default search action
Adrian Baldwin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c22]Jakub Pruzinec, Quynh Anh Nguyen, Adrian Baldwin, Jonathan Griffin, Yang Liu:
KUBO: a framework for automated efficacy testing of anti-virus behavioral detection with procedure-based malware emulation. A-TEST@ESEC/SIGSOFT FSE 2022: 37-44 - 2021
- [c21]Adrian Baldwin, Tristan Caulfield, Marius-Constantin Ilau, David J. Pym:
Modelling Organizational Recovery. SimuTools 2021: 284-314 - 2020
- [i1]Jakub Breier, Adrian Baldwin, Helen Balinsky, Yang Liu:
Risk Management Framework for Machine Learning Security. CoRR abs/2012.04884 (2020)
2010 – 2019
- 2018
- [c20]Giovanni Cherubin, Adrian Baldwin, Jonathan Griffin:
Exchangeability martingales for selecting features in anomaly detection. COPA 2018: 157-170 - 2017
- [j4]Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams:
Contagion in cyber security attacks. J. Oper. Res. Soc. 68(7): 780-791 (2017) - 2012
- [c19]Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams:
Contagion in Cybersecurity Attacks. WEIS 2012 - 2011
- [c18]Adrian Baldwin, David J. Pym, Martin Sadler, Simon Shiu:
Information Stewardship in Cloud Ecosystems: Towards Models, Economics, and Delivery. CloudCom 2011: 784-791 - [c17]Chew-Yean Yam, Adrian Baldwin, Simon Shiu, Christos Ioannidis:
Migration to Cloud as Real Option: Investment Decision under Uncertainty. TrustCom 2011: 940-949 - [c16]Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont, Hilary Johnson, Chris Middup, Simon Shiu:
Economic Methods and Decision Making by Security Professionals. WEIS (Springer Volume) 2011: 213-238 - [c15]Simon Shiu, Adrian Baldwin, Yolanta Beres, Marco Casassa Mont, Geoff Duggan:
Economic Methods and Decision Making by Security Professionals. WEIS 2011 - 2010
- [j3]Adrian Baldwin, Marco Casassa Mont, Yolanta Beres, Simon Shiu:
Assurance for federated identity management. J. Comput. Secur. 18(4): 541-572 (2010)
2000 – 2009
- 2009
- [j2]Adrian Baldwin, Chris Dalton, Simon Shiu, Krzysztof Kostienko, Qasim Rajpoot:
Providing secure services for a virtual infrastructure. ACM SIGOPS Oper. Syst. Rev. 43(1): 44-51 (2009) - [c14]Adrian Baldwin, Marco Casassa Mont, Simon Shiu:
Using Modelling and Simulation for Policy Decision Support in Identity Management. POLICY 2009: 17-24 - 2007
- [c13]Yolanta Beres, Adrian Baldwin, Simon Shiu:
Model-based assurance of security controls. QoP 2007: 55 - [c12]Yolanta Beres, Adrian Baldwin, Marco Casassa Mont, Simon Shiu:
On identity assurance in the presence of federated identity management systems. Digital Identity Management 2007: 27-35 - 2005
- [j1]Adrian Baldwin, Simon Shiu:
Enabling shared audit data. Int. J. Inf. Sec. 4(4): 263-276 (2005) - [c11]Adrian Baldwin, Yolanta Beres, David Plaquin, Simon Shiu:
Trust Record: High-Level Assurance and Compliance. iTrust 2005: 393-396 - 2004
- [c10]Adrian Baldwin:
Enhanced Accountability for Electronic Processes. iTrust 2004: 319-332 - 2003
- [c9]Ana Ferreira, Simon Shiu, Adrian Baldwin:
Towards Accountability for Electronic Patient Records. CBMS 2003: 189-194 - [c8]Adrian Baldwin, Simon Shiu:
Hardware Encapsulation of Security Services. ESORICS 2003: 201-216 - [c7]Adrian Baldwin, Simon Shiu:
Enabling Shared Audit Data. ISC 2003: 14-28 - [c6]Adrian Baldwin, Simon Shiu:
Hardware Security Appliances for Trust. iTrust 2003: 46-58 - 2002
- [c5]Marco Casassa Mont, Adrian Baldwin, Yolanta Beres, Keith Harrison, Martin Sadler, Simon Shiu:
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components. COMPSAC 2002: 271-278 - [c4]Adrian Baldwin, Simon Shiu, Marco Casassa Mont:
Trust Services: A Framework for Service-Based Solutions. COMPSAC 2002: 507-513 - [c3]Adrian Baldwin, Simon Shiu:
Encryption and Key management in a SAN. IEEE Security in Storage Workshop 2002: 35-44 - 2000
- [c2]Marco Casassa Mont, Adrian Baldwin, Cheh Goh:
POWER prototype: towards integrated policy-based management. NOMS 2000: 789-802
1990 – 1999
- 1998
- [c1]Cheh Goh, Adrian Baldwin:
Towards a More Complete Model of Role. ACM Workshop on Role-Based Access Control 1998: 55-62 - 1993
- [b1]Adrian Baldwin:
The role of connectionist representations in necessary inference for natural language processing. University of Exeter, Devon, UK, 1993
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint