2024 export record
dblp key:
journals/ijccbs/CamargoD24 share record
persistent URL:
Edson Tavares de Camargo , Elias P. Duarte Jr. : Algorithm-based fault-tolerant parallel sorting. Int. J. Crit. Comput. Based Syst. 11 (1/2 ) : 2-29 (2024 )export record
dblp key:
journals/ijccbs/DasDRVTC24 share record
persistent URL:
Prasenjit Das , Debabrata Datta , S. Suman Rajest , L. Maria Michael Visuwasam , Anuradha Thakare , J. Cypto : Application of multi-criteria decision-making approach using TOPSIS to identify the vulnerable time zone of earthquake time series signal. Int. J. Crit. Comput. Based Syst. 11 (1/2 ) : 30-47 (2024 )export record
dblp key:
journals/ijccbs/MouhtadiBMMO24 share record
persistent URL:
Walid El Mouhtadi , Mohamed El Bakkali , Yassine Maleh , Soufyane Mounir , Karim Ouazzane : Refining malware detection with enhanced machine learning algorithms using hyperparameter tuning. Int. J. Crit. Comput. Based Syst. 11 (1/2 ) : 48-67 (2024 )export record
dblp key:
journals/ijccbs/SethuramanMGSCK24 share record
persistent URL:
Sibi Chakkaravarthy Sethuraman , Aditya Mitra , Anisha Ghosh , Rishita Shaw , Aswani Kumar Cherukuri , Firuz Kamalov : Conceptual design and implementation of FIDO2 compatible smart medical card for healthcare information system. Int. J. Crit. Comput. Based Syst. 11 (1/2 ) : 68-90 (2024 )share record
persistent URL:
Jeferson L. R. Souza , Frank Siqueira : Using the theorem of inaccessibility to assess dependable real-time networks. Int. J. Crit. Comput. Based Syst. 11 (1/2 ) : 91-114 (2024 )export record
dblp key:
journals/ijccbs/VenancioD24 share record
persistent URL:
Giovanni Venâncio , Elias Procópio Duarte Jr. : Highly available virtual network functions and services based on checkpointing/restore. Int. J. Crit. Comput. Based Syst. 11 (1/2 ) : 115-142 (2024 )2023 export record
dblp key:
journals/ijccbs/ColacoNRP23 share record
persistent URL:
Louella Colaco , Arun S. Nair , Biju K. Raveendran , Sasikumar Punnekkat : Task models for mixed criticality systems - a review. Int. J. Crit. Comput. Based Syst. 10 (4 ) : 287-329 (2023 )export record
dblp key:
journals/ijccbs/GowthamiP23 share record
persistent URL:
G. Gowthami , S. Silvia Priscila : Tuna swarm optimisation-based feature selection and deep multimodal-sequential-hierarchical progressive network for network intrusion detection approach. Int. J. Crit. Comput. Based Syst. 10 (4 ) : 355-374 (2023 )export record
dblp key:
journals/ijccbs/PanthiD23 share record
persistent URL:
Manikant Panthi , Tanmoy Kanti Das : Detection of cyber-attacks for sensor measurement data using supervised machine learning models for modern power grid system. Int. J. Crit. Comput. Based Syst. 10 (4 ) : 330-354 (2023 )share record
persistent URL:
Manish Rai , Sachin Goyal , Mahesh Kumar Pawar : An enhanced digital image watermarking technique using DWT-HD-SVD and deep convolutional neural network. Int. J. Crit. Comput. Based Syst. 10 (4 ) : 269-286 (2023 )2022 export record
dblp key:
journals/ijccbs/BatteuxPR22 share record
persistent URL:
Michel Batteux , Tatiana Prosvirnova , Antoine B. Rauzy : Abstract executions of stochastic discrete event systems. Int. J. Crit. Comput. Based Syst. 10 (3 ) : 202-226 (2022 )export record
dblp key:
journals/ijccbs/GokhaleSDSP22 share record
persistent URL:
Sheetal Gokhale , Irfan A. Siddavatam , Ashwini Dalvi , Mohammed Shaikh , Suchitra Patil : Formal modelling and verification of high interactive honeypot using coloured Petri nets. Int. J. Crit. Comput. Based Syst. 10 (3 ) : 227-247 (2022 )export record
dblp key:
journals/ijccbs/KumarKC22 share record
persistent URL:
Kakelli Anil Kumar , Kaustubh Kumar , Nag Lohith Chiluka : Deep learning models for multi-class malware classification using Windows exe API calls. Int. J. Crit. Comput. Based Syst. 10 (3 ) : 185-201 (2022 )export record
dblp key:
journals/ijccbs/ShekarGF22 share record
persistent URL:
Mohith C. Shekar , Harinahalli Lokesh Gururaj , Francesco Flammini : Securing personal identity using blockchain. Int. J. Crit. Comput. Based Syst. 10 (3 ) : 248-267 (2022 )2021 export record
dblp key:
journals/ijccbs/BoucheritCHK21 share record
persistent URL:
Ammar Boucherit , Laura M. Castro , Osman Hasan , Abdallah Khababa : Towards a hybrid formal analysis technique for safety-critical software architectures. Int. J. Crit. Comput. Based Syst. 10 (2 ) : 95-119 (2021 )export record
dblp key:
journals/ijccbs/ChabaneAM21 share record
persistent URL:
Sarah Chabane , Rabéa Ameur-Boulifa , Mezghiche Mohamed : Towards compositional verification of synchronous reactive systems. Int. J. Crit. Comput. Based Syst. 10 (2 ) : 120-142 (2021 )export record
dblp key:
journals/ijccbs/ChehidaLBV21 share record
persistent URL:
Salim Chehida , Yves Ledru , Yoann Blein , Germán Vega : An SMT-based approach for generating trace examples and counter-examples of parametric properties. Int. J. Crit. Comput. Based Syst. 10 (2 ) : 143-183 (2021 )2020 export record
dblp key:
journals/ijccbs/KhaireddineAJZM20 share record
persistent URL:
Besma Khaireddine , Marwa Ben AbdelAli , Lamia Labed Jilani , Aleksandr Zakharchenko , Ali Mili : Correctness enhancement: a pervasive software engineering paradigm. Int. J. Crit. Comput. Based Syst. 10 (1 ) : 37-73 (2020 )export record
dblp key:
journals/ijccbs/OlszewskaSEW20 share record
persistent URL:
Marta Olszewska , Fatima Shokri-Manninen , Andrew Edmunds , Marina Waldén : Applying guidelines for system modelling in Event-B - a systematic literature review. Int. J. Crit. Comput. Based Syst. 10 (1 ) : 1-36 (2020 )export record
dblp key:
journals/ijccbs/TortorelliFGSGP20 share record
persistent URL:
Andrea Tortorelli , Andrea Fiaschetti , Alessandro Giuseppi , Vincenzo Suraci , Roberto Germanà , Francesco Delli Priscoli : A security metric for assessing the security level of critical infrastructures. Int. J. Crit. Comput. Based Syst. 10 (1 ) : 74-94 (2020 )2019 export record
dblp key:
journals/ijccbs/BassoSM19 share record
persistent URL:
Tânia Basso , Hebert de Oliveira Silva , Regina Moraes : Extending a re-identification risk-based anonymisation framework and evaluating its impact on data mining classifiers. Int. J. Crit. Comput. Based Syst. 9 (4 ) : 348-378 (2019 )export record
dblp key:
journals/ijccbs/BatteuxPR19 share record
persistent URL:
Michel Batteux , Tatiana Prosvirnova , Antoine Rauzy : AltaRica 3.0 in ten modelling patterns. Int. J. Crit. Comput. Based Syst. 9 (1/2 ) : 133-165 (2019 )export record
dblp key:
journals/ijccbs/BejiHMG19 share record
persistent URL:
Sofiene Beji , Sardaouna Hamadou , John Mullins , Abdelouahed Gherbi : Iterative integration of TTEthernet network flows. Int. J. Crit. Comput. Based Syst. 9 (3 ) : 167-192 (2019 )export record
dblp key:
journals/ijccbs/BreuerB19 share record
persistent URL:
Peter T. Breuer , Jonathan P. Bowen : Fully encrypted high-speed microprocessor architecture: the secret computer in simulation. Int. J. Crit. Comput. Based Syst. 9 (1/2 ) : 26-55 (2019 )export record
dblp key:
journals/ijccbs/CerveiraFBM19 share record
persistent URL:
Frederico Cerveira , Alcides Fonseca , Raul Barbosa , Henrique Madeira : Soft error sensitivity and vulnerability of languages and their implementations. Int. J. Crit. Comput. Based Syst. 9 (4 ) : 318-347 (2019 )export record
dblp key:
journals/ijccbs/CoppolinoDMRS19 share record
persistent URL:
Luigi Coppolino , Salvatore D'Antonio , Giovanni Mazzeo , Luigi Romano , Luigi Sgaglione : Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain. Int. J. Crit. Comput. Based Syst. 9 (4 ) : 293-317 (2019 )export record
dblp key:
journals/ijccbs/EscheikhTB19 share record
persistent URL:
Mohamed Escheikh , Zayneb Tayachi , Kamel Barkaoui : Performability modelling and analysis of server virtualised systems subject to workload-dependent software aging. Int. J. Crit. Comput. Based Syst. 9 (3 ) : 248-292 (2019 )export record
dblp key:
journals/ijccbs/GentileS19 share record
persistent URL:
Ugo Gentile , Luigi Serio : Survey on international standards and best practices for patch management of complex industrial control systems: the critical infrastructure of particle accelerators case study. Int. J. Crit. Comput. Based Syst. 9 (1/2 ) : 115-132 (2019 )export record
dblp key:
journals/ijccbs/HocineBB19 share record
persistent URL:
Hocine Souilah , Abderrahmane Baadache , Louiza Bouallouche-Medjkoune : A challenge-based countermeasure against the spoofed PS-Poll-based DoS attack in IEEE 802.11 networks. Int. J. Crit. Comput. Based Syst. 9 (3 ) : 193-214 (2019 )export record
dblp key:
journals/ijccbs/HowardBCS19 share record
persistent URL:
Giles Howard , Michael J. Butler , John Colley , Vladimiro Sassone : A methodology for assuring the safety and security of critical infrastructure based on STPA and Event-B. Int. J. Crit. Comput. Based Syst. 9 (1/2 ) : 56-75 (2019 )