BibTeX records: Aad P. A. van Moorsel

download as .bib file

@article{DBLP:journals/ijisec/ToreiniMM24,
  author       = {Ehsan Toreini and
                  Maryam Mehrnezhad and
                  Aad van Moorsel},
  title        = {Fairness as a Service (FaaS): verifiable and privacy-preserving fairness
                  auditing of machine learning systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {2},
  pages        = {981--997},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00774-z},
  doi          = {10.1007/S10207-023-00774-Z},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ToreiniMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ToreiniMM23,
  author       = {Ehsan Toreini and
                  Maryam Mehrnezhad and
                  Aad van Moorsel},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Verifiable Fairness: Privacy-preserving Computation of Fairness for
                  Machine Learning Systems},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {569--584},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_34},
  doi          = {10.1007/978-3-031-54129-2\_34},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ToreiniMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/ZiliusSM23,
  author       = {Karolis Zilius and
                  Tasos Spiliotopoulos and
                  Aad van Moorsel},
  editor       = {Yu{-}Ru Lin and
                  Meeyoung Cha and
                  Daniele Quercia},
  title        = {A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns},
  booktitle    = {Proceedings of the Seventeenth International {AAAI} Conference on
                  Web and Social Media, {ICWSM} 2023, June 5-8, 2023, Limassol, Cyprus},
  pages        = {1112--1121},
  publisher    = {{AAAI} Press},
  year         = {2023},
  url          = {https://doi.org/10.1609/icwsm.v17i1.22219},
  doi          = {10.1609/ICWSM.V17I1.22219},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icwsm/ZiliusSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-06601,
  author       = {Karolis Zilius and
                  Tasos Spiliotopoulos and
                  Aad van Moorsel},
  title        = {A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns},
  journal      = {CoRR},
  volume       = {abs/2301.06601},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.06601},
  doi          = {10.48550/ARXIV.2301.06601},
  eprinttype    = {arXiv},
  eprint       = {2301.06601},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-06601.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-01706,
  author       = {Zilong Zhao and
                  Han Wu and
                  Aad van Moorsel and
                  Lydia Y. Chen},
  title        = {{GTV:} Generating Tabular Data via Vertical Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2302.01706},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.01706},
  doi          = {10.48550/ARXIV.2302.01706},
  eprinttype    = {arXiv},
  eprint       = {2302.01706},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-01706.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-06061,
  author       = {Ehsan Toreini and
                  Maryam Mehrnezhad and
                  Aad van Moorsel},
  title        = {Verifiable Fairness: Privacy-preserving Computation of Fairness for
                  Machine Learning Systems},
  journal      = {CoRR},
  volume       = {abs/2309.06061},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.06061},
  doi          = {10.48550/ARXIV.2309.06061},
  eprinttype    = {arXiv},
  eprint       = {2309.06061},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-06061.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlharbyM22,
  author       = {Maher Alharby and
                  Aad van Moorsel},
  title        = {Simulating permissionless blockchains: Distribution fitting, tool
                  support, and a case study},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2184},
  doi          = {10.1002/NEM.2184},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlharbyM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/Wu0CM22,
  author       = {Han Wu and
                  Zilong Zhao and
                  Lydia Y. Chen and
                  Aad van Moorsel},
  title        = {Federated Learning for Tabular Data: Exploring Potential Risk to Privacy},
  booktitle    = {{IEEE} 33rd International Symposium on Software Reliability Engineering,
                  {ISSRE} 2022, Charlotte, NC, USA, October 31 - Nov. 3, 2022},
  pages        = {193--204},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISSRE55969.2022.00028},
  doi          = {10.1109/ISSRE55969.2022.00028},
  timestamp    = {Wed, 11 Jan 2023 13:11:43 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/Wu0CM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/WuQWM22,
  author       = {Han Wu and
                  Holland Qian and
                  Huaming Wu and
                  Aad van Moorsel},
  editor       = {Irena Koprinska and
                  Paolo Mignone and
                  Riccardo Guidotti and
                  Szymon Jaroszewicz and
                  Holger Fr{\"{o}}ning and
                  Francesco Gullo and
                  Pedro M. Ferreira and
                  Damian Roqueiro and
                  Gaia Ceddia and
                  Slawomir Nowaczyk and
                  Jo{\~{a}}o Gama and
                  Rita P. Ribeiro and
                  Ricard Gavald{\`{a}} and
                  Elio Masciari and
                  Zbigniew W. Ras and
                  Ettore Ritacco and
                  Francesca Naretto and
                  Andreas Theissler and
                  Przemyslaw Biecek and
                  Wouter Verbeke and
                  Gregor Schiele and
                  Franz Pernkopf and
                  Michaela Blott and
                  Ilaria Bordino and
                  Ivan Luciano Danesi and
                  Giovanni Ponti and
                  Lorenzo Severini and
                  Annalisa Appice and
                  Giuseppina Andresini and
                  Ib{\'{e}}ria Medeiros and
                  Guilherme Gra{\c{c}}a and
                  Lee A. D. Cooper and
                  Naghmeh Ghazaleh and
                  Jonas Richiardi and
                  Diego Saldana Miranda and
                  Konstantinos Sechidis and
                  Arif Canakoglu and
                  Sara Pid{\`{o}} and
                  Pietro Pinoli and
                  Albert Bifet and
                  Sepideh Pashami},
  title        = {LDRNet: Enabling Real-Time Document Localization on Mobile Devices},
  booktitle    = {Machine Learning and Principles and Practice of Knowledge Discovery
                  in Databases - International Workshops of {ECML} {PKDD} 2022, Grenoble,
                  France, September 19-23, 2022, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {1752},
  pages        = {618--629},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23618-1\_42},
  doi          = {10.1007/978-3-031-23618-1\_42},
  timestamp    = {Mon, 26 Jun 2023 20:44:31 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/WuQWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/SmusevaMMMR22,
  author       = {Daria Smuseva and
                  Ivan Malakhov and
                  Andrea Marin and
                  Aad van Moorsel and
                  Sabina Rossi},
  editor       = {Erika {\'{A}}brah{\'{a}}m and
                  Marco Paolieri},
  title        = {Verifier's Dilemma in Ethereum Blockchain: {A} Quantitative Analysis},
  booktitle    = {Quantitative Evaluation of Systems - 19th International Conference,
                  {QEST} 2022, Warsaw, Poland, September 12-16, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13479},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16336-4\_16},
  doi          = {10.1007/978-3-031-16336-4\_16},
  timestamp    = {Tue, 21 Mar 2023 20:54:44 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/SmusevaMMMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-10344,
  author       = {Magdalene Ng and
                  Kovila P. L. Coopamootoo and
                  Tasos Spiliotopoulos and
                  Dave Horsfall and
                  Mhairi Aitken and
                  Ehsan Toreini and
                  Karen Elliott and
                  Aad van Moorsel},
  title        = {In Private, Secure, Conversational FinBots We Trust},
  journal      = {CoRR},
  volume       = {abs/2204.10344},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.10344},
  doi          = {10.48550/ARXIV.2204.10344},
  eprinttype    = {arXiv},
  eprint       = {2204.10344},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-10344.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-06856,
  author       = {Han Wu and
                  Zilong Zhao and
                  Lydia Y. Chen and
                  Aad van Moorsel},
  title        = {Federated Learning for Tabular Data: Exploring Potential Risk to Privacy},
  journal      = {CoRR},
  volume       = {abs/2210.06856},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.06856},
  doi          = {10.48550/ARXIV.2210.06856},
  eprinttype    = {arXiv},
  eprint       = {2210.06856},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-06856.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/AldweeshAMM21,
  author       = {Amjad Aldweesh and
                  Maher Alharby and
                  Maryam Mehrnezhad and
                  Aad van Moorsel},
  title        = {The OpBench Ethereum opcode benchmark framework: Design, implementation,
                  validation and experiments},
  journal      = {Perform. Evaluation},
  volume       = {146},
  pages        = {102168},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.peva.2020.102168},
  doi          = {10.1016/J.PEVA.2020.102168},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pe/AldweeshAMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MatthewsSM21,
  author       = {Isaac Matthews and
                  Sadegh Soudjani and
                  Aad van Moorsel},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Stochastic Simulation Techniques for Inference and Sensitivity Analysis
                  of Bayesian Attack Graphs},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_12},
  doi          = {10.1007/978-3-030-89137-4\_12},
  timestamp    = {Mon, 15 Aug 2022 09:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/MatthewsSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-10212,
  author       = {Isaac Matthews and
                  Sadegh Soudjani and
                  Aad van Moorsel},
  title        = {Stochastic Simulation Techniques for Inference and Sensitivity Analysis
                  of Bayesian Attack Graphs},
  journal      = {CoRR},
  volume       = {abs/2103.10212},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.10212},
  eprinttype    = {arXiv},
  eprint       = {2103.10212},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-10212.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-06053,
  author       = {Tasos Spiliotopoulos and
                  Dave Horsfall and
                  Magdalene Ng and
                  Kovila P. L. Coopamootoo and
                  Aad van Moorsel and
                  Karen Elliott},
  title        = {Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving
                  Manner: {A} Use Case Using Decentralised Identifiers and Verifiable
                  Credentials},
  journal      = {CoRR},
  volume       = {abs/2106.06053},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.06053},
  eprinttype    = {arXiv},
  eprint       = {2106.06053},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-06053.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-09767,
  author       = {Karen Elliott and
                  Kovila P. L. Coopamootoo and
                  Edward Curran and
                  Paul D. Ezhilchelvan and
                  Samantha Finnigan and
                  Dave Horsfall and
                  Zhichao Ma and
                  Magdalene Ng and
                  Tasos Spiliotopoulos and
                  Han Wu and
                  Aad van Moorsel},
  title        = {Know Your Customer: Balancing Innovation and Regulation for Financial
                  Inclusion},
  journal      = {CoRR},
  volume       = {abs/2112.09767},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.09767},
  eprinttype    = {arXiv},
  eprint       = {2112.09767},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-09767.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdatasociety/AitkenTCCEM20,
  author       = {Mhairi Aitken and
                  Ehsan Toreini and
                  Peter Carmichael and
                  Kovila P. L. Coopamootoo and
                  Karen Elliott and
                  Aad van Moorsel},
  title        = {Establishing a social licence for Financial Technology: Reflections
                  on the role of the private sector in pursuing ethical data practices},
  journal      = {Big Data Soc.},
  volume       = {7},
  number       = {1},
  pages        = {205395172090889},
  year         = {2020},
  url          = {https://doi.org/10.1177/2053951720908892},
  doi          = {10.1177/2053951720908892},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bigdatasociety/AitkenTCCEM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/EzhilchelvanAM20,
  author       = {Paul D. Ezhilchelvan and
                  Amjad Aldweesh and
                  Aad van Moorsel},
  title        = {Non-blocking two-phase commit using blockchain},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {12},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5276},
  doi          = {10.1002/CPE.5276},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/EzhilchelvanAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fbloc/AlharbyM20,
  author       = {Maher Alharby and
                  Aad van Moorsel},
  title        = {BlockSim: An Extensible Simulation Tool for Blockchain Systems},
  journal      = {Frontiers Blockchain},
  volume       = {3},
  pages        = {28},
  year         = {2020},
  url          = {https://doi.org/10.3389/fbloc.2020.00028},
  doi          = {10.3389/FBLOC.2020.00028},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fbloc/AlharbyM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/PuthalYDWSMR20,
  author       = {Deepak Puthal and
                  Laurence T. Yang and
                  Schahram Dustdar and
                  Zhenyu Wen and
                  Jun Song and
                  Aad van Moorsel and
                  Rajiv Ranjan},
  title        = {A User-centric Security Solution for Internet of Things and Edge Convergence},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {4},
  number       = {3},
  pages        = {32:1--32:19},
  year         = {2020},
  url          = {https://doi.org/10.1145/3351882},
  doi          = {10.1145/3351882},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcps/PuthalYDWSMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/LunardiANZDM20,
  author       = {Roben Castagna Lunardi and
                  Maher Alharby and
                  Henry C. Nunes and
                  Avelino F. Zorzo and
                  Changyu Dong and
                  Aad van Moorsel},
  title        = {Context-based consensus for appendable-block blockchains},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes,
                  Greece, November 2-6, 2020},
  pages        = {401--408},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/Blockchain50366.2020.00058},
  doi          = {10.1109/BLOCKCHAIN50366.2020.00058},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/LunardiANZDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/brains/AlharbyM20,
  author       = {Maher Alharby and
                  Aad van Moorsel},
  title        = {Fitting and Regression for Distributions of Ethereum Smart Contracts},
  booktitle    = {2nd Conference on Blockchain Research {\&} Applications for Innovative
                  Networks and Services, {BRAINS} 2020, Paris, France, September 28-30,
                  2020},
  pages        = {248--255},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BRAINS49436.2020.9223314},
  doi          = {10.1109/BRAINS49436.2020.9223314},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/brains/AlharbyM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AlharbyLAM20,
  author       = {Maher Alharby and
                  Roben Castagna Lunardi and
                  Amjad Aldweesh and
                  Aad van Moorsel},
  title        = {Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma},
  booktitle    = {50th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2020, Valencia, Spain, June 29 - July 2, 2020},
  pages        = {209--220},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSN48063.2020.00038},
  doi          = {10.1109/DSN48063.2020.00038},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/AlharbyLAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AitkenNTMCE20,
  author       = {Mhairi Aitken and
                  Magdalene Ng and
                  Ehsan Toreini and
                  Aad van Moorsel and
                  Kovila P. L. Coopamootoo and
                  Karen Elliott},
  editor       = {Ioana Boureanu and
                  Constantin Catalin Dragan and
                  Mark Manulis and
                  Thanassis Giannetsos and
                  Christoforos Dadoyan and
                  Panagiotis Gouvas and
                  Roger A. Hallman and
                  Shujun Li and
                  Victor Chang and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse},
  title        = {Keeping it Human: {A} Focus Group Study of Public Attitudes Towards
                  {AI} in Banking},
  booktitle    = {Computer Security - {ESORICS} 2020 International Workshops, DETIPS,
                  DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12580},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66504-3\_2},
  doi          = {10.1007/978-3-030-66504-3\_2},
  timestamp    = {Sun, 10 Dec 2023 06:07:27 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AitkenNTMCE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/NgCTAEM20,
  author       = {Magdalene Ng and
                  Kovila P. L. Coopamootoo and
                  Ehsan Toreini and
                  Mhairi Aitken and
                  Karen Elliott and
                  Aad van Moorsel},
  title        = {Simulating the Effects of Social Presence on Trust, Privacy Concerns
                  {\&} Usage Intentions in Automated Bots for Finance},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {190--199},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00034},
  doi          = {10.1109/EUROSPW51379.2020.00034},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/NgCTAEM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fat/ToreiniACEZM20,
  author       = {Ehsan Toreini and
                  Mhairi Aitken and
                  Kovila P. L. Coopamootoo and
                  Karen Elliott and
                  Carlos Gonzalez Zelaya and
                  Aad van Moorsel},
  editor       = {Mireille Hildebrandt and
                  Carlos Castillo and
                  L. Elisa Celis and
                  Salvatore Ruggieri and
                  Linnet Taylor and
                  Gabriela Zanfir{-}Fortuna},
  title        = {The relationship between trust in {AI} and trustworthy machine learning
                  technologies},
  booktitle    = {FAT* '20: Conference on Fairness, Accountability, and Transparency,
                  Barcelona, Spain, January 27-30, 2020},
  pages        = {272--283},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3351095.3372834},
  doi          = {10.1145/3351095.3372834},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fat/ToreiniACEZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MatthewsMSM20,
  author       = {Isaac Matthews and
                  John C. Mace and
                  Sadegh Soudjani and
                  Aad van Moorsel},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Cyclic Bayesian Attack Graphs: {A} Systematic Computational Approach},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {129--136},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00030},
  doi          = {10.1109/TRUSTCOM50675.2020.00030},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MatthewsMSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ws/20/WolterPMK20,
  author       = {Katinka Wolter and
                  Tommi Pesu and
                  Aad van Moorsel and
                  William J. Knottenbelt},
  editor       = {Tadashi Dohi and
                  Kishor S. Trivedi and
                  Alberto Avritzer},
  title        = {Black-Box Models for Restart, Reboot and Rejuvenation},
  booktitle    = {Handbook of Software Aging and Rejuvenation - Fundamentals, Methods,
                  Applications, and Future Directions},
  pages        = {155--194},
  publisher    = {WorldScientific},
  year         = {2020},
  url          = {https://doi.org/10.1142/9789811214578\_0007},
  doi          = {10.1142/9789811214578\_0007},
  timestamp    = {Thu, 27 Oct 2022 17:13:06 +0200},
  biburl       = {https://dblp.org/rec/books/ws/20/WolterPMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-12768,
  author       = {Maher Alharby and
                  Roben Castagna Lunardi and
                  Amjad Aldweesh and
                  Aad van Moorsel},
  title        = {Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma},
  journal      = {CoRR},
  volume       = {abs/2004.12768},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.12768},
  eprinttype    = {arXiv},
  eprint       = {2004.12768},
  timestamp    = {Wed, 29 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-12768.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-13438,
  author       = {Maher Alharby and
                  Aad van Moorsel},
  title        = {BlockSim: An Extensible Simulation Tool for Blockchain Systems},
  journal      = {CoRR},
  volume       = {abs/2004.13438},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.13438},
  eprinttype    = {arXiv},
  eprint       = {2004.13438},
  timestamp    = {Sat, 02 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-13438.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-06350,
  author       = {Isaac Matthews and
                  John C. Mace and
                  Sadegh Soudjani and
                  Aad van Moorsel},
  title        = {Cyclic Bayesian Attack Graphs: {A} Systematic Computational Approach},
  journal      = {CoRR},
  volume       = {abs/2005.06350},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.06350},
  eprinttype    = {arXiv},
  eprint       = {2005.06350},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-06350.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-15449,
  author       = {Magdalene Ng and
                  Kovila P. L. Coopamootoo and
                  Ehsan Toreini and
                  Mhairi Aitken and
                  Karen Elliott and
                  Aad van Moorsel},
  title        = {Simulating the Effects of Social Presence on Trust, Privacy Concerns
                  {\textbackslash}{\&} Usage Intentions in Automated Bots for Finance},
  journal      = {CoRR},
  volume       = {abs/2006.15449},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.15449},
  eprinttype    = {arXiv},
  eprint       = {2006.15449},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-15449.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-08911,
  author       = {Ehsan Toreini and
                  Mhairi Aitken and
                  Kovila P. L. Coopamootoo and
                  Karen Elliott and
                  Vladimiro Gonz{\'{a}}lez{-}Zelaya and
                  Paolo Missier and
                  Magdalene Ng and
                  Aad van Moorsel},
  title        = {Technologies for Trustworthy Machine Learning: {A} Survey in a Socio-Technical
                  Context},
  journal      = {CoRR},
  volume       = {abs/2007.08911},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.08911},
  eprinttype    = {arXiv},
  eprint       = {2007.08911},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-08911.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-12390,
  author       = {Mohammed Aamir Ali and
                  Thomas Gro{\ss} and
                  Aad van Moorsel},
  title        = {Investigation of 3-D Secure's Model for Fraud Detection},
  journal      = {CoRR},
  volume       = {abs/2009.12390},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.12390},
  eprinttype    = {arXiv},
  eprint       = {2009.12390},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-12390.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ShitSPJPMZR19,
  author       = {Rathin Chandra Shit and
                  Suraj Sharma and
                  Deepak Puthal and
                  Philip James and
                  Biswajeet Pradhan and
                  Aad van Moorsel and
                  Albert Y. Zomaya and
                  Rajiv Ranjan},
  title        = {Ubiquitous Localization (UbiLoc): {A} Survey and Taxonomy on Device
                  Free Localization for Smart World},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {21},
  number       = {4},
  pages        = {3532--3564},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMST.2019.2915923},
  doi          = {10.1109/COMST.2019.2915923},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/ShitSPJPMZR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BarikaGZWMR19,
  author       = {Mutaz Barika and
                  Saurabh Kumar Garg and
                  Albert Y. Zomaya and
                  Lizhe Wang and
                  Aad van Moorsel and
                  Rajiv Ranjan},
  title        = {Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges,
                  Survey, and Future Directions},
  journal      = {{ACM} Comput. Surv.},
  volume       = {52},
  number       = {5},
  pages        = {95:1--95:41},
  year         = {2019},
  url          = {https://doi.org/10.1145/3332301},
  doi          = {10.1145/3332301},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/BarikaGZWMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AliACHM19,
  author       = {Mohammed Aamir Ali and
                  Muhammad Ajmal Azad and
                  Mario Parre{\~{n}}o Centeno and
                  Feng Hao and
                  Aad van Moorsel},
  title        = {Consumer-facing technology fraud: Economics, attack methods and potential
                  solutions},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {100},
  pages        = {408--427},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.03.041},
  doi          = {10.1016/J.FUTURE.2019.03.041},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AliACHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/AldweeshAMM19,
  author       = {Amjad Aldweesh and
                  Maher Alharby and
                  Maryam Mehrnezhad and
                  Aad van Moorsel},
  title        = {OpBench: {A} {CPU} Performance Benchmark for Ethereum Smart Contract
                  Operation Code},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {274--281},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00043},
  doi          = {10.1109/BLOCKCHAIN.2019.00043},
  timestamp    = {Wed, 08 Jan 2020 16:20:56 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/AldweeshAMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/CentenoAGM19,
  author       = {Mario Parre{\~{n}}o Centeno and
                  Mohammed Aamir Ali and
                  Yu Guan and
                  Aad van Moorsel},
  editor       = {Slim Kallel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ahmed Hadj Kacem},
  title        = {Unsupervised Machine Learning for Card Payment Fraud Detection},
  booktitle    = {Risks and Security of Internet and Systems, 14th International Conference,
                  CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12026},
  pages        = {247--262},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41568-6\_16},
  doi          = {10.1007/978-3-030-41568-6\_16},
  timestamp    = {Tue, 03 Mar 2020 17:17:08 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/CentenoAGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AliM19,
  author       = {Mohammed Aamir Ali and
                  Aad van Moorsel},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Designed to Be Broken: {A} Reverse Engineering Study of the 3D Secure
                  2.0 Payment Protocol},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {201--221},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_13},
  doi          = {10.1007/978-3-030-32101-7\_13},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AliM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-00782,
  author       = {Ehsan Toreini and
                  Mhairi Aitken and
                  Kovila P. L. Coopamootoo and
                  Karen Elliott and
                  Carlos Gonzalez Zelaya and
                  Aad van Moorsel},
  title        = {The relationship between trust in {AI} and trustworthy machine learning
                  technologies},
  journal      = {CoRR},
  volume       = {abs/1912.00782},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.00782},
  eprinttype    = {arXiv},
  eprint       = {1912.00782},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-00782.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/Moorsel18,
  author       = {Aad van Moorsel},
  title        = {Benchmarks and Models for Blockchain: Consensus Algorithms},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {46},
  number       = {3},
  pages        = {113},
  year         = {2018},
  url          = {https://doi.org/10.1145/3308897.3308949},
  doi          = {10.1145/3308897.3308949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/Moorsel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/AlharbyM18,
  author       = {Maher Alharby and
                  Aad van Moorsel},
  title        = {BlockSim: {A} Simulation Framework for Blockchain Systems},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {46},
  number       = {3},
  pages        = {135--138},
  year         = {2018},
  url          = {https://doi.org/10.1145/3308897.3308956},
  doi          = {10.1145/3308897.3308956},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/AlharbyM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/AldweeshAM18,
  author       = {Amjad Aldweesh and
                  Maher Alharby and
                  Aad van Moorsel},
  title        = {Performance Benchmarking for Ethereum Opcodes},
  booktitle    = {15th {IEEE/ACS} International Conference on Computer Systems and Applications,
                  {AICCSA} 2018, Aqaba, Jordan, October 28 - Nov. 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AICCSA.2018.8612882},
  doi          = {10.1109/AICCSA.2018.8612882},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aiccsa/AldweeshAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/AldweeshASM18,
  author       = {Amjad Aldweesh and
                  Maher Alharby and
                  Ellis Solaiman and
                  Aad van Moorsel},
  title        = {Performance Benchmarking of Smart Contracts to Assess Miner Incentives
                  in Ethereum},
  booktitle    = {14th European Dependable Computing Conference, {EDCC} 2018, Ia{\c{s}}i,
                  Romania, September 10-14, 2018},
  pages        = {144--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/EDCC.2018.00034},
  doi          = {10.1109/EDCC.2018.00034},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edcc/AldweeshASM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/CentenoGM18,
  author       = {Mario Parre{\~{n}}o Centeno and
                  Yu Guan and
                  Aad van Moorsel},
  title        = {Mobile Based Continuous Authentication Using Deep Features},
  booktitle    = {Proceedings of the 2nd International Workshop on Embedded and Mobile
                  Deep Learning, EMDL@MobiSys 2018, Munich, Germany, June 15, 2018},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212725.3212732},
  doi          = {10.1145/3212725.3212732},
  timestamp    = {Mon, 12 Nov 2018 09:46:48 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/CentenoGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/EzhilchelvanAM18,
  author       = {Paul D. Ezhilchelvan and
                  Amjad Aldweesh and
                  Aad van Moorsel},
  title        = {Non-Blocking Two Phase Commit Using Blockchain},
  booktitle    = {Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains
                  for Distributed Systems, CRYBLOCK@MobiSys 2018, Munich, Germany, June
                  15, 2018},
  pages        = {36--41},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3211933.3211940},
  doi          = {10.1145/3211933.3211940},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/EzhilchelvanAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/Ali0M18,
  author       = {Mohammed Aamir Ali and
                  Thomas Gro{\ss} and
                  Aad van Moorsel},
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini and
                  Theo Tryfonas and
                  Debi Ashenden},
  title        = {Investigation of 3-D secure's model for fraud detection},
  booktitle    = {{STAST} 2018: 8th International Workshop on Socio-Technical Aspects
                  in Security and Trust, San Juan, Puerto Rico, USA, December, 2018},
  pages        = {3:1--3:11},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3361331.3361334},
  doi          = {10.1145/3361331.3361334},
  timestamp    = {Wed, 21 Apr 2021 15:28:19 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/Ali0M18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosp/Moorsel18,
  author       = {Aad van Moorsel},
  editor       = {Katinka Wolter and
                  William J. Knottenbelt and
                  Andr{\'{e}} van Hoorn and
                  Manoj Nambiar},
  title        = {Benchmarks and Models for Blockchain},
  booktitle    = {Proceedings of the 2018 {ACM/SPEC} International Conference on Performance
                  Engineering, {ICPE} 2018, Berlin, Germany, April 09-13, 2018},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3184407.3184441},
  doi          = {10.1145/3184407.3184441},
  timestamp    = {Fri, 02 Jun 2023 16:15:08 +0200},
  biburl       = {https://dblp.org/rec/conf/wosp/Moorsel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongWAMM18,
  author       = {Changyu Dong and
                  Yilei Wang and
                  Amjad Aldweesh and
                  Patrick McCorry and
                  Aad van Moorsel},
  title        = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts
                  for Verifiable Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongWAMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AliAEM17,
  author       = {Mohammed Aamir Ali and
                  Budi Arief and
                  Martin Emms and
                  Aad P. A. van Moorsel},
  title        = {Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {2},
  pages        = {78--86},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.27},
  doi          = {10.1109/MSP.2017.27},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AliAEM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/RanjanPJBM17,
  author       = {Rajiv Ranjan and
                  Jedsada Phengsuwan and
                  Philip James and
                  Stuart L. Barr and
                  Aad van Moorsel},
  title        = {Urban Risk Analytics in the Cloud},
  journal      = {{IT} Prof.},
  volume       = {19},
  number       = {2},
  pages        = {4--9},
  year         = {2017},
  url          = {https://doi.org/10.1109/MITP.2017.20},
  doi          = {10.1109/MITP.2017.20},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/RanjanPJBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DongWAMM17,
  author       = {Changyu Dong and
                  Yilei Wang and
                  Amjad Aldweesh and
                  Patrick McCorry and
                  Aad van Moorsel},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts
                  for Verifiable Cloud Computing},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {211--227},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134032},
  doi          = {10.1145/3133956.3134032},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DongWAMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epew/MaceTMM17,
  author       = {John C. Mace and
                  Nipun Balan Thekkummal and
                  Charles Morisset and
                  Aad van Moorsel},
  editor       = {Philipp Reinecke and
                  Antinisca Di Marco},
  title        = {ADaCS: {A} Tool for Analysing Data Collection Strategies},
  booktitle    = {Computer Performance Engineering - 14th European Workshop, {EPEW}
                  2017, Berlin, Germany, September 7-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10497},
  pages        = {230--245},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66583-2\_15},
  doi          = {10.1007/978-3-319-66583-2\_15},
  timestamp    = {Sat, 21 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/epew/MaceTMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/MoorselFR17,
  author       = {Aad P. A. van Moorsel and
                  Matthew Forshaw and
                  Francisco Rocha},
  title        = {Experience Report: How to Design Web-Based Competitions for Legal
                  Proceedings: Lessons from a Court Case},
  booktitle    = {28th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2017, Toulouse, France, October 23-26, 2017},
  pages        = {240--249},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISSRE.2017.41},
  doi          = {10.1109/ISSRE.2017.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/MoorselFR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CentenoMC17,
  author       = {Mario Parre{\~{n}}o Centeno and
                  Aad van Moorsel and
                  Stefano Castruccio},
  title        = {Smartphone Continuous Authentication Using Deep Learning Autoencoders},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {147--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00026},
  doi          = {10.1109/PST.2017.00026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CentenoMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AlqahtaniM18,
  author       = {Mohammed Alqahtani and
                  Aad van Moorsel},
  editor       = {Osama Nasser Alrajeh and
                  Nigel Thomas},
  title        = {Risk Assessment Methodology For {EMV} Financial Transaction Systems},
  booktitle    = {Proceedings of the thirty third Annual {UK} Performance Engineering
                  Workshops, {UKPEW} 2017, Newcastle upon Tyne, UK, December 2017},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {340},
  pages        = {137--150},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.entcs.2018.09.010},
  doi          = {10.1016/J.ENTCS.2018.09.010},
  timestamp    = {Sat, 12 Nov 2022 12:58:32 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/AlqahtaniM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AlharbyM18,
  author       = {Maher Alharby and
                  Aad van Moorsel},
  editor       = {Osama Nasser Alrajeh and
                  Nigel Thomas},
  title        = {The Impact of Profit Uncertainty on Miner Decisions in Blockchain
                  Systems},
  booktitle    = {Proceedings of the thirty third Annual {UK} Performance Engineering
                  Workshops, {UKPEW} 2017, Newcastle upon Tyne, UK, December 2017},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {340},
  pages        = {151--167},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.entcs.2018.09.011},
  doi          = {10.1016/J.ENTCS.2018.09.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/AlharbyM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-01171,
  author       = {Changyu Dong and
                  Yilei Wang and
                  Amjad Aldweesh and
                  Patrick McCorry and
                  Aad van Moorsel},
  title        = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts
                  for Verifiable Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1708.01171},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.01171},
  eprinttype    = {arXiv},
  eprint       = {1708.01171},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-01171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-06372,
  author       = {Maher Alharby and
                  Aad van Moorsel},
  title        = {Blockchain-based Smart Contracts: {A} Systematic Mapping Study},
  journal      = {CoRR},
  volume       = {abs/1710.06372},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.06372},
  eprinttype    = {arXiv},
  eprint       = {1710.06372},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-06372.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/YevseyevaMM16,
  author       = {Iryna Yevseyeva and
                  Charles Morisset and
                  Aad P. A. van Moorsel},
  title        = {Modeling and analysis of influence power for information security
                  decisions},
  journal      = {Perform. Evaluation},
  volume       = {98},
  pages        = {36--51},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.peva.2016.01.003},
  doi          = {10.1016/J.PEVA.2016.01.003},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pe/YevseyevaMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/MehrnezhadAHM16,
  author       = {Maryam Mehrnezhad and
                  Mohammed Aamir Ali and
                  Feng Hao and
                  Aad P. A. van Moorsel},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {{NFC} Payment Spy: {A} Privacy Attack on Contactless Payments},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_4},
  doi          = {10.1007/978-3-319-49100-4\_4},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/MehrnezhadAHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serene/MaceMM16,
  author       = {John C. Mace and
                  Charles Morisset and
                  Aad P. A. van Moorsel},
  editor       = {Ivica Crnkovic and
                  Elena Troubitsyna},
  title        = {{WRAD:} Tool Support for Workflow Resiliency Analysis and Design},
  booktitle    = {Software Engineering for Resilient Systems - 8th International Workshop,
                  {SERENE} 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9823},
  pages        = {79--87},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45892-2\_6},
  doi          = {10.1007/978-3-319-45892-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/serene/MaceMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/McGoughAGWBFMAT15,
  author       = {Andrew Stephen McGough and
                  Budi Arief and
                  Carl Gamble and
                  David Wall and
                  John Brennan and
                  John S. Fitzgerald and
                  Aad P. A. van Moorsel and
                  Sujeewa Alwis and
                  Georgios Theodoropoulos and
                  Ed Ruck{-}Keene},
  title        = {Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems
                  Using Beneficial Intelligent Software},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {4},
  pages        = {3--46},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.12.31.003},
  doi          = {10.22667/JOWUA.2015.12.31.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/McGoughAGWBFMAT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcshci/TurlandCJBM15,
  author       = {James Turland and
                  Lynne M. Coventry and
                  Debora Jeske and
                  Pam Briggs and
                  Aad P. A. van Moorsel},
  editor       = {Shaun W. Lawson and
                  Patrick Dickinson},
  title        = {Nudging towards security: developing an application for wireless network
                  selection for android phones},
  booktitle    = {Proceedings of the 2015 British {HCI} Conference, Lincoln, United
                  Kingdom, July 13-17, 2015},
  pages        = {193--201},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2783446.2783588},
  doi          = {10.1145/2783446.2783588},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bcshci/TurlandCJBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McGoughWBTRAGFM15,
  author       = {Andrew Stephen McGough and
                  David Wall and
                  John Brennan and
                  Georgios Theodoropoulos and
                  Ed Ruck{-}Keene and
                  Budi Arief and
                  Carl Gamble and
                  John S. Fitzgerald and
                  Aad P. A. van Moorsel and
                  Sujeewa Alwis},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous
                  Systems Using Beneficial Intelligent Software (Ben-ware)},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808785},
  doi          = {10.1145/2808783.2808785},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/McGoughWBTRAGFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/centeris/YevseyevaFEM15,
  author       = {Iryna Yevseyeva and
                  Vitor Basto{-}Fernandes and
                  Michael Emmerich and
                  Aad van Moorsel},
  editor       = {Maria Manuela Cruz{-}Cunha and
                  Jo{\~{a}}o Eduardo Quintela Varaj{\~{a}}o and
                  Rui Rijo and
                  Ricardo Martinho and
                  Petra Schubert and
                  Albert Boonstra and
                  Ricardo Correia and
                  Alexander Berler},
  title        = {Selecting Optimal Subset of Security Controls},
  booktitle    = {Conference on ENTERprise Information Systems/International Conference
                  on Project MANagement/Conference on Health and Social Care Information
                  Systems and Technologies, CENTERIS/ProjMAN/HCist 2015, Vilamoura,
                  Portugal, October 7-9, 2015},
  series       = {Procedia Computer Science},
  volume       = {64},
  pages        = {1035--1042},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.procs.2015.08.625},
  doi          = {10.1016/J.PROCS.2015.08.625},
  timestamp    = {Tue, 23 Apr 2024 23:18:35 +0200},
  biburl       = {https://dblp.org/rec/conf/centeris/YevseyevaFEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/MaceMM15,
  author       = {John C. Mace and
                  Charles Morisset and
                  Aad P. A. van Moorsel},
  editor       = {David M. Nicol},
  title        = {Modelling user availability in workflow resiliency analysis},
  booktitle    = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746194.2746201},
  doi          = {10.1145/2746194.2746201},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/MaceMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/CainM15,
  author       = {Robert Cain and
                  Aad P. A. van Moorsel},
  editor       = {David M. Nicol},
  title        = {Optimisation of data collection strategies for model-based evaluation
                  and decision-making: poster},
  booktitle    = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages        = {28:1--28:2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746194.2746224},
  doi          = {10.1145/2746194.2746224},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/CainM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/MaceMM15,
  author       = {John C. Mace and
                  Charles Morisset and
                  Aad P. A. van Moorsel},
  editor       = {Javier Campos and
                  Boudewijn R. Haverkort},
  title        = {Impact of Policy Design on Workflow Resiliency Computation Time},
  booktitle    = {Quantitative Evaluation of Systems, 12th International Conference,
                  {QEST} 2015, Madrid, Spain, September 1-3, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9259},
  pages        = {244--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22264-6\_16},
  doi          = {10.1007/978-3-319-22264-6\_16},
  timestamp    = {Sat, 19 Oct 2019 20:32:11 +0200},
  biburl       = {https://dblp.org/rec/conf/qest/MaceMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serene/MaceMM15,
  author       = {John C. Mace and
                  Charles Morisset and
                  Aad P. A. van Moorsel},
  editor       = {Alessandro Fantechi and
                  Patrizio Pelliccione},
  title        = {Resiliency Variance in Workflows with Choice},
  booktitle    = {Software Engineering for Resilient Systems - 7th International Workshop,
                  {SERENE} 2015, Paris, France, September 7-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9274},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23129-7\_10},
  doi          = {10.1007/978-3-319-23129-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/serene/MaceMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ZengKM14,
  author       = {Wen Zeng and
                  Maciej Koutny and
                  Aad P. A. van Moorsel},
  title        = {Performance Modelling and Evaluation of Enterprise Information Security
                  Technologies},
  booktitle    = {14th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2014, Xi'an, China, September 11-13, 2014},
  pages        = {504--511},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIT.2014.18},
  doi          = {10.1109/CIT.2014.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ZengKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EmmsAFHM14,
  author       = {Martin Emms and
                  Budi Arief and
                  Leo Freitas and
                  Joseph Hannon and
                  Aad P. A. van Moorsel},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Harvesting High Value Foreign Currency Transactions from {EMV} Contactless
                  Credit Cards Without the {PIN}},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {716--726},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660312},
  doi          = {10.1145/2660267.2660312},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EmmsAFHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epew/YevseyevaMGM14,
  author       = {Iryna Yevseyeva and
                  Charles Morisset and
                  Thomas Gro{\ss} and
                  Aad P. A. van Moorsel},
  editor       = {Andr{\'{a}}s Horv{\'{a}}th and
                  Katinka Wolter},
  title        = {A Decision Making Model of Influencing Behavior in Information Security},
  booktitle    = {Computer Performance Engineering - 11th European Workshop, {EPEW}
                  2014, Florence, Italy, September 11-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8721},
  pages        = {194--208},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10885-8\_14},
  doi          = {10.1007/978-3-319-10885-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/epew/YevseyevaMGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaceMM14,
  author       = {John C. Mace and
                  Charles Morisset and
                  Aad P. A. van Moorsel},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Quantitative Workflow Resiliency},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {344--361},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_20},
  doi          = {10.1007/978-3-319-11203-9\_20},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MaceMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/CoventryBJM14,
  author       = {Lynne M. Coventry and
                  Pam Briggs and
                  Debora Jeske and
                  Aad P. A. van Moorsel},
  editor       = {Aaron Marcus},
  title        = {{SCENE:} {A} Structured Means for Creating and Evaluating Behavioral
                  Nudges in a Cyber Security Environment},
  booktitle    = {Design, User Experience, and Usability. Theories, Methods, and Tools
                  for Designing the User Experience - Third International Conference,
                  {DUXU} 2014, Held as Part of {HCI} International 2014, Heraklion,
                  Crete, Greece, June 22-27, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8517},
  pages        = {229--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07668-3\_23},
  doi          = {10.1007/978-3-319-07668-3\_23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/CoventryBJM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/MorissetGMY14,
  author       = {Charles Morisset and
                  Thomas Gro{\ss} and
                  Aad P. A. van Moorsel and
                  Iryna Yevseyeva},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {Nudging for Quantitative Access Control Systems},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Second
                  International Conference, {HAS} 2014, Held as Part of {HCI} International
                  2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8533},
  pages        = {340--351},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07620-1\_30},
  doi          = {10.1007/978-3-319-07620-1\_30},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/MorissetGMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MorissetYGM14,
  author       = {Charles Morisset and
                  Iryna Yevseyeva and
                  Thomas Gro{\ss} and
                  Aad P. A. van Moorsel},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {A Formal Model for Soft Enforcement: Influencing the Decision-Maker},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_8},
  doi          = {10.1007/978-3-319-11851-2\_8},
  timestamp    = {Thu, 23 Sep 2021 11:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MorissetYGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/AriefCEM14,
  author       = {Budi Arief and
                  Kovila P. L. Coopamootoo and
                  Martin Emms and
                  Aad P. A. van Moorsel},
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {Sensible Privacy: How We Can Protect Domestic Violence Survivors Without
                  Facilitating Misuse},
  booktitle    = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  pages        = {201--204},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665943.2665965},
  doi          = {10.1145/2665943.2665965},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/AriefCEM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AlsuhibanyAMSM13,
  author       = {Suliman A. Alsuhibany and
                  Ahmad Alonaizi and
                  Charles Morisset and
                  Chris Smith and
                  Aad P. A. van Moorsel},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Experimental Investigation in the Impact on Security of the Release
                  Order of Defensive Algorithms},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {321--336},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_22},
  doi          = {10.1007/978-3-642-40588-4\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlsuhibanyAMSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AlsuhibanyM13,
  author       = {Suliman A. Alsuhibany and
                  Aad P. A. van Moorsel},
  title        = {Modelling and Analysis of Release Order of Security Algorithms Using
                  Stochastic Petri Nets},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {437--445},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.58},
  doi          = {10.1109/ARES.2013.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlsuhibanyM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/WongthaiRM13,
  author       = {Winai Wongthai and
                  Francisco Liberal Rocha and
                  Aad P. A. van Moorsel},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Hui{-}Huang Hsu},
  title        = {A Generic Logging Template for Infrastructure as a Service Cloud},
  booktitle    = {27th International Conference on Advanced Information Networking and
                  Applications Workshops, {WAINA} 2013, Barcelona, Spain, March 25-28,
                  2013},
  pages        = {1153--1160},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WAINA.2013.108},
  doi          = {10.1109/WAINA.2013.108},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/WongthaiRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/AlsuhibanyMM13,
  author       = {Suliman A. Alsuhibany and
                  Charles Morisset and
                  Aad P. A. van Moorsel},
  editor       = {Bruno Crispo and
                  Ravi S. Sandhu and
                  Nora Cuppens{-}Boulahia and
                  Mauro Conti and
                  Jean{-}Louis Lanet},
  title        = {Detection of attack strategies},
  booktitle    = {2013 International Conference on Risks and Security of Internet and
                  Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CRiSIS.2013.6766353},
  doi          = {10.1109/CRISIS.2013.6766353},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/AlsuhibanyMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/EmmsALM13,
  author       = {Martin Emms and
                  Budi Arief and
                  Nicholas Little and
                  Aad P. A. van Moorsel},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Risks of Offline Verify {PIN} on Contactless Cards},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {313--321},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_26},
  doi          = {10.1007/978-3-642-39884-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/EmmsALM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/RochaGM13,
  author       = {Francisco Rocha and
                  Thomas Gross and
                  Aad P. A. van Moorsel},
  title        = {Defense-in-Depth Against Malicious Insiders in the Cloud},
  booktitle    = {2013 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2013, San Francisco, CA, USA, March 25-27, 2013},
  pages        = {88--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IC2E.2013.20},
  doi          = {10.1109/IC2E.2013.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/RochaGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/EmmsAM12,
  author       = {Martin Emms and
                  Budi Arief and
                  Aad P. A. van Moorsel},
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Electronic Footprints in the Sand: Technologies for Assisting Domestic
                  Violence Survivors},
  booktitle    = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
                  2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8319},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-54069-1\_13},
  doi          = {10.1007/978-3-642-54069-1\_13},
  timestamp    = {Sat, 19 Oct 2019 20:10:28 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/EmmsAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/GreatheadCAM12,
  author       = {David Greathead and
                  Lynne M. Coventry and
                  Budi Arief and
                  Aad P. A. van Moorsel},
  editor       = {Joseph A. Konstan and
                  Ed H. Chi and
                  Kristina H{\"{o}}{\"{o}}k},
  title        = {Deriving requirements for an online community interaction scheme:
                  indications from older adults},
  booktitle    = {{CHI} Conference on Human Factors in Computing Systems, {CHI} '12,
                  Extended Abstracts Volume, Austin, TX, USA, May 5-10, 2012},
  pages        = {1541--1546},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2212776.2223669},
  doi          = {10.1145/2212776.2223669},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/GreatheadCAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CainM12,
  author       = {Robert Cain and
                  Aad P. A. van Moorsel},
  editor       = {Robert S. Swarz and
                  Philip Koopman and
                  Michel Cukier},
  title        = {Optimization of data collection strategies for model-based evaluation
                  and decision-making},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks,
                  {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSN.2012.6263947},
  doi          = {10.1109/DSN.2012.6263947},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/CainM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/wolter12,
  editor       = {Katinka Wolter and
                  Alberto Avritzer and
                  Marco Vieira and
                  Aad P. A. van Moorsel},
  title        = {Resilience Assessment and Evaluation of Computing Systems},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29032-9},
  doi          = {10.1007/978-3-642-29032-9},
  isbn         = {978-3-642-29031-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/wolter12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KaanicheM11,
  author       = {Mohamed Ka{\^{a}}niche and
                  Aad P. A. van Moorsel},
  title        = {It All Depends, and Increasingly So},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {9},
  number       = {6},
  pages        = {56--57},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSP.2011.165},
  doi          = {10.1109/MSP.2011.165},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KaanicheM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/FenzPM11,
  author       = {Stefan Fenz and
                  Simon Edward Parkin and
                  Aad P. A. van Moorsel},
  title        = {A Community Knowledge Base for {IT} Security},
  journal      = {{IT} Prof.},
  volume       = {13},
  number       = {3},
  pages        = {24--30},
  year         = {2011},
  url          = {https://doi.org/10.1109/MITP.2011.35},
  doi          = {10.1109/MITP.2011.35},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/FenzPM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/AbdullahM11,
  author       = {Johari Abdullah and
                  Aad P. A. van Moorsel},
  title        = {Uncertainty and Uncertainty Tolerance in Service Provisioning},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {89--109},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.11.31.089},
  doi          = {10.22667/JISIS.2011.11.31.089},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/AbdullahM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/AriefMGC11,
  author       = {Budi Arief and
                  Aad P. A. van Moorsel and
                  David Greathead and
                  Lynne M. Coventry},
  title        = {Towards the implementation of an internet-based neighbourhood watch
                  scheme-Impacts of inclusive technologies on societies},
  booktitle    = {International Conference on Computational Aspects of Social Networks,
                  CASoN 2011, Salamanca, Spain, October 19-21, 2011},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CASON.2011.6085913},
  doi          = {10.1109/CASON.2011.6085913},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/AriefMGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MaceMW11,
  author       = {John C. Mace and
                  Aad P. A. van Moorsel and
                  Paul Watson},
  title        = {The case for dynamic security solutions in public cloud workflow deployments},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks
                  Workshops {(DSN-W} 2011), Hong Kong, China, June 27-30, 2011},
  pages        = {111--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSNW.2011.5958795},
  doi          = {10.1109/DSNW.2011.5958795},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/MaceMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epew/KassabM11,
  author       = {Rouaa Yassin Kassab and
                  Aad P. A. van Moorsel},
  editor       = {Nigel Thomas},
  title        = {Formal Mapping of {WSLA} Contracts on Stochastic Models},
  booktitle    = {Computer Performance Engineering - 8th European Performance Engineering
                  Workshop, {EPEW} 2011, Borrowdale, UK, October 12-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6977},
  pages        = {117--132},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24749-1\_10},
  doi          = {10.1007/978-3-642-24749-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/epew/KassabM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ZengM11,
  author       = {Wen Zeng and
                  Aad P. A. van Moorsel},
  editor       = {Nigel Thomas and
                  Jeremy T. Bradley and
                  William J. Knottenbelt and
                  Samuel Kounev and
                  Nikolaus Huber and
                  Fabian Brosig},
  title        = {Quantitative Evaluation of Enterprise {DRM} Technology},
  booktitle    = {Fifth International Workshop on the Practical Application of Stochastic
                  Modelling, PASM@ICPE 2011, Karlsruhe, Germany, March 2011},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {275},
  pages        = {159--174},
  publisher    = {Elsevier},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.entcs.2011.09.011},
  doi          = {10.1016/J.ENTCS.2011.09.011},
  timestamp    = {Fri, 10 Mar 2023 15:05:32 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ZengM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/ReineckeWM10,
  author       = {Philipp Reinecke and
                  Katinka Wolter and
                  Aad P. A. van Moorsel},
  title        = {Evaluating the adaptivity of computing systems},
  journal      = {Perform. Evaluation},
  volume       = {67},
  number       = {8},
  pages        = {676--693},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.peva.2009.12.001},
  doi          = {10.1016/J.PEVA.2009.12.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pe/ReineckeWM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chimit/MacePM10,
  author       = {John C. Mace and
                  Simon Edward Parkin and
                  Aad P. A. van Moorsel},
  editor       = {Adam Moskowitz and
                  Nicole Forsgren and
                  Tamara Babaian and
                  Konstantin Beznosov},
  title        = {A collaborative ontology development tool for information security
                  managers},
  booktitle    = {Proceedings of the 4th {ACM} Symposium on Computer Human Interaction
                  for Management of Information Technology, {CHIMIT} 2010, San Jose,
                  CA, USA, November 12-13, 2010},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873561.1873566},
  doi          = {10.1145/1873561.1873566},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chimit/MacePM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/MachulakMCM10,
  author       = {Maciej P. Machulak and
                  Eve Maler and
                  Domenico Catalano and
                  Aad P. A. van Moorsel},
  editor       = {Thomas Gro{\ss} and
                  Kenji Takahashi},
  title        = {User-managed access to web resources},
  booktitle    = {Proceedings of the 6th Workshop on Digital Identity Management, Chicago,
                  Illinois, USA, October 8, 2010},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866855.1866865},
  doi          = {10.1145/1866855.1866865},
  timestamp    = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/MachulakMCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3k/MacePM10,
  author       = {John C. Mace and
                  Simon Edward Parkin and
                  Aad P. A. van Moorsel},
  editor       = {Kecheng Liu and
                  Joaquim Filipe},
  title        = {Ontology Editing Tool for Information Security and Human Factors Experts},
  booktitle    = {{KMIS} 2010 - Proceedings of the International Conference on Knowledge
                  Management and Information Sharing, Valencia, Spain, October 25-28,
                  2010},
  pages        = {207--212},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Thu, 27 Oct 2011 13:04:33 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3k/MacePM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/MachulakM10,
  author       = {Maciej P. Machulak and
                  Aad P. A. van Moorsel},
  title        = {Architecture and Protocol for User-Controlled Access Management in
                  Web 2.0 Applications},
  booktitle    = {30th {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2010 Workshops), 21-25 June 2010, Genova, Italy},
  pages        = {62--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDCSW.2010.37},
  doi          = {10.1109/ICDCSW.2010.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/MachulakM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/MachulakMM10,
  author       = {Maciej P. Machulak and
                  Lukasz Moren and
                  Aad P. A. van Moorsel},
  editor       = {Karl M. G{\"{o}}schka and
                  Frank Leymann and
                  Schahram Dustdar and
                  Helen Paik and
                  Vladimir Tosic and
                  Lorenz Froihofer},
  title        = {Design and implementation of user-managed access framework for web
                  2.0 applications},
  booktitle    = {Proceedings of the 5th International Workshop on Middleware for Service
                  Oriented Computing, MW4SOC, Bangalore, India, November 29 - December
                  03, 2010},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1890912.1890913},
  doi          = {10.1145/1890912.1890913},
  timestamp    = {Wed, 26 May 2021 16:01:23 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/MachulakMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ParkinMIS10,
  author       = {Simon E. Parkin and
                  Aad P. A. van Moorsel and
                  Philip Inglesant and
                  Martina Angela Sasse},
  editor       = {Angelos D. Keromytis and
                  Sean Peisert and
                  Richard Ford and
                  Carrie Gates},
  title        = {A stealth approach to usable security: helping {IT} security managers
                  to identify workable security solutions},
  booktitle    = {Proceedings of the 2010 Workshop on New Security Paradigms, Concord,
                  MA, USA, September 21-23, 2010},
  pages        = {33--50},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1900546.1900553},
  doi          = {10.1145/1900546.1900553},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ParkinMIS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/SmithM10,
  author       = {Chris Smith and
                  Aad van Moorsel},
  editor       = {Dirk Neumann and
                  Mark Baker and
                  J{\"{o}}rn Altmann and
                  Omer F. Rana},
  title        = {Mitigating Provider Uncertainty in Service Provision Contracts},
  booktitle    = {Economic Models and Algorithms for Distributed Systems},
  series       = {Autonomic Systems},
  pages        = {143--159},
  publisher    = {Birkh{\"{a}}user},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-7643-8899-7\_9},
  doi          = {10.1007/978-3-7643-8899-7\_9},
  timestamp    = {Wed, 02 Feb 2022 16:08:03 +0100},
  biburl       = {https://dblp.org/rec/books/sp/10/SmithM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2010P10292,
  editor       = {Alberto Avritzer and
                  Aad P. A. van Moorsel and
                  Katinka Wolter},
  title        = {Resilience Assessment and Evaluation, 18.07. - 23.07.2010},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {10292},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2010},
  url          = {http://drops.dagstuhl.de/portals/10292/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2010P10292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/AvritzerMW10,
  author       = {Alberto Avritzer and
                  Aad P. A. van Moorsel and
                  Katinka Wolter},
  editor       = {Alberto Avritzer and
                  Aad P. A. van Moorsel and
                  Katinka Wolter},
  title        = {10292 Abstracts Collection and Summary - Resilience Assessment and
                  Evaluation},
  booktitle    = {Resilience Assessment and Evaluation, 18.07. - 23.07.2010},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {10292},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2010},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2010/2898/},
  timestamp    = {Thu, 10 Jun 2021 13:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/AvritzerMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/JoshiBJMW09,
  author       = {Kaustubh R. Joshi and
                  Guy Bunker and
                  Farnam Jahanian and
                  Aad P. A. van Moorsel and
                  Joseph Weinman},
  title        = {Dependability in the cloud: Challenges and opportunities},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {103--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270350},
  doi          = {10.1109/DSN.2009.5270350},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/JoshiBJMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/PaikGMWW09,
  author       = {Hye{-}young Paik and
                  Karl M. G{\"{o}}schka and
                  Aad P. A. van Moorsel and
                  Raymond K. Wong and
                  Ian Warren},
  title        = {Introduction to the proceedings of the {EDOC} 2009 workshop Middleware
                  for Web Services {(MWS)} 2009},
  booktitle    = {Workshops Proceedings of the 12th {IEEE} International Enterprise
                  Distributed Object Computing Conference, EDOCw 2009, 1-4 September
                  2009, Auckland, New Zealand},
  pages        = {72--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/EDOCW.2009.5332012},
  doi          = {10.1109/EDOCW.2009.5332012},
  timestamp    = {Wed, 16 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/PaikGMWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epew/ZhangM09,
  author       = {Huqiu Zhang and
                  Aad P. A. van Moorsel},
  editor       = {Jeremy T. Bradley},
  title        = {Fast Generation of Scale Free Networks with Directed Arcs},
  booktitle    = {Computer Performance Engineering, 6th European Performance Engineering
                  Workshop, {EPEW} 2009, London, UK, July 9-10, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5652},
  pages        = {131--148},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02924-0\_11},
  doi          = {10.1007/978-3-642-02924-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/epew/ZhangM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/DoddaSM09,
  author       = {Ravi Teja Dodda and
                  Chris Smith and
                  Aad P. A. van Moorsel},
  editor       = {Sanjay Ranka and
                  Srinivas Aluru and
                  Rajkumar Buyya and
                  Yeh{-}Ching Chung and
                  Sumeet Dua and
                  Ananth Grama and
                  Sandeep K. S. Gupta and
                  Rajeev Kumar and
                  Vir V. Phoha},
  title        = {An Architecture for Cross-Cloud System Management},
  booktitle    = {Contemporary Computing - Second International Conference, {IC3} 2009,
                  Noida, India, August 17-19, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {40},
  pages        = {556--567},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03547-0\_53},
  doi          = {10.1007/978-3-642-03547-0\_53},
  timestamp    = {Wed, 24 May 2017 08:31:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3/DoddaSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoft/StepanovaPM09,
  author       = {Daria Stepanova and
                  Simon Edward Parkin and
                  Aad P. A. van Moorsel},
  editor       = {Boris Shishkov and
                  Jos{\'{e}} Cordeiro and
                  Alpesh Ranchordas},
  title        = {A Knowledge Base for Justified Information Security Decision-making},
  booktitle    = {{ICSOFT} 2009 - Proceedings of the 4th International Conference on
                  Software and Data Technologies, Volume 2, Sofia, Bulgaria, July 26-29,
                  2009},
  pages        = {326--331},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Tue, 18 Sep 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoft/StepanovaPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ParkinMC09,
  author       = {Simon Edward Parkin and
                  Aad P. A. van Moorsel and
                  Robert Coles},
  editor       = {Atilla El{\c{c}}i and
                  Oleg B. Makarevich and
                  Mehmet A. Orgun and
                  Alexander G. Chefranov and
                  Josef Pieprzyk and
                  Yuri Anatolievich Bryukhomitsky and
                  Siddika Berna {\"{O}}rs},
  title        = {An information security ontology incorporating human-behavioural implications},
  booktitle    = {Proceedings of the 2nd International Conference on Security of Information
                  and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10,
                  2009},
  pages        = {46--55},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1626195.1626209},
  doi          = {10.1145/1626195.1626209},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/ParkinMC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AndreouM08,
  author       = {Marios S. Andreou and
                  Aad P. A. van Moorsel},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {COTraSE: Connection Oriented Traceback in Switched Ethernet},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {198--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.25},
  doi          = {10.1109/IAS.2008.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AndreouM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BondavalliMM08,
  author       = {Andrea Bondavalli and
                  Istv{\'{a}}n Majzik and
                  Aad P. A. van Moorsel},
  title        = {International Workshop on Resilience Assessment and Dependability
                  Benchmarking {(RADB} 2008)},
  booktitle    = {The 38th Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska,
                  USA, Proceedings},
  pages        = {542--543},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/DSN.2008.4630125},
  doi          = {10.1109/DSN.2008.4630125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/BondavalliMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/TosicGMWW08,
  author       = {Vladimir Tosic and
                  Karl M. G{\"{o}}schka and
                  Aad P. A. van Moorsel and
                  Ian Warren and
                  Raymond K. Wong},
  editor       = {Marten van Sinderen and
                  Jo{\~{a}}o Paulo A. Almeida and
                  Lu{\'{\i}}s Ferreira Pires and
                  Maarten Steen},
  title        = {Introduction to the Proceedings of the {EDOC} 2008 Workshop Middleware
                  for Web Services {(MWS)} 2008},
  booktitle    = {Workshops Proceedings of the 12th International {IEEE} Enterprise
                  Distributed Object Computing Conference, {ECOCW} 2008, 16 September
                  2008, Munich, Germany},
  pages        = {338--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EDOCW.2008.40},
  doi          = {10.1109/EDOCW.2008.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/TosicGMWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epew/ZhangM08,
  author       = {Huqiu Zhang and
                  Aad P. A. van Moorsel},
  editor       = {Nigel Thomas and
                  Carlos Juiz},
  title        = {Evaluation of {P2P} Algorithms for Probabilistic Trust Inference in
                  a Web of Trust},
  booktitle    = {Computer Performance Engineering, 5th European Performance Engineering
                  Workshop, {EPEW} 2008, Palma de Mallorca, Spain, September 24-25,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5261},
  pages        = {242--256},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87412-6\_18},
  doi          = {10.1007/978-3-540-87412-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/epew/ZhangM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/AndreouM08,
  author       = {Marios S. Andreou and
                  Aad P. A. van Moorsel},
  editor       = {Herbert Bos and
                  Evangelos P. Markatos},
  title        = {Logging based {IP} Traceback in switched ethernets},
  booktitle    = {Proceedings of the First European Workshop on System Security, {EUROSEC}
                  2008, Glasgow, Scotland, UK, March 31, 2008},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1355284.1355286},
  doi          = {10.1145/1355284.1355286},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/AndreouM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/MachulakPM08,
  author       = {Maciej P. Machulak and
                  Simon E. Parkin and
                  Aad P. A. van Moorsel},
  editor       = {Rog{\'{e}}rio de Lemos and
                  Jean{-}Charles Fabre and
                  Cristina Gacek and
                  Fabio Gadducci and
                  Maurice H. ter Beek},
  title        = {Architecting Dependable Access Control Systems for Multi-domain Computing
                  Environments},
  booktitle    = {Architecting Dependable Systems {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5835},
  pages        = {49--75},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10248-6\_3},
  doi          = {10.1007/978-3-642-10248-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/MachulakPM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isas/ParkinKM08,
  author       = {Simon Edward Parkin and
                  Rouaa Yassin Kassab and
                  Aad P. A. van Moorsel},
  editor       = {Takashi Nanya and
                  Fumihiro Maruyama and
                  Andr{\'{a}}s Pataricza and
                  Miroslaw Malek},
  title        = {The Impact of Unavailability on the Effectiveness of Enterprise Information
                  Security Technologies},
  booktitle    = {Service Availability, 5th International Service Availability Symposium,
                  {ISAS} 2008, Tokyo, Japan, May 19-21, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5017},
  pages        = {43--58},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68129-8\_6},
  doi          = {10.1007/978-3-540-68129-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/isas/ParkinKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isorc/MartinMM08,
  author       = {Dan Martin and
                  Aad P. A. van Moorsel and
                  Graham Morgan},
  title        = {Efficient Resource Management for Game Server Hosting},
  booktitle    = {11th {IEEE} International Symposium on Object-Oriented Real-Time Distributed
                  Computing {(ISORC} 2008), 5-7 May 2008, Orlando, Florida, {USA}},
  pages        = {593--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISORC.2008.12},
  doi          = {10.1109/ISORC.2008.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isorc/MartinMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/LamprechtM08,
  author       = {Christiaan J. Lamprecht and
                  Aad P. A. van Moorsel},
  title        = {Runtime Security Adaptation Using Adaptive {SSL}},
  booktitle    = {14th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2008, 15-17 December 2008, Taipei, Taiwan},
  pages        = {305--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PRDC.2008.27},
  doi          = {10.1109/PRDC.2008.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/LamprechtM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/Moorsel08,
  author       = {Aad P. A. van Moorsel},
  editor       = {Michael D. Harrison and
                  Mark{-}Alexander Sujan},
  title        = {Panel: Complexity and Resilience},
  booktitle    = {Computer Safety, Reliability, and Security, 27th International Conference,
                  {SAFECOMP} 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5219},
  pages        = {13--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87698-4\_4},
  doi          = {10.1007/978-3-540-87698-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/Moorsel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/TosicGMW07,
  author       = {Vladimir Tosic and
                  Karl M. G{\"{o}}schka and
                  Aad P. A. van Moorsel and
                  Raymond K. Wong},
  title        = {Introduction to the Proceedings of the {EDOC} 2007 Workshop Middleware
                  for Web Services {(MWS)} 2007},
  booktitle    = {Workshops Proceedings of the 11th International {IEEE} Enterprise
                  Distributed Object Computing Conference, {ECOCW} 2007, 15-16 October
                  2007, Annapolis, Maryland, {USA}},
  pages        = {69--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/EDOCW.2007.15},
  doi          = {10.1109/EDOCW.2007.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/TosicGMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epew/MelloMF07,
  author       = {Emerson Ribeiro de Mello and
                  Aad P. A. van Moorsel and
                  Joni da Silva Fraga},
  editor       = {Katinka Wolter},
  title        = {Evaluation of {P2P} Search Algorithms for Discovering Trust Paths},
  booktitle    = {Formal Methods and Stochastic Models for Performance Evaluation, Fourth
                  European Performance Engineering Workshop, {EPEW} 2007, Berlin, Germany,
                  September 27-28, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4748},
  pages        = {112--124},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75211-0\_9},
  doi          = {10.1007/978-3-540-75211-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/epew/MelloMF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/FelberPM07,
  author       = {Pascal Felber and
                  Calton Pu and
                  Aad P. A. van Moorsel},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {{DOA} 2007 {PC} Co-chairs' Message},
  booktitle    = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE,
                  GADA, and IS, {OTM} Confederated International Conferences CoopIS,
                  DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30,
                  2007, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4803},
  pages        = {437},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76848-7\_31},
  doi          = {10.1007/978-3-540-76848-7\_31},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/FelberPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saso/LamprechtM07,
  author       = {Christiaan J. Lamprecht and
                  Aad P. A. van Moorsel},
  title        = {Adaptive {SSL:} Design, Implementation and Overhead Analysis},
  booktitle    = {Proceedings of the First International Conference on Self-Adaptive
                  and Self-Organizing Systems, {SASO} 2007, Boston, MA, USA, July 9-11,
                  2007},
  pages        = {289--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SASO.2007.6},
  doi          = {10.1109/SASO.2007.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saso/LamprechtM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isas/2007,
  editor       = {Miroslaw Malek and
                  Manfred Reitenspie{\ss} and
                  Aad P. A. van Moorsel},
  title        = {Service Availability, 4th International Service Availability Symposium,
                  {ISAS} 2007, Durham, NH, USA, May 21-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4526},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72736-1},
  doi          = {10.1007/978-3-540-72736-1},
  isbn         = {978-3-540-72735-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isas/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/MoorselW06,
  author       = {Aad P. A. van Moorsel and
                  Katinka Wolter},
  title        = {Analysis of Restart Mechanisms in Software Systems},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {32},
  number       = {8},
  pages        = {547--558},
  year         = {2006},
  url          = {https://doi.org/10.1109/TSE.2006.73},
  doi          = {10.1109/TSE.2006.73},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/MoorselW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/MelloPRSMW06,
  author       = {Emerson Ribeiro de Mello and
                  Savas Parastatidis and
                  Philipp Reinecke and
                  Chris Smith and
                  Aad P. A. van Moorsel and
                  Jim Webber},
  title        = {Secure and Provable Service Support for Human-Intensive Real-Estate
                  Processes},
  booktitle    = {2006 {IEEE} International Conference on Services Computing {(SCC}
                  2006), 18-22 September 2006, Chicago, Illinois, {USA}},
  pages        = {495--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SCC.2006.84},
  doi          = {10.1109/SCC.2006.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/MelloPRSMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/TosicMW06,
  author       = {Vladimir Tosic and
                  Aad P. A. van Moorsel and
                  Raymond K. Wong},
  title        = {Introduction to the Proceedings of the {EDOC} 2006 Workshop Middleware
                  for Web Services {(MWS)} 2006},
  booktitle    = {Tenth {IEEE} International Enterprise Distributed Object Computing
                  Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China, Workshops},
  pages        = {7},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/EDOCW.2006.44},
  doi          = {10.1109/EDOCW.2006.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/TosicMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epew/ReineckeMW06,
  author       = {Philipp Reinecke and
                  Aad P. A. van Moorsel and
                  Katinka Wolter},
  editor       = {Andr{\'{a}}s Horv{\'{a}}th and
                  Mikl{\'{o}}s Telek},
  title        = {Experimental Analysis of the Correlation of {HTTP} {GET} Invocations},
  booktitle    = {Formal Methods and Stochastic Models for Performance Evaluation, Third
                  European Performance Engineering Workshop, {EPEW} 2006, Budapest,
                  Hungary, June 21-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4054},
  pages        = {226--237},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11777830\_16},
  doi          = {10.1007/11777830\_16},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/epew/ReineckeMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/ReineckeMW06,
  author       = {Philipp Reinecke and
                  Aad P. A. van Moorsel and
                  Katinka Wolter},
  title        = {The Fast and the Fair: {A} Fault-Injection-Driven Comparison of Restart
                  Oracles for Reliable Web Services},
  booktitle    = {Third International Conference on the Quantitative Evaluation of Systems
                  {(QEST} 2006), 11-14 September 2006, Riverside, California, {USA}},
  pages        = {375--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/QEST.2006.50},
  doi          = {10.1109/QEST.2006.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/ReineckeMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Moorsel05,
  author       = {Aad P. A. van Moorsel},
  title        = {Grid, Management and Self-Management},
  journal      = {Comput. J.},
  volume       = {48},
  number       = {3},
  pages        = {325--332},
  year         = {2005},
  url          = {https://doi.org/10.1093/comjnl/bxh092},
  doi          = {10.1093/COMJNL/BXH092},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Moorsel05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bertinoro/BabaogluJMFLM05,
  author       = {{\"{O}}zalp Babaoglu and
                  M{\'{a}}rk Jelasity and
                  Alberto Montresor and
                  Christof Fetzer and
                  Stefano Leonardi and
                  Aad P. A. van Moorsel},
  editor       = {{\"{O}}zalp Babaoglu and
                  M{\'{a}}rk Jelasity and
                  Alberto Montresor and
                  Christof Fetzer and
                  Stefano Leonardi and
                  Aad P. A. van Moorsel and
                  Maarten van Steen},
  title        = {The Self-Star Vision},
  booktitle    = {Self-star Properties in Complex Information Systems, Conceptual and
                  Practical Foundations [the book is a result from a workshop at Bertinoro,
                  Italy, Summer 2004]},
  series       = {Lecture Notes in Computer Science},
  volume       = {3460},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11428589\_1},
  doi          = {10.1007/11428589\_1},
  timestamp    = {Tue, 27 Dec 2022 09:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/bertinoro/BabaogluJMFLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isas/Moorsel05,
  author       = {Aad P. A. van Moorsel},
  editor       = {Miroslaw Malek and
                  Edgar Nett and
                  Neeraj Suri},
  title        = {On Best-Effort and Dependability, Service-Orientation and Panacea},
  booktitle    = {Service Availability, Second International Service Availability Symposium,
                  {ISAS} 2005, Berlin, Germany, April 25-26, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3694},
  pages        = {99--101},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560333\_8},
  doi          = {10.1007/11560333\_8},
  timestamp    = {Sun, 25 Oct 2020 23:17:44 +0100},
  biburl       = {https://dblp.org/rec/conf/isas/Moorsel05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bertinoro/2005,
  editor       = {{\"{O}}zalp Babaoglu and
                  M{\'{a}}rk Jelasity and
                  Alberto Montresor and
                  Christof Fetzer and
                  Stefano Leonardi and
                  Aad P. A. van Moorsel and
                  Maarten van Steen},
  title        = {Self-star Properties in Complex Information Systems, Conceptual and
                  Practical Foundations [the book is a result from a workshop at Bertinoro,
                  Italy, Summer 2004]},
  series       = {Lecture Notes in Computer Science},
  volume       = {3460},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b136551},
  doi          = {10.1007/B136551},
  isbn         = {3-540-26009-9},
  timestamp    = {Tue, 27 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bertinoro/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/MoorselW04,
  author       = {Aad P. A. van Moorsel and
                  Katinka Wolter},
  title        = {Optimal restart times for moments of completion time},
  journal      = {{IEE} Proc. Softw.},
  volume       = {151},
  number       = {5},
  pages        = {219--223},
  year         = {2004},
  url          = {https://doi.org/10.1049/ip-sen:20041090},
  doi          = {10.1049/IP-SEN:20041090},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iee/MoorselW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Molina-JimenezPM04,
  author       = {Carlos Molina{-}Jim{\'{e}}nez and
                  Jim Pruyne and
                  Aad P. A. van Moorsel},
  editor       = {Rog{\'{e}}rio de Lemos and
                  Cristina Gacek and
                  Alexander B. Romanovsky},
  title        = {The Role of Agreements in {IT} Management Software},
  booktitle    = {Architecting Dependable Systems {III} [the book is a result of the
                  {ICSE} 2004 and {DSN} 2004 workshops]},
  series       = {Lecture Notes in Computer Science},
  volume       = {3549},
  pages        = {36--58},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11556169\_2},
  doi          = {10.1007/11556169\_2},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/Molina-JimenezPM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isas/ReineckeMW04,
  author       = {Philipp Reinecke and
                  Aad P. A. van Moorsel and
                  Katinka Wolter},
  editor       = {Miroslaw Malek and
                  Manfred Reitenspie{\ss} and
                  J{\"{o}}rg Kaiser},
  title        = {A Measurement Study of the Interplay Between Application Level Restart
                  and Transport Protocol},
  booktitle    = {Service Availability, First International Service Availability Symposium,
                  {ISAS} 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3335},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30225-4\_7},
  doi          = {10.1007/978-3-540-30225-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/isas/ReineckeMW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmb/MoorselW04,
  author       = {Aad P. A. van Moorsel and
                  Katinka Wolter},
  editor       = {Peter Buchholz and
                  Ralf Lehnert and
                  Michal Pi{\'{o}}ro},
  title        = {Meeting Deadlines through Restart},
  booktitle    = {{MMB} {\&} {PGTS} 2004, 12th {GI/ITG} Conference on Measuring
                  and Evaluation of Computer and Communication Systems {(MMB)} together
                  with 3rd Polish-German Teletraffic Symposium (PGTS), September 12-15,
                  2004, Dresden, Germany},
  pages        = {155--160},
  publisher    = {{VDE} Verlag},
  year         = {2004},
  timestamp    = {Tue, 25 Sep 2018 18:26:26 +0200},
  biburl       = {https://dblp.org/rec/conf/mmb/MoorselW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/MoorselW04,
  author       = {Aad P. A. van Moorsel and
                  Katinka Wolter},
  title        = {Analysis and Algorithms for Restart},
  booktitle    = {1st International Conference on Quantitative Evaluation of Systems
                  {(QEST} 2004), 27-30 September 2004, Enschede, The Netherlands},
  pages        = {195--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/QEST.2004.1348034},
  doi          = {10.1109/QEST.2004.1348034},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/MoorselW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/SahaiGMM03,
  author       = {Akhil Sahai and
                  Sven Graupner and
                  Vijay Machiraju and
                  Aad P. A. van Moorsel},
  title        = {Specifying and Monitoring Guarantees in Commercial Grids through {SLA}},
  booktitle    = {3rd {IEEE} International Symposium on Cluster Computing and the Grid
                  (CCGrid 2003), 12-15 May 2003, Tokyo, Japan},
  pages        = {292--299},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CCGRID.2003.1199380},
  doi          = {10.1109/CCGRID.2003.1199380},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/SahaiGMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SpainhowerM03,
  author       = {Lisa Spainhower and
                  Aad P. A. van Moorsel},
  title        = {First Workshop on the Design of Self-Managing Systems},
  booktitle    = {2003 International Conference on Dependable Systems and Networks {(DSN}
                  2003), 22-25 June 2003, San Francisco, CA, USA, Proceedings},
  pages        = {765},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.ieeecomputersociety.org/10.1109/DSN.2003.10000},
  doi          = {10.1109/DSN.2003.10000},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SpainhowerM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsom/GraupnerMSM03,
  author       = {Sven Graupner and
                  Vijay Machiraju and
                  Akhil Sahai and
                  Aad P. A. van Moorsel},
  editor       = {Marcus Brunner and
                  Alexander Keller},
  title        = {Management +=Grid},
  booktitle    = {Self-Managing Distributed Systems, 14th {IFIP/IEEE} International
                  Workshop on Distributed Systems: Operations and Management, {DSOM}
                  2003, Heidelberg, Germany, October 20-22, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2867},
  pages        = {194--196},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39671-0\_17},
  doi          = {10.1007/978-3-540-39671-0\_17},
  timestamp    = {Tue, 20 Aug 2019 14:59:26 +0200},
  biburl       = {https://dblp.org/rec/conf/dsom/GraupnerMSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/MachirajuSM03,
  author       = {Vijay Machiraju and
                  Akhil Sahai and
                  Aad P. A. van Moorsel},
  editor       = {Germ{\'{a}}n S. Goldszmidt and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title        = {Web Services Management Network: An Overlay Network for Federated
                  Service Management},
  booktitle    = {Integrated Network Management VII, Managing It All, {IFIP/IEEE} Eighth
                  International Symposium on Integrated Network Management {(IM} 2003),
                  March 24-28, 2003, Colorado Springs, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {246},
  pages        = {351--364},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Mon, 24 Mar 2003 13:34:13 +0100},
  biburl       = {https://dblp.org/rec/conf/im/MachirajuSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ladc/MachirajuSM03,
  author       = {Vijay Machiraju and
                  Akhil Sahai and
                  Aad P. A. van Moorsel},
  editor       = {Rog{\'{e}}rio de Lemos and
                  Taisy Silva Weber and
                  Jo{\~{a}}o Batista Camargo Jr.},
  title        = {Managed Utility Computing: The Grid as Management Backplane},
  booktitle    = {Dependable Computing, First Latin-American Symposium, {LADC} 2003,
                  Sao Paulo, Brazil, October 21-24, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2847},
  pages        = {4--7},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45214-0\_3},
  doi          = {10.1007/978-3-540-45214-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ladc/MachirajuSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/Moorsel03,
  author       = {Aad P. A. van Moorsel},
  title        = {Managed Utility Computing},
  booktitle    = {4th International Conference on Web Information Systems Engineering,
                  {WISE} 2003, Rome, Italy, December 10-12, 2003},
  pages        = {277},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.ieeecomputersociety.org/10.1109/WISE.2003.10000},
  doi          = {10.1109/WISE.2003.10000},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wise/Moorsel03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/LyuRM02,
  author       = {Michael R. Lyu and
                  Sampath Rangarajan and
                  Aad P. A. van Moorsel},
  title        = {Optimal allocation of test resources for software reliability growth
                  modeling in software development},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {51},
  number       = {2},
  pages        = {183--192},
  year         = {2002},
  url          = {https://doi.org/10.1109/TR.2002.1011524},
  doi          = {10.1109/TR.2002.1011524},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/LyuRM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsom/SahaiMSMC02,
  author       = {Akhil Sahai and
                  Vijay Machiraju and
                  Mehmet Sayal and
                  Aad P. A. van Moorsel and
                  Fabio Casati},
  editor       = {Metin Feridun and
                  Peter G. Kropf and
                  Gilbert Babin},
  title        = {Automated {SLA} Monitoring for Web Services},
  booktitle    = {Management Technologies for E-Commerce and E-Business Applications,
                  13th {IFIP/IEEE} International Workshop on Distributed Systems: Operations
                  and Management, {DSOM} 2002, Montreal, Canada, October 21-23, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2506},
  pages        = {28--41},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36110-3\_6},
  doi          = {10.1007/3-540-36110-3\_6},
  timestamp    = {Sun, 02 Oct 2022 15:59:19 +0200},
  biburl       = {https://dblp.org/rec/conf/dsom/SahaiMSMC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wes/Moorsel02,
  author       = {Aad P. A. van Moorsel},
  editor       = {Christoph Bussler and
                  Richard Hull and
                  Sheila A. McIlraith and
                  Maria E. Orlowska and
                  Barbara Pernici and
                  Jian Yang},
  title        = {Ten-Step Survival Guide for the Emerging Business Web},
  booktitle    = {Web Services, E-Business, and the Semantic Web, CAiSE 2002 International
                  Workshop, {WES} 2002, Toronto, Canada, May 27-28, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2512},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36189-8\_1},
  doi          = {10.1007/3-540-36189-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/wes/Moorsel02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/Moorsel99,
  author       = {Aad P. A. van Moorsel},
  title        = {The 'QoS Query Service' for Improved Quality-of-Service Decision Making
                  in {CORBA}},
  booktitle    = {The Eighteenth Symposium on Reliable Distributed Systems, {SRDS} 1999,
                  Lausanne, Switzerland, October 19-22, 1999, Proceedings},
  pages        = {274--285},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/RELDIS.1999.805103},
  doi          = {10.1109/RELDIS.1999.805103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/Moorsel99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpe/MoorselH98,
  author       = {Aad P. A. van Moorsel and
                  Yiqing Huang},
  editor       = {Ram{\'{o}}n Puigjaner and
                  Nunzio N. Savino and
                  Bartomeu Serra},
  title        = {Reusable Software Components for Performability Tools and Their Utilization
                  for Web-Based Configurable Tools},
  booktitle    = {Computer Performance Evaluation: Modelling Techniques and Tools, 10th
                  International Conference, Tools '98, Palma de Mallorca, Spain, September
                  14-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1469},
  pages        = {37--50},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68061-6\_4},
  doi          = {10.1007/3-540-68061-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cpe/MoorselH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esm/MoorselW98,
  author       = {Aad P. A. van Moorsel and
                  Katinka Wolter},
  editor       = {Richard N. Zobel and
                  Dietmar P. F. M{\"{o}}ller},
  title        = {Numerical Solution of Non-Homogeneous Markov Processes through Uniformization},
  booktitle    = {12\({}^{\mbox{th}}\) European Simulation Multiconference - Simulation
                  - Past, Present and Future, June 16-19, 1998, Machester, United Kingdom},
  pages        = {710--717},
  publisher    = {{SCS} Europe},
  year         = {1998},
  timestamp    = {Tue, 14 Jan 2003 13:43:29 +0100},
  biburl       = {https://dblp.org/rec/conf/esm/MoorselW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/GargMVT98,
  author       = {Sachin Garg and
                  Aad P. A. van Moorsel and
                  Kalyanaraman Vaidyanathan and
                  Kishor S. Trivedi},
  title        = {A methodology for detection and estimation of software aging},
  booktitle    = {Ninth International Symposium on Software Reliability Engineering,
                  {ISSRE} 1998, Paderborn, Germany, November 4-7, 1998},
  pages        = {283--292},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ISSRE.1998.730892},
  doi          = {10.1109/ISSRE.1998.730892},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/GargMVT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/LyuRM97,
  author       = {Michael R. Lyu and
                  Sampath Rangarajan and
                  Aad P. A. van Moorsel},
  title        = {Optimization of reliability allocation and testing schedule for software
                  systems},
  booktitle    = {Eighth International Symposium on Software Reliability Engineering,
                  {ISSRE} 1997, Albuquerque, NM, USA, November 2-5, 1997},
  pages        = {336--347},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ISSRE.1997.630881},
  doi          = {10.1109/ISSRE.1997.630881},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/LyuRM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/QureshiSMG96,
  author       = {Muhammad A. Qureshi and
                  William H. Sanders and
                  Aad P. A. van Moorsel and
                  Reinhard German},
  title        = {Algorithms for the Generation of State-Level Representations of Stochastic
                  Activity Networks with General Reward Structures},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {22},
  number       = {9},
  pages        = {603--614},
  year         = {1996},
  url          = {https://doi.org/10.1109/32.541432},
  doi          = {10.1109/32.541432},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/QureshiSMG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/anss/MoorselKS96,
  author       = {Aad P. A. van Moorsel and
                  Latha A. Kant and
                  William H. Sanders},
  title        = {Computation of the Asymptotic Bias and Variance for Simulation of
                  Markov Reward Models},
  booktitle    = {Proceedings 29st Annual Simulation Symposium {(SS} '96), April 8-11,
                  1996, New Orleans, LA, {USA}},
  pages        = {173--182},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SIMSYM.1996.492165},
  doi          = {10.1109/SIMSYM.1996.492165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/anss/MoorselKS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apn/GermanMQS96,
  author       = {Reinhard German and
                  Aad P. A. van Moorsel and
                  Muhammad A. Qureshi and
                  William H. Sanders},
  editor       = {Jonathan Billington and
                  Wolfgang Reisig},
  title        = {Expected Impulsive Rewards in Markov Regenerative Stochastic Petri
                  Nets},
  booktitle    = {Application and Theory of Petri Nets 1996, 17th International Conference,
                  Osaka, Japan, June 24-28, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1091},
  pages        = {172--191},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61363-3\_10},
  doi          = {10.1007/3-540-61363-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/apn/GermanMQS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pnpm/QureshiSMG95,
  author       = {Muhammad A. Qureshi and
                  William H. Sanders and
                  Aad P. A. van Moorsel and
                  Reinhard German},
  title        = {Algorithms for the generation of state-level representations of stochastic
                  activity networks with general reward structures},
  booktitle    = {Proceedings of the Sixth International Workshop on Petri Nets and
                  Performance Models, {PNPM} 1995, Durham, NC, USA, October 3-6, 1995},
  pages        = {180--190},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/PNPM.1995.524328},
  doi          = {10.1109/PNPM.1995.524328},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pnpm/QureshiSMG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pnpm/HaverkortM95,
  author       = {Boudewijn R. Haverkort and
                  Aad P. A. van Moorsel},
  title        = {Using the probabilistic evaluation tool for the analytical solution
                  of large Markov models},
  booktitle    = {Proceedings of the Sixth International Workshop on Petri Nets and
                  Performance Models, {PNPM} 1995, Durham, NC, USA, October 3-6, 1995},
  pages        = {206--207},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/PNPM.1995.524331},
  doi          = {10.1109/PNPM.1995.524331},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pnpm/HaverkortM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pnpm/DeavoursOQSM95,
  author       = {Daniel D. Deavours and
                  W. Douglas Obal II and
                  Muhammad A. Qureshi and
                  William H. Sanders and
                  Aad P. A. van Moorsel},
  title        = {UltraSAN version 3 overview},
  booktitle    = {Proceedings of the Sixth International Workshop on Petri Nets and
                  Performance Models, {PNPM} 1995, Durham, NC, USA, October 3-6, 1995},
  pages        = {216--217},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/PNPM.1995.524336},
  doi          = {10.1109/PNPM.1995.524336},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pnpm/DeavoursOQSM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/HaverkortMS94,
  author       = {Boudewijn R. Haverkort and
                  Aad P. A. van Moorsel and
                  Dirk{-}Jan Speelman},
  editor       = {Vijay K. Madisetti and
                  Erol Gelenbe and
                  Jean C. Walrand},
  title        = {Xmgm: Performance Modeling Using Matrix Geometric Techniques},
  booktitle    = {{MASCOTS} '94, Proceedings of the Second International Workshop on
                  Modeling, Analysis, and Simulation On Computer and Telecommunication
                  Systems, January 31 - February 2, 1994, Durham, North Carolina, {USA}},
  pages        = {152--157},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/MASCOT.1994.284430},
  doi          = {10.1109/MASCOT.1994.284430},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/HaverkortMS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:books/daglib/0096028,
  author       = {Aad P. A. van Moorsel},
  title        = {Performability evaluation concepts and techniques},
  school       = {University Twente},
  year         = {1993},
  timestamp    = {Wed, 23 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0096028.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/MoorselHN92,
  author       = {Aad P. A. van Moorsel and
                  Boudewijn R. Haverkort and
                  Ignas G. Niemegeers},
  title        = {A Method for Analysing the Performance Aspects of the Fault-Tolerance
                  Mechanisms in {FDDI}},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '92, The Conference on Computer Communications,
                  Eleventh Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, One World through Communications, Florence, Italy, May
                  4-8, 1992},
  pages        = {372--381},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/INFCOM.1992.263577},
  doi          = {10.1109/INFCOM.1992.263577},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/MoorselHN92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics