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MatthewsMSM20, author = {Isaac Matthews and John C. Mace and Sadegh Soudjani and Aad van Moorsel}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Cyclic Bayesian Attack Graphs: {A} Systematic Computational Approach}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {129--136}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00030}, doi = {10.1109/TRUSTCOM50675.2020.00030}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MatthewsMSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ws/20/WolterPMK20, author = {Katinka Wolter and Tommi Pesu and Aad van Moorsel and William J. Knottenbelt}, editor = {Tadashi Dohi and Kishor S. Trivedi and Alberto Avritzer}, title = {Black-Box Models for Restart, Reboot and Rejuvenation}, booktitle = {Handbook of Software Aging and Rejuvenation - Fundamentals, Methods, Applications, and Future Directions}, pages = {155--194}, publisher = {WorldScientific}, year = {2020}, url = {https://doi.org/10.1142/9789811214578\_0007}, doi = {10.1142/9789811214578\_0007}, timestamp = {Thu, 27 Oct 2022 17:13:06 +0200}, biburl = {https://dblp.org/rec/books/ws/20/WolterPMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-12768, author = {Maher Alharby and Roben Castagna Lunardi and Amjad Aldweesh and Aad van Moorsel}, title = {Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma}, journal = {CoRR}, volume = {abs/2004.12768}, year = {2020}, url = {https://arxiv.org/abs/2004.12768}, eprinttype = {arXiv}, eprint = {2004.12768}, timestamp = {Wed, 29 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-12768.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-13438, author = {Maher Alharby and Aad van Moorsel}, title = {BlockSim: An Extensible Simulation Tool for Blockchain Systems}, journal = {CoRR}, volume = {abs/2004.13438}, year = {2020}, url = {https://arxiv.org/abs/2004.13438}, eprinttype = {arXiv}, eprint = {2004.13438}, timestamp = {Sat, 02 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-13438.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-06350, author = {Isaac Matthews and John C. Mace and Sadegh Soudjani and Aad van Moorsel}, title = {Cyclic Bayesian Attack Graphs: {A} Systematic Computational Approach}, journal = {CoRR}, volume = {abs/2005.06350}, year = {2020}, url = {https://arxiv.org/abs/2005.06350}, eprinttype = {arXiv}, eprint = {2005.06350}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-06350.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-15449, author = {Magdalene Ng and Kovila P. L. Coopamootoo and Ehsan Toreini and Mhairi Aitken and Karen Elliott and Aad van Moorsel}, title = {Simulating the Effects of Social Presence on Trust, Privacy Concerns {\textbackslash}{\&} Usage Intentions in Automated Bots for Finance}, journal = {CoRR}, volume = {abs/2006.15449}, year = {2020}, url = {https://arxiv.org/abs/2006.15449}, eprinttype = {arXiv}, eprint = {2006.15449}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-15449.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08911, author = {Ehsan Toreini and Mhairi Aitken and Kovila P. L. Coopamootoo and Karen Elliott and Vladimiro Gonz{\'{a}}lez{-}Zelaya and Paolo Missier and Magdalene Ng and Aad van Moorsel}, title = {Technologies for Trustworthy Machine Learning: {A} Survey in a Socio-Technical Context}, journal = {CoRR}, volume = {abs/2007.08911}, year = {2020}, url = {https://arxiv.org/abs/2007.08911}, eprinttype = {arXiv}, eprint = {2007.08911}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08911.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-12390, author = {Mohammed Aamir Ali and Thomas Gro{\ss} and Aad van Moorsel}, title = {Investigation of 3-D Secure's Model for Fraud Detection}, journal = {CoRR}, volume = {abs/2009.12390}, year = {2020}, url = {https://arxiv.org/abs/2009.12390}, eprinttype = {arXiv}, eprint = {2009.12390}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-12390.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ShitSPJPMZR19, author = {Rathin Chandra Shit and Suraj Sharma and Deepak Puthal and Philip James and Biswajeet Pradhan and Aad van Moorsel and Albert Y. Zomaya and Rajiv Ranjan}, title = {Ubiquitous Localization (UbiLoc): {A} Survey and Taxonomy on Device Free Localization for Smart World}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {21}, number = {4}, pages = {3532--3564}, year = {2019}, url = {https://doi.org/10.1109/COMST.2019.2915923}, doi = {10.1109/COMST.2019.2915923}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/ShitSPJPMZR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BarikaGZWMR19, author = {Mutaz Barika and Saurabh Kumar Garg and Albert Y. Zomaya and Lizhe Wang and Aad van Moorsel and Rajiv Ranjan}, title = {Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions}, journal = {{ACM} Comput. Surv.}, volume = {52}, number = {5}, pages = {95:1--95:41}, year = {2019}, url = {https://doi.org/10.1145/3332301}, doi = {10.1145/3332301}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BarikaGZWMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AliACHM19, author = {Mohammed Aamir Ali and Muhammad Ajmal Azad and Mario Parre{\~{n}}o Centeno and Feng Hao and Aad van Moorsel}, title = {Consumer-facing technology fraud: Economics, attack methods and potential solutions}, journal = {Future Gener. Comput. Syst.}, volume = {100}, pages = {408--427}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.03.041}, doi = {10.1016/J.FUTURE.2019.03.041}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AliACHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/AldweeshAMM19, author = {Amjad Aldweesh and Maher Alharby and Maryam Mehrnezhad and Aad van Moorsel}, title = {OpBench: {A} {CPU} Performance Benchmark for Ethereum Smart Contract Operation Code}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {274--281}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00043}, doi = {10.1109/BLOCKCHAIN.2019.00043}, timestamp = {Wed, 08 Jan 2020 16:20:56 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/AldweeshAMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/CentenoAGM19, author = {Mario Parre{\~{n}}o Centeno and Mohammed Aamir Ali and Yu Guan and Aad van Moorsel}, editor = {Slim Kallel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ahmed Hadj Kacem}, title = {Unsupervised Machine Learning for Card Payment Fraud Detection}, booktitle = {Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12026}, pages = {247--262}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41568-6\_16}, doi = {10.1007/978-3-030-41568-6\_16}, timestamp = {Tue, 03 Mar 2020 17:17:08 +0100}, biburl = {https://dblp.org/rec/conf/crisis/CentenoAGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AliM19, author = {Mohammed Aamir Ali and Aad van Moorsel}, editor = {Ian Goldberg and Tyler Moore}, title = {Designed to Be Broken: {A} Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {201--221}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_13}, doi = {10.1007/978-3-030-32101-7\_13}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/AliM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-00782, author = {Ehsan Toreini and Mhairi Aitken and Kovila P. L. Coopamootoo and Karen Elliott and Carlos Gonzalez Zelaya and Aad van Moorsel}, title = {The relationship between trust in {AI} and trustworthy machine learning technologies}, journal = {CoRR}, volume = {abs/1912.00782}, year = {2019}, url = {http://arxiv.org/abs/1912.00782}, eprinttype = {arXiv}, eprint = {1912.00782}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-00782.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/Moorsel18, author = {Aad van Moorsel}, title = {Benchmarks and Models for Blockchain: Consensus Algorithms}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {46}, number = {3}, pages = {113}, year = {2018}, url = {https://doi.org/10.1145/3308897.3308949}, doi = {10.1145/3308897.3308949}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/Moorsel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/AlharbyM18, author = {Maher Alharby and Aad van Moorsel}, title = {BlockSim: {A} Simulation Framework for Blockchain Systems}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {46}, number = {3}, pages = {135--138}, year = {2018}, url = {https://doi.org/10.1145/3308897.3308956}, doi = {10.1145/3308897.3308956}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/AlharbyM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/AldweeshAM18, author = {Amjad Aldweesh and Maher Alharby and Aad van Moorsel}, title = {Performance Benchmarking for Ethereum Opcodes}, booktitle = {15th {IEEE/ACS} International Conference on Computer Systems and Applications, {AICCSA} 2018, Aqaba, Jordan, October 28 - Nov. 1, 2018}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AICCSA.2018.8612882}, doi = {10.1109/AICCSA.2018.8612882}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aiccsa/AldweeshAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/AldweeshASM18, author = {Amjad Aldweesh and Maher Alharby and Ellis Solaiman and Aad van Moorsel}, title = {Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum}, booktitle = {14th European Dependable Computing Conference, {EDCC} 2018, Ia{\c{s}}i, Romania, September 10-14, 2018}, pages = {144--149}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/EDCC.2018.00034}, doi = {10.1109/EDCC.2018.00034}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edcc/AldweeshASM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/CentenoGM18, author = {Mario Parre{\~{n}}o Centeno and Yu Guan and Aad van Moorsel}, title = {Mobile Based Continuous Authentication Using Deep Features}, booktitle = {Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, EMDL@MobiSys 2018, Munich, Germany, June 15, 2018}, pages = {19--24}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212725.3212732}, doi = {10.1145/3212725.3212732}, timestamp = {Mon, 12 Nov 2018 09:46:48 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/CentenoGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/EzhilchelvanAM18, author = {Paul D. Ezhilchelvan and Amjad Aldweesh and Aad van Moorsel}, title = {Non-Blocking Two Phase Commit Using Blockchain}, booktitle = {Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, CRYBLOCK@MobiSys 2018, Munich, Germany, June 15, 2018}, pages = {36--41}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3211933.3211940}, doi = {10.1145/3211933.3211940}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/EzhilchelvanAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/Ali0M18, author = {Mohammed Aamir Ali and Thomas Gro{\ss} and Aad van Moorsel}, editor = {Giampaolo Bella and Gabriele Lenzini and Theo Tryfonas and Debi Ashenden}, title = {Investigation of 3-D secure's model for fraud detection}, booktitle = {{STAST} 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018}, pages = {3:1--3:11}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3361331.3361334}, doi = {10.1145/3361331.3361334}, timestamp = {Wed, 21 Apr 2021 15:28:19 +0200}, biburl = {https://dblp.org/rec/conf/stast/Ali0M18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosp/Moorsel18, author = {Aad van Moorsel}, editor = {Katinka Wolter and William J. Knottenbelt and Andr{\'{e}} van Hoorn and Manoj Nambiar}, title = {Benchmarks and Models for Blockchain}, booktitle = {Proceedings of the 2018 {ACM/SPEC} International Conference on Performance Engineering, {ICPE} 2018, Berlin, Germany, April 09-13, 2018}, pages = {3}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3184407.3184441}, doi = {10.1145/3184407.3184441}, timestamp = {Fri, 02 Jun 2023 16:15:08 +0200}, biburl = {https://dblp.org/rec/conf/wosp/Moorsel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongWAMM18, author = {Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel}, title = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2018}, url = {https://eprint.iacr.org/2018/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongWAMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AliAEM17, author = {Mohammed Aamir Ali and Budi Arief and Martin Emms and Aad P. A. van Moorsel}, title = {Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {2}, pages = {78--86}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.27}, doi = {10.1109/MSP.2017.27}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AliAEM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/RanjanPJBM17, author = {Rajiv Ranjan and Jedsada Phengsuwan and Philip James and Stuart L. Barr and Aad van Moorsel}, title = {Urban Risk Analytics in the Cloud}, journal = {{IT} Prof.}, volume = {19}, number = {2}, pages = {4--9}, year = {2017}, url = {https://doi.org/10.1109/MITP.2017.20}, doi = {10.1109/MITP.2017.20}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/RanjanPJBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DongWAMM17, author = {Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {211--227}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134032}, doi = {10.1145/3133956.3134032}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DongWAMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epew/MaceTMM17, author = {John C. Mace and Nipun Balan Thekkummal and Charles Morisset and Aad van Moorsel}, editor = {Philipp Reinecke and Antinisca Di Marco}, title = {ADaCS: {A} Tool for Analysing Data Collection Strategies}, booktitle = {Computer Performance Engineering - 14th European Workshop, {EPEW} 2017, Berlin, Germany, September 7-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10497}, pages = {230--245}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66583-2\_15}, doi = {10.1007/978-3-319-66583-2\_15}, timestamp = {Sat, 21 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epew/MaceTMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/MoorselFR17, author = {Aad P. A. van Moorsel and Matthew Forshaw and Francisco Rocha}, title = {Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case}, booktitle = {28th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2017, Toulouse, France, October 23-26, 2017}, pages = {240--249}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ISSRE.2017.41}, doi = {10.1109/ISSRE.2017.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/MoorselFR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CentenoMC17, author = {Mario Parre{\~{n}}o Centeno and Aad van Moorsel and Stefano Castruccio}, title = {Smartphone Continuous Authentication Using Deep Learning Autoencoders}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {147--158}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00026}, doi = {10.1109/PST.2017.00026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/CentenoMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AlqahtaniM18, author = {Mohammed Alqahtani and Aad van Moorsel}, editor = {Osama Nasser Alrajeh and Nigel Thomas}, title = {Risk Assessment Methodology For {EMV} Financial Transaction Systems}, booktitle = {Proceedings of the thirty third Annual {UK} Performance Engineering Workshops, {UKPEW} 2017, Newcastle upon Tyne, UK, December 2017}, series = {Electronic Notes in Theoretical Computer Science}, volume = {340}, pages = {137--150}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/j.entcs.2018.09.010}, doi = {10.1016/J.ENTCS.2018.09.010}, timestamp = {Sat, 12 Nov 2022 12:58:32 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AlqahtaniM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AlharbyM18, author = {Maher Alharby and Aad van Moorsel}, editor = {Osama Nasser Alrajeh and Nigel Thomas}, title = {The Impact of Profit Uncertainty on Miner Decisions in Blockchain Systems}, booktitle = {Proceedings of the thirty third Annual {UK} Performance Engineering Workshops, {UKPEW} 2017, Newcastle upon Tyne, UK, December 2017}, series = {Electronic Notes in Theoretical Computer Science}, volume = {340}, pages = {151--167}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/j.entcs.2018.09.011}, doi = {10.1016/J.ENTCS.2018.09.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/AlharbyM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-01171, author = {Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel}, title = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing}, journal = {CoRR}, volume = {abs/1708.01171}, year = {2017}, url = {http://arxiv.org/abs/1708.01171}, eprinttype = {arXiv}, eprint = {1708.01171}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-01171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-06372, author = {Maher Alharby and Aad van Moorsel}, title = {Blockchain-based Smart Contracts: {A} Systematic Mapping Study}, journal = {CoRR}, volume = {abs/1710.06372}, year = {2017}, url = {http://arxiv.org/abs/1710.06372}, eprinttype = {arXiv}, eprint = {1710.06372}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-06372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/YevseyevaMM16, author = {Iryna Yevseyeva and Charles Morisset and Aad P. A. van Moorsel}, title = {Modeling and analysis of influence power for information security decisions}, journal = {Perform. Evaluation}, volume = {98}, pages = {36--51}, year = {2016}, url = {https://doi.org/10.1016/j.peva.2016.01.003}, doi = {10.1016/J.PEVA.2016.01.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pe/YevseyevaMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/MehrnezhadAHM16, author = {Maryam Mehrnezhad and Mohammed Aamir Ali and Feng Hao and Aad P. A. van Moorsel}, editor = {Lidong Chen and David A. McGrew and Chris J. Mitchell}, title = {{NFC} Payment Spy: {A} Privacy Attack on Contactless Payments}, booktitle = {Security Standardisation Research - Third International Conference, {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10074}, pages = {92--111}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49100-4\_4}, doi = {10.1007/978-3-319-49100-4\_4}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/MehrnezhadAHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serene/MaceMM16, author = {John C. Mace and Charles Morisset and Aad P. A. van Moorsel}, editor = {Ivica Crnkovic and Elena Troubitsyna}, title = {{WRAD:} Tool Support for Workflow Resiliency Analysis and Design}, booktitle = {Software Engineering for Resilient Systems - 8th International Workshop, {SERENE} 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9823}, pages = {79--87}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45892-2\_6}, doi = {10.1007/978-3-319-45892-2\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/serene/MaceMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/McGoughAGWBFMAT15, author = {Andrew Stephen McGough and Budi Arief and Carl Gamble and David Wall and John Brennan and John S. Fitzgerald and Aad P. A. van Moorsel and Sujeewa Alwis and Georgios Theodoropoulos and Ed Ruck{-}Keene}, title = {Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {4}, pages = {3--46}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.12.31.003}, doi = {10.22667/JOWUA.2015.12.31.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/McGoughAGWBFMAT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcshci/TurlandCJBM15, author = {James Turland and Lynne M. Coventry and Debora Jeske and Pam Briggs and Aad P. A. van Moorsel}, editor = {Shaun W. Lawson and Patrick Dickinson}, title = {Nudging towards security: developing an application for wireless network selection for android phones}, booktitle = {Proceedings of the 2015 British {HCI} Conference, Lincoln, United Kingdom, July 13-17, 2015}, pages = {193--201}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2783446.2783588}, doi = {10.1145/2783446.2783588}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bcshci/TurlandCJBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McGoughWBTRAGFM15, author = {Andrew Stephen McGough and David Wall and John Brennan and Georgios Theodoropoulos and Ed Ruck{-}Keene and Budi Arief and Carl Gamble and John S. Fitzgerald and Aad P. A. van Moorsel and Sujeewa Alwis}, editor = {Elisa Bertino and Ilsun You}, title = {Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware)}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {1--12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808785}, doi = {10.1145/2808783.2808785}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/McGoughWBTRAGFM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/centeris/YevseyevaFEM15, author = {Iryna Yevseyeva and Vitor Basto{-}Fernandes and Michael Emmerich and Aad van Moorsel}, editor = {Maria Manuela Cruz{-}Cunha and Jo{\~{a}}o Eduardo Quintela Varaj{\~{a}}o and Rui Rijo and Ricardo Martinho and Petra Schubert and Albert Boonstra and Ricardo Correia and Alexander Berler}, title = {Selecting Optimal Subset of Security Controls}, booktitle = {Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, CENTERIS/ProjMAN/HCist 2015, Vilamoura, Portugal, October 7-9, 2015}, series = {Procedia Computer Science}, volume = {64}, pages = {1035--1042}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.procs.2015.08.625}, doi = {10.1016/J.PROCS.2015.08.625}, timestamp = {Tue, 23 Apr 2024 23:18:35 +0200}, biburl = {https://dblp.org/rec/conf/centeris/YevseyevaFEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/MaceMM15, author = {John C. Mace and Charles Morisset and Aad P. A. van Moorsel}, editor = {David M. Nicol}, title = {Modelling user availability in workflow resiliency analysis}, booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746194.2746201}, doi = {10.1145/2746194.2746201}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/MaceMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/CainM15, author = {Robert Cain and Aad P. A. van Moorsel}, editor = {David M. Nicol}, title = {Optimisation of data collection strategies for model-based evaluation and decision-making: poster}, booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015}, pages = {28:1--28:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746194.2746224}, doi = {10.1145/2746194.2746224}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/CainM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/MaceMM15, author = {John C. Mace and Charles Morisset and Aad P. A. van Moorsel}, editor = {Javier Campos and Boudewijn R. Haverkort}, title = {Impact of Policy Design on Workflow Resiliency Computation Time}, booktitle = {Quantitative Evaluation of Systems, 12th International Conference, {QEST} 2015, Madrid, Spain, September 1-3, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9259}, pages = {244--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22264-6\_16}, doi = {10.1007/978-3-319-22264-6\_16}, timestamp = {Sat, 19 Oct 2019 20:32:11 +0200}, biburl = {https://dblp.org/rec/conf/qest/MaceMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serene/MaceMM15, author = {John C. Mace and Charles Morisset and Aad P. A. van Moorsel}, editor = {Alessandro Fantechi and Patrizio Pelliccione}, title = {Resiliency Variance in Workflows with Choice}, booktitle = {Software Engineering for Resilient Systems - 7th International Workshop, {SERENE} 2015, Paris, France, September 7-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9274}, pages = {128--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23129-7\_10}, doi = {10.1007/978-3-319-23129-7\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/serene/MaceMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ZengKM14, author = {Wen Zeng and Maciej Koutny and Aad P. A. van Moorsel}, title = {Performance Modelling and Evaluation of Enterprise Information Security Technologies}, booktitle = {14th {IEEE} International Conference on Computer and Information Technology, {CIT} 2014, Xi'an, China, September 11-13, 2014}, pages = {504--511}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIT.2014.18}, doi = {10.1109/CIT.2014.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ZengKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EmmsAFHM14, author = {Martin Emms and Budi Arief and Leo Freitas and Joseph Hannon and Aad P. A. van Moorsel}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Harvesting High Value Foreign Currency Transactions from {EMV} Contactless Credit Cards Without the {PIN}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {716--726}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660312}, doi = {10.1145/2660267.2660312}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EmmsAFHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epew/YevseyevaMGM14, author = {Iryna Yevseyeva and Charles Morisset and Thomas Gro{\ss} and Aad P. A. van Moorsel}, editor = {Andr{\'{a}}s Horv{\'{a}}th and Katinka Wolter}, title = {A Decision Making Model of Influencing Behavior in Information Security}, booktitle = {Computer Performance Engineering - 11th European Workshop, {EPEW} 2014, Florence, Italy, September 11-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8721}, pages = {194--208}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10885-8\_14}, doi = {10.1007/978-3-319-10885-8\_14}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/epew/YevseyevaMGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaceMM14, author = {John C. Mace and Charles Morisset and Aad P. A. van Moorsel}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Quantitative Workflow Resiliency}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {344--361}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_20}, doi = {10.1007/978-3-319-11203-9\_20}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MaceMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/CoventryBJM14, author = {Lynne M. Coventry and Pam Briggs and Debora Jeske and Aad P. A. van Moorsel}, editor = {Aaron Marcus}, title = {{SCENE:} {A} Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment}, booktitle = {Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience - Third International Conference, {DUXU} 2014, Held as Part of {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8517}, pages = {229--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07668-3\_23}, doi = {10.1007/978-3-319-07668-3\_23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/CoventryBJM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/MorissetGMY14, author = {Charles Morisset and Thomas Gro{\ss} and Aad P. A. van Moorsel and Iryna Yevseyeva}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {Nudging for Quantitative Access Control Systems}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Second International Conference, {HAS} 2014, Held as Part of {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8533}, pages = {340--351}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07620-1\_30}, doi = {10.1007/978-3-319-07620-1\_30}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/MorissetGMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MorissetYGM14, author = {Charles Morisset and Iryna Yevseyeva and Thomas Gro{\ss} and Aad P. A. van Moorsel}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {A Formal Model for Soft Enforcement: Influencing the Decision-Maker}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {113--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_8}, doi = {10.1007/978-3-319-11851-2\_8}, timestamp = {Thu, 23 Sep 2021 11:47:56 +0200}, biburl = {https://dblp.org/rec/conf/stm/MorissetYGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/AriefCEM14, author = {Budi Arief and Kovila P. L. Coopamootoo and Martin Emms and Aad P. A. van Moorsel}, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {201--204}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665943.2665965}, doi = {10.1145/2665943.2665965}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/AriefCEM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AlsuhibanyAMSM13, author = {Suliman A. Alsuhibany and Ahmad Alonaizi and Charles Morisset and Chris Smith and Aad P. A. van Moorsel}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {321--336}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_22}, doi = {10.1007/978-3-642-40588-4\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlsuhibanyAMSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AlsuhibanyM13, author = {Suliman A. Alsuhibany and Aad P. A. van Moorsel}, title = {Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {437--445}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.58}, doi = {10.1109/ARES.2013.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AlsuhibanyM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/WongthaiRM13, author = {Winai Wongthai and Francisco Liberal Rocha and Aad P. A. van Moorsel}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu}, title = {A Generic Logging Template for Infrastructure as a Service Cloud}, booktitle = {27th International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2013, Barcelona, Spain, March 25-28, 2013}, pages = {1153--1160}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WAINA.2013.108}, doi = {10.1109/WAINA.2013.108}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/WongthaiRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/AlsuhibanyMM13, author = {Suliman A. Alsuhibany and Charles Morisset and Aad P. A. van Moorsel}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {Detection of attack strategies}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766353}, doi = {10.1109/CRISIS.2013.6766353}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/AlsuhibanyMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/EmmsALM13, author = {Martin Emms and Budi Arief and Nicholas Little and Aad P. A. van Moorsel}, editor = {Ahmad{-}Reza Sadeghi}, title = {Risks of Offline Verify {PIN} on Contactless Cards}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {313--321}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_26}, doi = {10.1007/978-3-642-39884-1\_26}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/EmmsALM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/RochaGM13, author = {Francisco Rocha and Thomas Gross and Aad P. A. van Moorsel}, title = {Defense-in-Depth Against Malicious Insiders in the Cloud}, booktitle = {2013 {IEEE} International Conference on Cloud Engineering, {IC2E} 2013, San Francisco, CA, USA, March 25-27, 2013}, pages = {88--97}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IC2E.2013.20}, doi = {10.1109/IC2E.2013.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/RochaGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/EmmsAM12, author = {Martin Emms and Budi Arief and Aad P. A. van Moorsel}, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors}, booktitle = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF} 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8319}, pages = {203--214}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-54069-1\_13}, doi = {10.1007/978-3-642-54069-1\_13}, timestamp = {Sat, 19 Oct 2019 20:10:28 +0200}, biburl = {https://dblp.org/rec/conf/apf/EmmsAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/GreatheadCAM12, author = {David Greathead and Lynne M. Coventry and Budi Arief and Aad P. A. van Moorsel}, editor = {Joseph A. Konstan and Ed H. Chi and Kristina H{\"{o}}{\"{o}}k}, title = {Deriving requirements for an online community interaction scheme: indications from older adults}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, {CHI} '12, Extended Abstracts Volume, Austin, TX, USA, May 5-10, 2012}, pages = {1541--1546}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2212776.2223669}, doi = {10.1145/2212776.2223669}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/GreatheadCAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CainM12, author = {Robert Cain and Aad P. A. van Moorsel}, editor = {Robert S. Swarz and Philip Koopman and Michel Cukier}, title = {Optimization of data collection strategies for model-based evaluation and decision-making}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSN.2012.6263947}, doi = {10.1109/DSN.2012.6263947}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/CainM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/wolter12, editor = {Katinka Wolter and Alberto Avritzer and Marco Vieira and Aad P. A. van Moorsel}, title = {Resilience Assessment and Evaluation of Computing Systems}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29032-9}, doi = {10.1007/978-3-642-29032-9}, isbn = {978-3-642-29031-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/wolter12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KaanicheM11, author = {Mohamed Ka{\^{a}}niche and Aad P. A. van Moorsel}, title = {It All Depends, and Increasingly So}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {6}, pages = {56--57}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.165}, doi = {10.1109/MSP.2011.165}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KaanicheM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/FenzPM11, author = {Stefan Fenz and Simon Edward Parkin and Aad P. A. van Moorsel}, title = {A Community Knowledge Base for {IT} Security}, journal = {{IT} Prof.}, volume = {13}, number = {3}, pages = {24--30}, year = {2011}, url = {https://doi.org/10.1109/MITP.2011.35}, doi = {10.1109/MITP.2011.35}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/FenzPM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/AbdullahM11, author = {Johari Abdullah and Aad P. A. van Moorsel}, title = {Uncertainty and Uncertainty Tolerance in Service Provisioning}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {4}, pages = {89--109}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.11.31.089}, doi = {10.22667/JISIS.2011.11.31.089}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/AbdullahM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/AriefMGC11, author = {Budi Arief and Aad P. A. van Moorsel and David Greathead and Lynne M. Coventry}, title = {Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies}, booktitle = {International Conference on Computational Aspects of Social Networks, CASoN 2011, Salamanca, Spain, October 19-21, 2011}, pages = {25--30}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CASON.2011.6085913}, doi = {10.1109/CASON.2011.6085913}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/cason/AriefMGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/MaceMW11, author = {John C. Mace and Aad P. A. van Moorsel and Paul Watson}, title = {The case for dynamic security solutions in public cloud workflow deployments}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops {(DSN-W} 2011), Hong Kong, China, June 27-30, 2011}, pages = {111--116}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DSNW.2011.5958795}, doi = {10.1109/DSNW.2011.5958795}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/MaceMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epew/KassabM11, author = {Rouaa Yassin Kassab and Aad P. A. van Moorsel}, editor = {Nigel Thomas}, title = {Formal Mapping of {WSLA} Contracts on Stochastic Models}, booktitle = {Computer Performance Engineering - 8th European Performance Engineering Workshop, {EPEW} 2011, Borrowdale, UK, October 12-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6977}, pages = {117--132}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24749-1\_10}, doi = {10.1007/978-3-642-24749-1\_10}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/epew/KassabM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ZengM11, author = {Wen Zeng and Aad P. A. van Moorsel}, editor = {Nigel Thomas and Jeremy T. Bradley and William J. Knottenbelt and Samuel Kounev and Nikolaus Huber and Fabian Brosig}, title = {Quantitative Evaluation of Enterprise {DRM} Technology}, booktitle = {Fifth International Workshop on the Practical Application of Stochastic Modelling, PASM@ICPE 2011, Karlsruhe, Germany, March 2011}, series = {Electronic Notes in Theoretical Computer Science}, volume = {275}, pages = {159--174}, publisher = {Elsevier}, year = {2011}, url = {https://doi.org/10.1016/j.entcs.2011.09.011}, doi = {10.1016/J.ENTCS.2011.09.011}, timestamp = {Fri, 10 Mar 2023 15:05:32 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ZengM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/ReineckeWM10, author = {Philipp Reinecke and Katinka Wolter and Aad P. A. van Moorsel}, title = {Evaluating the adaptivity of computing systems}, journal = {Perform. Evaluation}, volume = {67}, number = {8}, pages = {676--693}, year = {2010}, url = {https://doi.org/10.1016/j.peva.2009.12.001}, doi = {10.1016/J.PEVA.2009.12.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pe/ReineckeWM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chimit/MacePM10, author = {John C. Mace and Simon Edward Parkin and Aad P. A. van Moorsel}, editor = {Adam Moskowitz and Nicole Forsgren and Tamara Babaian and Konstantin Beznosov}, title = {A collaborative ontology development tool for information security managers}, booktitle = {Proceedings of the 4th {ACM} Symposium on Computer Human Interaction for Management of Information Technology, {CHIMIT} 2010, San Jose, CA, USA, November 12-13, 2010}, pages = {5}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873561.1873566}, doi = {10.1145/1873561.1873566}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chimit/MacePM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/MachulakMCM10, author = {Maciej P. Machulak and Eve Maler and Domenico Catalano and Aad P. A. van Moorsel}, editor = {Thomas Gro{\ss} and Kenji Takahashi}, title = {User-managed access to web resources}, booktitle = {Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010}, pages = {35--44}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866855.1866865}, doi = {10.1145/1866855.1866865}, timestamp = {Tue, 12 Feb 2019 16:55:52 +0100}, biburl = {https://dblp.org/rec/conf/dim/MachulakMCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3k/MacePM10, author = {John C. Mace and Simon Edward Parkin and Aad P. A. van Moorsel}, editor = {Kecheng Liu and Joaquim Filipe}, title = {Ontology Editing Tool for Information Security and Human Factors Experts}, booktitle = {{KMIS} 2010 - Proceedings of the International Conference on Knowledge Management and Information Sharing, Valencia, Spain, October 25-28, 2010}, pages = {207--212}, publisher = {SciTePress}, year = {2010}, timestamp = {Thu, 27 Oct 2011 13:04:33 +0200}, biburl = {https://dblp.org/rec/conf/ic3k/MacePM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/MachulakM10, author = {Maciej P. Machulak and Aad P. A. van Moorsel}, title = {Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications}, booktitle = {30th {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2010 Workshops), 21-25 June 2010, Genova, Italy}, pages = {62--71}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDCSW.2010.37}, doi = {10.1109/ICDCSW.2010.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/MachulakM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/MachulakMM10, author = {Maciej P. Machulak and Lukasz Moren and Aad P. A. van Moorsel}, editor = {Karl M. G{\"{o}}schka and Frank Leymann and Schahram Dustdar and Helen Paik and Vladimir Tosic and Lorenz Froihofer}, title = {Design and implementation of user-managed access framework for web 2.0 applications}, booktitle = {Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing, MW4SOC, Bangalore, India, November 29 - December 03, 2010}, pages = {1--6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1890912.1890913}, doi = {10.1145/1890912.1890913}, timestamp = {Wed, 26 May 2021 16:01:23 +0200}, biburl = {https://dblp.org/rec/conf/middleware/MachulakMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ParkinMIS10, author = {Simon E. Parkin and Aad P. A. van Moorsel and Philip Inglesant and Martina Angela Sasse}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {A stealth approach to usable security: helping {IT} security managers to identify workable security solutions}, booktitle = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010}, pages = {33--50}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1900546.1900553}, doi = {10.1145/1900546.1900553}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ParkinMIS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/SmithM10, author = {Chris Smith and Aad van Moorsel}, editor = {Dirk Neumann and Mark Baker and J{\"{o}}rn Altmann and Omer F. Rana}, title = {Mitigating Provider Uncertainty in Service Provision Contracts}, booktitle = {Economic Models and Algorithms for Distributed Systems}, series = {Autonomic Systems}, pages = {143--159}, publisher = {Birkh{\"{a}}user}, year = {2010}, url = {https://doi.org/10.1007/978-3-7643-8899-7\_9}, doi = {10.1007/978-3-7643-8899-7\_9}, timestamp = {Wed, 02 Feb 2022 16:08:03 +0100}, biburl = {https://dblp.org/rec/books/sp/10/SmithM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2010P10292, editor = {Alberto Avritzer and Aad P. A. van Moorsel and Katinka Wolter}, title = {Resilience Assessment and Evaluation, 18.07. - 23.07.2010}, series = {Dagstuhl Seminar Proceedings}, volume = {10292}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2010}, url = {http://drops.dagstuhl.de/portals/10292/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2010P10292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/AvritzerMW10, author = {Alberto Avritzer and Aad P. A. van Moorsel and Katinka Wolter}, editor = {Alberto Avritzer and Aad P. A. van Moorsel and Katinka Wolter}, title = {10292 Abstracts Collection and Summary - Resilience Assessment and Evaluation}, booktitle = {Resilience Assessment and Evaluation, 18.07. - 23.07.2010}, series = {Dagstuhl Seminar Proceedings}, volume = {10292}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2010}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2898/}, timestamp = {Thu, 10 Jun 2021 13:02:09 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/AvritzerMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/JoshiBJMW09, author = {Kaustubh R. Joshi and Guy Bunker and Farnam Jahanian and Aad P. A. van Moorsel and Joseph Weinman}, title = {Dependability in the cloud: Challenges and opportunities}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {103--104}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270350}, doi = {10.1109/DSN.2009.5270350}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/JoshiBJMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/PaikGMWW09, author = {Hye{-}young Paik and Karl M. G{\"{o}}schka and Aad P. A. van Moorsel and Raymond K. Wong and Ian Warren}, title = {Introduction to the proceedings of the {EDOC} 2009 workshop Middleware for Web Services {(MWS)} 2009}, booktitle = {Workshops Proceedings of the 12th {IEEE} International Enterprise Distributed Object Computing Conference, EDOCw 2009, 1-4 September 2009, Auckland, New Zealand}, pages = {72--73}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/EDOCW.2009.5332012}, doi = {10.1109/EDOCW.2009.5332012}, timestamp = {Wed, 16 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/PaikGMWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epew/ZhangM09, author = {Huqiu Zhang and Aad P. A. van Moorsel}, editor = {Jeremy T. Bradley}, title = {Fast Generation of Scale Free Networks with Directed Arcs}, booktitle = {Computer Performance Engineering, 6th European Performance Engineering Workshop, {EPEW} 2009, London, UK, July 9-10, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5652}, pages = {131--148}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02924-0\_11}, doi = {10.1007/978-3-642-02924-0\_11}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/epew/ZhangM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/DoddaSM09, author = {Ravi Teja Dodda and Chris Smith and Aad P. A. van Moorsel}, editor = {Sanjay Ranka and Srinivas Aluru and Rajkumar Buyya and Yeh{-}Ching Chung and Sumeet Dua and Ananth Grama and Sandeep K. S. Gupta and Rajeev Kumar and Vir V. Phoha}, title = {An Architecture for Cross-Cloud System Management}, booktitle = {Contemporary Computing - Second International Conference, {IC3} 2009, Noida, India, August 17-19, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {40}, pages = {556--567}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03547-0\_53}, doi = {10.1007/978-3-642-03547-0\_53}, timestamp = {Wed, 24 May 2017 08:31:10 +0200}, biburl = {https://dblp.org/rec/conf/ic3/DoddaSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoft/StepanovaPM09, author = {Daria Stepanova and Simon Edward Parkin and Aad P. A. van Moorsel}, editor = {Boris Shishkov and Jos{\'{e}} Cordeiro and Alpesh Ranchordas}, title = {A Knowledge Base for Justified Information Security Decision-making}, booktitle = {{ICSOFT} 2009 - Proceedings of the 4th International Conference on Software and Data Technologies, Volume 2, Sofia, Bulgaria, July 26-29, 2009}, pages = {326--331}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Tue, 18 Sep 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoft/StepanovaPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ParkinMC09, author = {Simon Edward Parkin and Aad P. A. van Moorsel and Robert Coles}, editor = {Atilla El{\c{c}}i and Oleg B. Makarevich and Mehmet A. Orgun and Alexander G. Chefranov and Josef Pieprzyk and Yuri Anatolievich Bryukhomitsky and Siddika Berna {\"{O}}rs}, title = {An information security ontology incorporating human-behavioural implications}, booktitle = {Proceedings of the 2nd International Conference on Security of Information and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10, 2009}, pages = {46--55}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1626195.1626209}, doi = {10.1145/1626195.1626209}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/ParkinMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AndreouM08, author = {Marios S. Andreou and Aad P. A. van Moorsel}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {COTraSE: Connection Oriented Traceback in Switched Ethernet}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {198--204}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.25}, doi = {10.1109/IAS.2008.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AndreouM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BondavalliMM08, author = {Andrea Bondavalli and Istv{\'{a}}n Majzik and Aad P. A. van Moorsel}, title = {International Workshop on Resilience Assessment and Dependability Benchmarking {(RADB} 2008)}, booktitle = {The 38th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings}, pages = {542--543}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/DSN.2008.4630125}, doi = {10.1109/DSN.2008.4630125}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/BondavalliMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/TosicGMWW08, author = {Vladimir Tosic and Karl M. G{\"{o}}schka and Aad P. A. van Moorsel and Ian Warren and Raymond K. Wong}, editor = {Marten van Sinderen and Jo{\~{a}}o Paulo A. Almeida and Lu{\'{\i}}s Ferreira Pires and Maarten Steen}, title = {Introduction to the Proceedings of the {EDOC} 2008 Workshop Middleware for Web Services {(MWS)} 2008}, booktitle = {Workshops Proceedings of the 12th International {IEEE} Enterprise Distributed Object Computing Conference, {ECOCW} 2008, 16 September 2008, Munich, Germany}, pages = {338--342}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EDOCW.2008.40}, doi = {10.1109/EDOCW.2008.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/TosicGMWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epew/ZhangM08, author = {Huqiu Zhang and Aad P. A. van Moorsel}, editor = {Nigel Thomas and Carlos Juiz}, title = {Evaluation of {P2P} Algorithms for Probabilistic Trust Inference in a Web of Trust}, booktitle = {Computer Performance Engineering, 5th European Performance Engineering Workshop, {EPEW} 2008, Palma de Mallorca, Spain, September 24-25, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5261}, pages = {242--256}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87412-6\_18}, doi = {10.1007/978-3-540-87412-6\_18}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/epew/ZhangM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/AndreouM08, author = {Marios S. Andreou and Aad P. A. van Moorsel}, editor = {Herbert Bos and Evangelos P. Markatos}, title = {Logging based {IP} Traceback in switched ethernets}, booktitle = {Proceedings of the First European Workshop on System Security, {EUROSEC} 2008, Glasgow, Scotland, UK, March 31, 2008}, pages = {1--7}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1355284.1355286}, doi = {10.1145/1355284.1355286}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/AndreouM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/MachulakPM08, author = {Maciej P. Machulak and Simon E. Parkin and Aad P. A. van Moorsel}, editor = {Rog{\'{e}}rio de Lemos and Jean{-}Charles Fabre and Cristina Gacek and Fabio Gadducci and Maurice H. ter Beek}, title = {Architecting Dependable Access Control Systems for Multi-domain Computing Environments}, booktitle = {Architecting Dependable Systems {VI}}, series = {Lecture Notes in Computer Science}, volume = {5835}, pages = {49--75}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10248-6\_3}, doi = {10.1007/978-3-642-10248-6\_3}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icse/MachulakPM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isas/ParkinKM08, author = {Simon Edward Parkin and Rouaa Yassin Kassab and Aad P. A. van Moorsel}, editor = {Takashi Nanya and Fumihiro Maruyama and Andr{\'{a}}s Pataricza and Miroslaw Malek}, title = {The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies}, booktitle = {Service Availability, 5th International Service Availability Symposium, {ISAS} 2008, Tokyo, Japan, May 19-21, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5017}, pages = {43--58}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68129-8\_6}, doi = {10.1007/978-3-540-68129-8\_6}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/isas/ParkinKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isorc/MartinMM08, author = {Dan Martin and Aad P. A. van Moorsel and Graham Morgan}, title = {Efficient Resource Management for Game Server Hosting}, booktitle = {11th {IEEE} International Symposium on Object-Oriented Real-Time Distributed Computing {(ISORC} 2008), 5-7 May 2008, Orlando, Florida, {USA}}, pages = {593--596}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISORC.2008.12}, doi = {10.1109/ISORC.2008.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isorc/MartinMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/LamprechtM08, author = {Christiaan J. Lamprecht and Aad P. A. van Moorsel}, title = {Runtime Security Adaptation Using Adaptive {SSL}}, booktitle = {14th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2008, 15-17 December 2008, Taipei, Taiwan}, pages = {305--312}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PRDC.2008.27}, doi = {10.1109/PRDC.2008.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/LamprechtM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/Moorsel08, author = {Aad P. A. van Moorsel}, editor = {Michael D. Harrison and Mark{-}Alexander Sujan}, title = {Panel: Complexity and Resilience}, booktitle = {Computer Safety, Reliability, and Security, 27th International Conference, {SAFECOMP} 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5219}, pages = {13--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87698-4\_4}, doi = {10.1007/978-3-540-87698-4\_4}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/Moorsel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/TosicGMW07, author = {Vladimir Tosic and Karl M. G{\"{o}}schka and Aad P. A. van Moorsel and Raymond K. Wong}, title = {Introduction to the Proceedings of the {EDOC} 2007 Workshop Middleware for Web Services {(MWS)} 2007}, booktitle = {Workshops Proceedings of the 11th International {IEEE} Enterprise Distributed Object Computing Conference, {ECOCW} 2007, 15-16 October 2007, Annapolis, Maryland, {USA}}, pages = {69--72}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/EDOCW.2007.15}, doi = {10.1109/EDOCW.2007.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/TosicGMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epew/MelloMF07, author = {Emerson Ribeiro de Mello and Aad P. A. van Moorsel and Joni da Silva Fraga}, editor = {Katinka Wolter}, title = {Evaluation of {P2P} Search Algorithms for Discovering Trust Paths}, booktitle = {Formal Methods and Stochastic Models for Performance Evaluation, Fourth European Performance Engineering Workshop, {EPEW} 2007, Berlin, Germany, September 27-28, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4748}, pages = {112--124}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75211-0\_9}, doi = {10.1007/978-3-540-75211-0\_9}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/epew/MelloMF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/FelberPM07, author = {Pascal Felber and Calton Pu and Aad P. A. van Moorsel}, editor = {Robert Meersman and Zahir Tari}, title = {{DOA} 2007 {PC} Co-chairs' Message}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4803}, pages = {437}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76848-7\_31}, doi = {10.1007/978-3-540-76848-7\_31}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/FelberPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saso/LamprechtM07, author = {Christiaan J. Lamprecht and Aad P. A. van Moorsel}, title = {Adaptive {SSL:} Design, Implementation and Overhead Analysis}, booktitle = {Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, {SASO} 2007, Boston, MA, USA, July 9-11, 2007}, pages = {289--294}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SASO.2007.6}, doi = {10.1109/SASO.2007.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saso/LamprechtM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isas/2007, editor = {Miroslaw Malek and Manfred Reitenspie{\ss} and Aad P. A. van Moorsel}, title = {Service Availability, 4th International Service Availability Symposium, {ISAS} 2007, Durham, NH, USA, May 21-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4526}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72736-1}, doi = {10.1007/978-3-540-72736-1}, isbn = {978-3-540-72735-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isas/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/MoorselW06, author = {Aad P. A. van Moorsel and Katinka Wolter}, title = {Analysis of Restart Mechanisms in Software Systems}, journal = {{IEEE} Trans. Software Eng.}, volume = {32}, number = {8}, pages = {547--558}, year = {2006}, url = {https://doi.org/10.1109/TSE.2006.73}, doi = {10.1109/TSE.2006.73}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/MoorselW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/MelloPRSMW06, author = {Emerson Ribeiro de Mello and Savas Parastatidis and Philipp Reinecke and Chris Smith and Aad P. A. van Moorsel and Jim Webber}, title = {Secure and Provable Service Support for Human-Intensive Real-Estate Processes}, booktitle = {2006 {IEEE} International Conference on Services Computing {(SCC} 2006), 18-22 September 2006, Chicago, Illinois, {USA}}, pages = {495--504}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SCC.2006.84}, doi = {10.1109/SCC.2006.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/MelloPRSMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/TosicMW06, author = {Vladimir Tosic and Aad P. A. van Moorsel and Raymond K. Wong}, title = {Introduction to the Proceedings of the {EDOC} 2006 Workshop Middleware for Web Services {(MWS)} 2006}, booktitle = {Tenth {IEEE} International Enterprise Distributed Object Computing Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China, Workshops}, pages = {7}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/EDOCW.2006.44}, doi = {10.1109/EDOCW.2006.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/TosicMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epew/ReineckeMW06, author = {Philipp Reinecke and Aad P. A. van Moorsel and Katinka Wolter}, editor = {Andr{\'{a}}s Horv{\'{a}}th and Mikl{\'{o}}s Telek}, title = {Experimental Analysis of the Correlation of {HTTP} {GET} Invocations}, booktitle = {Formal Methods and Stochastic Models for Performance Evaluation, Third European Performance Engineering Workshop, {EPEW} 2006, Budapest, Hungary, June 21-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4054}, pages = {226--237}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11777830\_16}, doi = {10.1007/11777830\_16}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/epew/ReineckeMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/ReineckeMW06, author = {Philipp Reinecke and Aad P. A. van Moorsel and Katinka Wolter}, title = {The Fast and the Fair: {A} Fault-Injection-Driven Comparison of Restart Oracles for Reliable Web Services}, booktitle = {Third International Conference on the Quantitative Evaluation of Systems {(QEST} 2006), 11-14 September 2006, Riverside, California, {USA}}, pages = {375--384}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/QEST.2006.50}, doi = {10.1109/QEST.2006.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qest/ReineckeMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Moorsel05, author = {Aad P. A. van Moorsel}, title = {Grid, Management and Self-Management}, journal = {Comput. J.}, volume = {48}, number = {3}, pages = {325--332}, year = {2005}, url = {https://doi.org/10.1093/comjnl/bxh092}, doi = {10.1093/COMJNL/BXH092}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Moorsel05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bertinoro/BabaogluJMFLM05, author = {{\"{O}}zalp Babaoglu and M{\'{a}}rk Jelasity and Alberto Montresor and Christof Fetzer and Stefano Leonardi and Aad P. A. van Moorsel}, editor = {{\"{O}}zalp Babaoglu and M{\'{a}}rk Jelasity and Alberto Montresor and Christof Fetzer and Stefano Leonardi and Aad P. A. van Moorsel and Maarten van Steen}, title = {The Self-Star Vision}, booktitle = {Self-star Properties in Complex Information Systems, Conceptual and Practical Foundations [the book is a result from a workshop at Bertinoro, Italy, Summer 2004]}, series = {Lecture Notes in Computer Science}, volume = {3460}, pages = {1--20}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11428589\_1}, doi = {10.1007/11428589\_1}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/bertinoro/BabaogluJMFLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isas/Moorsel05, author = {Aad P. A. van Moorsel}, editor = {Miroslaw Malek and Edgar Nett and Neeraj Suri}, title = {On Best-Effort and Dependability, Service-Orientation and Panacea}, booktitle = {Service Availability, Second International Service Availability Symposium, {ISAS} 2005, Berlin, Germany, April 25-26, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3694}, pages = {99--101}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560333\_8}, doi = {10.1007/11560333\_8}, timestamp = {Sun, 25 Oct 2020 23:17:44 +0100}, biburl = {https://dblp.org/rec/conf/isas/Moorsel05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bertinoro/2005, editor = {{\"{O}}zalp Babaoglu and M{\'{a}}rk Jelasity and Alberto Montresor and Christof Fetzer and Stefano Leonardi and Aad P. A. van Moorsel and Maarten van Steen}, title = {Self-star Properties in Complex Information Systems, Conceptual and Practical Foundations [the book is a result from a workshop at Bertinoro, Italy, Summer 2004]}, series = {Lecture Notes in Computer Science}, volume = {3460}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b136551}, doi = {10.1007/B136551}, isbn = {3-540-26009-9}, timestamp = {Tue, 27 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bertinoro/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iee/MoorselW04, author = {Aad P. A. van Moorsel and Katinka Wolter}, title = {Optimal restart times for moments of completion time}, journal = {{IEE} Proc. Softw.}, volume = {151}, number = {5}, pages = {219--223}, year = {2004}, url = {https://doi.org/10.1049/ip-sen:20041090}, doi = {10.1049/IP-SEN:20041090}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iee/MoorselW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Molina-JimenezPM04, author = {Carlos Molina{-}Jim{\'{e}}nez and Jim Pruyne and Aad P. A. van Moorsel}, editor = {Rog{\'{e}}rio de Lemos and Cristina Gacek and Alexander B. Romanovsky}, title = {The Role of Agreements in {IT} Management Software}, booktitle = {Architecting Dependable Systems {III} [the book is a result of the {ICSE} 2004 and {DSN} 2004 workshops]}, series = {Lecture Notes in Computer Science}, volume = {3549}, pages = {36--58}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11556169\_2}, doi = {10.1007/11556169\_2}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icse/Molina-JimenezPM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isas/ReineckeMW04, author = {Philipp Reinecke and Aad P. A. van Moorsel and Katinka Wolter}, editor = {Miroslaw Malek and Manfred Reitenspie{\ss} and J{\"{o}}rg Kaiser}, title = {A Measurement Study of the Interplay Between Application Level Restart and Transport Protocol}, booktitle = {Service Availability, First International Service Availability Symposium, {ISAS} 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3335}, pages = {86--100}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30225-4\_7}, doi = {10.1007/978-3-540-30225-4\_7}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/isas/ReineckeMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmb/MoorselW04, author = {Aad P. A. van Moorsel and Katinka Wolter}, editor = {Peter Buchholz and Ralf Lehnert and Michal Pi{\'{o}}ro}, title = {Meeting Deadlines through Restart}, booktitle = {{MMB} {\&} {PGTS} 2004, 12th {GI/ITG} Conference on Measuring and Evaluation of Computer and Communication Systems {(MMB)} together with 3rd Polish-German Teletraffic Symposium (PGTS), September 12-15, 2004, Dresden, Germany}, pages = {155--160}, publisher = {{VDE} Verlag}, year = {2004}, timestamp = {Tue, 25 Sep 2018 18:26:26 +0200}, biburl = {https://dblp.org/rec/conf/mmb/MoorselW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/MoorselW04, author = {Aad P. A. van Moorsel and Katinka Wolter}, title = {Analysis and Algorithms for Restart}, booktitle = {1st International Conference on Quantitative Evaluation of Systems {(QEST} 2004), 27-30 September 2004, Enschede, The Netherlands}, pages = {195--204}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/QEST.2004.1348034}, doi = {10.1109/QEST.2004.1348034}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qest/MoorselW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/SahaiGMM03, author = {Akhil Sahai and Sven Graupner and Vijay Machiraju and Aad P. A. van Moorsel}, title = {Specifying and Monitoring Guarantees in Commercial Grids through {SLA}}, booktitle = {3rd {IEEE} International Symposium on Cluster Computing and the Grid (CCGrid 2003), 12-15 May 2003, Tokyo, Japan}, pages = {292--299}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CCGRID.2003.1199380}, doi = {10.1109/CCGRID.2003.1199380}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/SahaiGMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SpainhowerM03, author = {Lisa Spainhower and Aad P. A. van Moorsel}, title = {First Workshop on the Design of Self-Managing Systems}, booktitle = {2003 International Conference on Dependable Systems and Networks {(DSN} 2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings}, pages = {765}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.ieeecomputersociety.org/10.1109/DSN.2003.10000}, doi = {10.1109/DSN.2003.10000}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SpainhowerM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsom/GraupnerMSM03, author = {Sven Graupner and Vijay Machiraju and Akhil Sahai and Aad P. A. van Moorsel}, editor = {Marcus Brunner and Alexander Keller}, title = {Management +=Grid}, booktitle = {Self-Managing Distributed Systems, 14th {IFIP/IEEE} International Workshop on Distributed Systems: Operations and Management, {DSOM} 2003, Heidelberg, Germany, October 20-22, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2867}, pages = {194--196}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39671-0\_17}, doi = {10.1007/978-3-540-39671-0\_17}, timestamp = {Tue, 20 Aug 2019 14:59:26 +0200}, biburl = {https://dblp.org/rec/conf/dsom/GraupnerMSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/MachirajuSM03, author = {Vijay Machiraju and Akhil Sahai and Aad P. A. van Moorsel}, editor = {Germ{\'{a}}n S. Goldszmidt and J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder}, title = {Web Services Management Network: An Overlay Network for Federated Service Management}, booktitle = {Integrated Network Management VII, Managing It All, {IFIP/IEEE} Eighth International Symposium on Integrated Network Management {(IM} 2003), March 24-28, 2003, Colorado Springs, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {246}, pages = {351--364}, publisher = {Kluwer}, year = {2003}, timestamp = {Mon, 24 Mar 2003 13:34:13 +0100}, biburl = {https://dblp.org/rec/conf/im/MachirajuSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ladc/MachirajuSM03, author = {Vijay Machiraju and Akhil Sahai and Aad P. A. van Moorsel}, editor = {Rog{\'{e}}rio de Lemos and Taisy Silva Weber and Jo{\~{a}}o Batista Camargo Jr.}, title = {Managed Utility Computing: The Grid as Management Backplane}, booktitle = {Dependable Computing, First Latin-American Symposium, {LADC} 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2847}, pages = {4--7}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45214-0\_3}, doi = {10.1007/978-3-540-45214-0\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ladc/MachirajuSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/Moorsel03, author = {Aad P. A. van Moorsel}, title = {Managed Utility Computing}, booktitle = {4th International Conference on Web Information Systems Engineering, {WISE} 2003, Rome, Italy, December 10-12, 2003}, pages = {277}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.ieeecomputersociety.org/10.1109/WISE.2003.10000}, doi = {10.1109/WISE.2003.10000}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wise/Moorsel03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LyuRM02, author = {Michael R. Lyu and Sampath Rangarajan and Aad P. A. van Moorsel}, title = {Optimal allocation of test resources for software reliability growth modeling in software development}, journal = {{IEEE} Trans. Reliab.}, volume = {51}, number = {2}, pages = {183--192}, year = {2002}, url = {https://doi.org/10.1109/TR.2002.1011524}, doi = {10.1109/TR.2002.1011524}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/LyuRM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsom/SahaiMSMC02, author = {Akhil Sahai and Vijay Machiraju and Mehmet Sayal and Aad P. A. van Moorsel and Fabio Casati}, editor = {Metin Feridun and Peter G. Kropf and Gilbert Babin}, title = {Automated {SLA} Monitoring for Web Services}, booktitle = {Management Technologies for E-Commerce and E-Business Applications, 13th {IFIP/IEEE} International Workshop on Distributed Systems: Operations and Management, {DSOM} 2002, Montreal, Canada, October 21-23, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2506}, pages = {28--41}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36110-3\_6}, doi = {10.1007/3-540-36110-3\_6}, timestamp = {Sun, 02 Oct 2022 15:59:19 +0200}, biburl = {https://dblp.org/rec/conf/dsom/SahaiMSMC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wes/Moorsel02, author = {Aad P. A. van Moorsel}, editor = {Christoph Bussler and Richard Hull and Sheila A. McIlraith and Maria E. Orlowska and Barbara Pernici and Jian Yang}, title = {Ten-Step Survival Guide for the Emerging Business Web}, booktitle = {Web Services, E-Business, and the Semantic Web, CAiSE 2002 International Workshop, {WES} 2002, Toronto, Canada, May 27-28, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2512}, pages = {1--11}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36189-8\_1}, doi = {10.1007/3-540-36189-8\_1}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/wes/Moorsel02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/Moorsel99, author = {Aad P. A. van Moorsel}, title = {The 'QoS Query Service' for Improved Quality-of-Service Decision Making in {CORBA}}, booktitle = {The Eighteenth Symposium on Reliable Distributed Systems, {SRDS} 1999, Lausanne, Switzerland, October 19-22, 1999, Proceedings}, pages = {274--285}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/RELDIS.1999.805103}, doi = {10.1109/RELDIS.1999.805103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/Moorsel99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpe/MoorselH98, author = {Aad P. A. van Moorsel and Yiqing Huang}, editor = {Ram{\'{o}}n Puigjaner and Nunzio N. Savino and Bartomeu Serra}, title = {Reusable Software Components for Performability Tools and Their Utilization for Web-Based Configurable Tools}, booktitle = {Computer Performance Evaluation: Modelling Techniques and Tools, 10th International Conference, Tools '98, Palma de Mallorca, Spain, September 14-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1469}, pages = {37--50}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68061-6\_4}, doi = {10.1007/3-540-68061-6\_4}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cpe/MoorselH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esm/MoorselW98, author = {Aad P. A. van Moorsel and Katinka Wolter}, editor = {Richard N. Zobel and Dietmar P. F. M{\"{o}}ller}, title = {Numerical Solution of Non-Homogeneous Markov Processes through Uniformization}, booktitle = {12\({}^{\mbox{th}}\) European Simulation Multiconference - Simulation - Past, Present and Future, June 16-19, 1998, Machester, United Kingdom}, pages = {710--717}, publisher = {{SCS} Europe}, year = {1998}, timestamp = {Tue, 14 Jan 2003 13:43:29 +0100}, biburl = {https://dblp.org/rec/conf/esm/MoorselW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/GargMVT98, author = {Sachin Garg and Aad P. A. van Moorsel and Kalyanaraman Vaidyanathan and Kishor S. Trivedi}, title = {A methodology for detection and estimation of software aging}, booktitle = {Ninth International Symposium on Software Reliability Engineering, {ISSRE} 1998, Paderborn, Germany, November 4-7, 1998}, pages = {283--292}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ISSRE.1998.730892}, doi = {10.1109/ISSRE.1998.730892}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/GargMVT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/LyuRM97, author = {Michael R. Lyu and Sampath Rangarajan and Aad P. A. van Moorsel}, title = {Optimization of reliability allocation and testing schedule for software systems}, booktitle = {Eighth International Symposium on Software Reliability Engineering, {ISSRE} 1997, Albuquerque, NM, USA, November 2-5, 1997}, pages = {336--347}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ISSRE.1997.630881}, doi = {10.1109/ISSRE.1997.630881}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/LyuRM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/QureshiSMG96, author = {Muhammad A. Qureshi and William H. Sanders and Aad P. A. van Moorsel and Reinhard German}, title = {Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures}, journal = {{IEEE} Trans. Software Eng.}, volume = {22}, number = {9}, pages = {603--614}, year = {1996}, url = {https://doi.org/10.1109/32.541432}, doi = {10.1109/32.541432}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/QureshiSMG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/anss/MoorselKS96, author = {Aad P. A. van Moorsel and Latha A. Kant and William H. Sanders}, title = {Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models}, booktitle = {Proceedings 29st Annual Simulation Symposium {(SS} '96), April 8-11, 1996, New Orleans, LA, {USA}}, pages = {173--182}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SIMSYM.1996.492165}, doi = {10.1109/SIMSYM.1996.492165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/anss/MoorselKS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apn/GermanMQS96, author = {Reinhard German and Aad P. A. van Moorsel and Muhammad A. Qureshi and William H. Sanders}, editor = {Jonathan Billington and Wolfgang Reisig}, title = {Expected Impulsive Rewards in Markov Regenerative Stochastic Petri Nets}, booktitle = {Application and Theory of Petri Nets 1996, 17th International Conference, Osaka, Japan, June 24-28, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1091}, pages = {172--191}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61363-3\_10}, doi = {10.1007/3-540-61363-3\_10}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/apn/GermanMQS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pnpm/QureshiSMG95, author = {Muhammad A. Qureshi and William H. Sanders and Aad P. A. van Moorsel and Reinhard German}, title = {Algorithms for the generation of state-level representations of stochastic activity networks with general reward structures}, booktitle = {Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, {PNPM} 1995, Durham, NC, USA, October 3-6, 1995}, pages = {180--190}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/PNPM.1995.524328}, doi = {10.1109/PNPM.1995.524328}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pnpm/QureshiSMG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pnpm/HaverkortM95, author = {Boudewijn R. Haverkort and Aad P. A. van Moorsel}, title = {Using the probabilistic evaluation tool for the analytical solution of large Markov models}, booktitle = {Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, {PNPM} 1995, Durham, NC, USA, October 3-6, 1995}, pages = {206--207}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/PNPM.1995.524331}, doi = {10.1109/PNPM.1995.524331}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pnpm/HaverkortM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pnpm/DeavoursOQSM95, author = {Daniel D. Deavours and W. Douglas Obal II and Muhammad A. Qureshi and William H. Sanders and Aad P. A. van Moorsel}, title = {UltraSAN version 3 overview}, booktitle = {Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, {PNPM} 1995, Durham, NC, USA, October 3-6, 1995}, pages = {216--217}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/PNPM.1995.524336}, doi = {10.1109/PNPM.1995.524336}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pnpm/DeavoursOQSM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/HaverkortMS94, author = {Boudewijn R. Haverkort and Aad P. A. van Moorsel and Dirk{-}Jan Speelman}, editor = {Vijay K. Madisetti and Erol Gelenbe and Jean C. Walrand}, title = {Xmgm: Performance Modeling Using Matrix Geometric Techniques}, booktitle = {{MASCOTS} '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31 - February 2, 1994, Durham, North Carolina, {USA}}, pages = {152--157}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/MASCOT.1994.284430}, doi = {10.1109/MASCOT.1994.284430}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/HaverkortMS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:books/daglib/0096028, author = {Aad P. A. van Moorsel}, title = {Performability evaluation concepts and techniques}, school = {University Twente}, year = {1993}, timestamp = {Wed, 23 Mar 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0096028.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/MoorselHN92, author = {Aad P. A. van Moorsel and Boudewijn R. Haverkort and Ignas G. Niemegeers}, title = {A Method for Analysing the Performance Aspects of the Fault-Tolerance Mechanisms in {FDDI}}, booktitle = {Proceedings {IEEE} {INFOCOM} '92, The Conference on Computer Communications, Eleventh Annual Joint Conference of the {IEEE} Computer and Communications Societies, One World through Communications, Florence, Italy, May 4-8, 1992}, pages = {372--381}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/INFCOM.1992.263577}, doi = {10.1109/INFCOM.1992.263577}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/MoorselHN92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.