default search action
Aad P. A. van Moorsel
Person information
- affiliation: University of Newcastle, School of Computing Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Maher Alharby, Ali Alssaiari, Saad Alateef, Nigel Thomas, Aad van Moorsel:
A quantitative analysis of the security of PoW-based blockchains. Clust. Comput. 27(10): 14113-14130 (2024) - [j25]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. Int. J. Inf. Sec. 23(2): 981-997 (2024) - 2023
- [c114]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. ESORICS Workshops (2) 2023: 569-584 - [c113]Karolis Zilius, Tasos Spiliotopoulos, Aad van Moorsel:
A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns. ICWSM 2023: 1112-1121 - [i19]Karolis Zilius, Tasos Spiliotopoulos, Aad van Moorsel:
A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns. CoRR abs/2301.06601 (2023) - [i18]Zilong Zhao, Han Wu, Aad van Moorsel, Lydia Y. Chen:
GTV: Generating Tabular Data via Vertical Federated Learning. CoRR abs/2302.01706 (2023) - [i17]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. CoRR abs/2309.06061 (2023) - 2022
- [j24]Maher Alharby, Aad van Moorsel:
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study. Int. J. Netw. Manag. 32(2) (2022) - [c112]Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel:
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy. ISSRE 2022: 193-204 - [c111]Han Wu, Holland Qian, Huaming Wu, Aad van Moorsel:
LDRNet: Enabling Real-Time Document Localization on Mobile Devices. PKDD/ECML Workshops (1) 2022: 618-629 - [c110]Daria Smuseva, Ivan Malakhov, Andrea Marin, Aad van Moorsel, Sabina Rossi:
Verifier's Dilemma in Ethereum Blockchain: A Quantitative Analysis. QEST 2022: 317-336 - [i16]Magdalene Ng, Kovila P. L. Coopamootoo, Tasos Spiliotopoulos, Dave Horsfall, Mhairi Aitken, Ehsan Toreini, Karen Elliott, Aad van Moorsel:
In Private, Secure, Conversational FinBots We Trust. CoRR abs/2204.10344 (2022) - [i15]Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel:
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy. CoRR abs/2210.06856 (2022) - 2021
- [j23]Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel:
The OpBench Ethereum opcode benchmark framework: Design, implementation, validation and experiments. Perform. Evaluation 146: 102168 (2021) - [c109]Isaac Matthews, Sadegh Soudjani, Aad van Moorsel:
Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs. SciSec 2021: 171-186 - [i14]Isaac Matthews, Sadegh Soudjani, Aad van Moorsel:
Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs. CoRR abs/2103.10212 (2021) - [i13]Tasos Spiliotopoulos, Dave Horsfall, Magdalene Ng, Kovila P. L. Coopamootoo, Aad van Moorsel, Karen Elliott:
Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials. CoRR abs/2106.06053 (2021) - [i12]Karen Elliott, Kovila P. L. Coopamootoo, Edward Curran, Paul D. Ezhilchelvan, Samantha Finnigan, Dave Horsfall, Zhichao Ma, Magdalene Ng, Tasos Spiliotopoulos, Han Wu, Aad van Moorsel:
Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion. CoRR abs/2112.09767 (2021) - 2020
- [j22]Mhairi Aitken, Ehsan Toreini, Peter Carmichael, Kovila P. L. Coopamootoo, Karen Elliott, Aad van Moorsel:
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Big Data Soc. 7(1): 205395172090889 (2020) - [j21]Paul D. Ezhilchelvan, Amjad Aldweesh, Aad van Moorsel:
Non-blocking two-phase commit using blockchain. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j20]Maher Alharby, Aad van Moorsel:
BlockSim: An Extensible Simulation Tool for Blockchain Systems. Frontiers Blockchain 3: 28 (2020) - [j19]Deepak Puthal, Laurence T. Yang, Schahram Dustdar, Zhenyu Wen, Jun Song, Aad van Moorsel, Rajiv Ranjan:
A User-centric Security Solution for Internet of Things and Edge Convergence. ACM Trans. Cyber Phys. Syst. 4(3): 32:1-32:19 (2020) - [c108]Roben Castagna Lunardi, Maher Alharby, Henry C. Nunes, Avelino F. Zorzo, Changyu Dong, Aad van Moorsel:
Context-based consensus for appendable-block blockchains. Blockchain 2020: 401-408 - [c107]Maher Alharby, Aad van Moorsel:
Fitting and Regression for Distributions of Ethereum Smart Contracts. BRAINS 2020: 248-255 - [c106]Maher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel:
Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma. DSN 2020: 209-220 - [c105]Mhairi Aitken, Magdalene Ng, Ehsan Toreini, Aad van Moorsel, Kovila P. L. Coopamootoo, Karen Elliott:
Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 21-38 - [c104]Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance. EuroS&P Workshops 2020: 190-199 - [c103]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel:
The relationship between trust in AI and trustworthy machine learning technologies. FAT* 2020: 272-283 - [c102]Isaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel:
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. TrustCom 2020: 129-136 - [p2]Katinka Wolter, Tommi Pesu, Aad van Moorsel, William J. Knottenbelt:
Black-Box Models for Restart, Reboot and Rejuvenation. Handbook of Software Aging and Rejuvenation 2020: 155-194 - [i11]Maher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel:
Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma. CoRR abs/2004.12768 (2020) - [i10]Maher Alharby, Aad van Moorsel:
BlockSim: An Extensible Simulation Tool for Blockchain Systems. CoRR abs/2004.13438 (2020) - [i9]Isaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel:
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. CoRR abs/2005.06350 (2020) - [i8]Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns \& Usage Intentions in Automated Bots for Finance. CoRR abs/2006.15449 (2020) - [i7]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Vladimiro González-Zelaya, Paolo Missier, Magdalene Ng, Aad van Moorsel:
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context. CoRR abs/2007.08911 (2020) - [i6]Mohammed Aamir Ali, Thomas Groß, Aad van Moorsel:
Investigation of 3-D Secure's Model for Fraud Detection. CoRR abs/2009.12390 (2020)
2010 – 2019
- 2019
- [j18]Rathin Chandra Shit, Suraj Sharma, Deepak Puthal, Philip James, Biswajeet Pradhan, Aad van Moorsel, Albert Y. Zomaya, Rajiv Ranjan:
Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World. IEEE Commun. Surv. Tutorials 21(4): 3532-3564 (2019) - [j17]Mutaz Barika, Saurabh Kumar Garg, Albert Y. Zomaya, Lizhe Wang, Aad van Moorsel, Rajiv Ranjan:
Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions. ACM Comput. Surv. 52(5): 95:1-95:41 (2019) - [j16]Mohammed Aamir Ali, Muhammad Ajmal Azad, Mario Parreño Centeno, Feng Hao, Aad van Moorsel:
Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Gener. Comput. Syst. 100: 408-427 (2019) - [c101]Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel:
OpBench: A CPU Performance Benchmark for Ethereum Smart Contract Operation Code. Blockchain 2019: 274-281 - [c100]Mario Parreño Centeno, Mohammed Aamir Ali, Yu Guan, Aad van Moorsel:
Unsupervised Machine Learning for Card Payment Fraud Detection. CRiSIS 2019: 247-262 - [c99]Mohammed Aamir Ali, Aad van Moorsel:
Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol. Financial Cryptography 2019: 201-221 - [i5]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel:
The relationship between trust in AI and trustworthy machine learning technologies. CoRR abs/1912.00782 (2019) - 2018
- [j15]Aad van Moorsel:
Benchmarks and Models for Blockchain: Consensus Algorithms. SIGMETRICS Perform. Evaluation Rev. 46(3): 113 (2018) - [j14]Maher Alharby, Aad van Moorsel:
BlockSim: A Simulation Framework for Blockchain Systems. SIGMETRICS Perform. Evaluation Rev. 46(3): 135-138 (2018) - [c98]Amjad Aldweesh, Maher Alharby, Aad van Moorsel:
Performance Benchmarking for Ethereum Opcodes. AICCSA 2018: 1-2 - [c97]Amjad Aldweesh, Maher Alharby, Ellis Solaiman, Aad van Moorsel:
Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum. EDCC 2018: 144-149 - [c96]Mario Parreño Centeno, Yu Guan, Aad van Moorsel:
Mobile Based Continuous Authentication Using Deep Features. EMDL@MobiSys 2018: 19-24 - [c95]Paul D. Ezhilchelvan, Amjad Aldweesh, Aad van Moorsel:
Non-Blocking Two Phase Commit Using Blockchain. CRYBLOCK@MobiSys 2018: 36-41 - [c94]Mohammed Aamir Ali, Thomas Groß, Aad van Moorsel:
Investigation of 3-D secure's model for fraud detection. STAST 2018: 3:1-3:11 - [c93]Aad van Moorsel:
Benchmarks and Models for Blockchain. ICPE 2018: 3 - [i4]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. IACR Cryptol. ePrint Arch. 2018: 489 (2018) - 2017
- [j13]Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad P. A. van Moorsel:
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Secur. Priv. 15(2): 78-86 (2017) - [j12]Rajiv Ranjan, Jedsada Phengsuwan, Philip James, Stuart L. Barr, Aad van Moorsel:
Urban Risk Analytics in the Cloud. IT Prof. 19(2): 4-9 (2017) - [c92]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CCS 2017: 211-227 - [c91]John C. Mace, Nipun Balan Thekkummal, Charles Morisset, Aad van Moorsel:
ADaCS: A Tool for Analysing Data Collection Strategies. EPEW 2017: 230-245 - [c90]Aad P. A. van Moorsel, Matthew Forshaw, Francisco Rocha:
Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case. ISSRE 2017: 240-249 - [c89]Mario Parreño Centeno, Aad van Moorsel, Stefano Castruccio:
Smartphone Continuous Authentication Using Deep Learning Autoencoders. PST 2017: 147-158 - [c88]Mohammed Alqahtani, Aad van Moorsel:
Risk Assessment Methodology For EMV Financial Transaction Systems. UKPEW 2017: 137-150 - [c87]Maher Alharby, Aad van Moorsel:
The Impact of Profit Uncertainty on Miner Decisions in Blockchain Systems. UKPEW 2017: 151-167 - [i3]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CoRR abs/1708.01171 (2017) - [i2]Maher Alharby, Aad van Moorsel:
Blockchain-based Smart Contracts: A Systematic Mapping Study. CoRR abs/1710.06372 (2017) - 2016
- [j11]Iryna Yevseyeva, Charles Morisset, Aad P. A. van Moorsel:
Modeling and analysis of influence power for information security decisions. Perform. Evaluation 98: 36-51 (2016) - [c86]Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao, Aad P. A. van Moorsel:
NFC Payment Spy: A Privacy Attack on Contactless Payments. SSR 2016: 92-111 - [c85]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
WRAD: Tool Support for Workflow Resiliency Analysis and Design. SERENE 2016: 79-87 - 2015
- [j10]Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, Ed Ruck-Keene:
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 3-46 (2015) - [c84]James Turland, Lynne M. Coventry, Debora Jeske, Pam Briggs, Aad P. A. van Moorsel:
Nudging towards security: developing an application for wireless network selection for android phones. BCS HCI 2015: 193-201 - [c83]Andrew Stephen McGough, David Wall, John Brennan, Georgios Theodoropoulos, Ed Ruck-Keene, Budi Arief, Carl Gamble, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis:
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). MIST@CCS 2015: 1-12 - [c82]Iryna Yevseyeva, Vitor Basto-Fernandes, Michael Emmerich, Aad van Moorsel:
Selecting Optimal Subset of Security Controls. CENTERIS/ProjMAN/HCist 2015: 1035-1042 - [c81]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Modelling user availability in workflow resiliency analysis. HotSoS 2015: 7:1-7:10 - [c80]Robert Cain, Aad P. A. van Moorsel:
Optimisation of data collection strategies for model-based evaluation and decision-making: poster. HotSoS 2015: 28:1-28:2 - [c79]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Impact of Policy Design on Workflow Resiliency Computation Time. QEST 2015: 244-259 - [c78]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Resiliency Variance in Workflows with Choice. SERENE 2015: 128-143 - 2014
- [c77]Wen Zeng, Maciej Koutny, Aad P. A. van Moorsel:
Performance Modelling and Evaluation of Enterprise Information Security Technologies. CIT 2014: 504-511 - [c76]Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel:
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. CCS 2014: 716-726 - [c75]Iryna Yevseyeva, Charles Morisset, Thomas Groß, Aad P. A. van Moorsel:
A Decision Making Model of Influencing Behavior in Information Security. EPEW 2014: 194-208 - [c74]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Quantitative Workflow Resiliency. ESORICS (1) 2014: 344-361 - [c73]Lynne M. Coventry, Pam Briggs, Debora Jeske, Aad P. A. van Moorsel:
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment. HCI (8) 2014: 229-239 - [c72]Charles Morisset, Thomas Groß, Aad P. A. van Moorsel, Iryna Yevseyeva:
Nudging for Quantitative Access Control Systems. HCI (24) 2014: 340-351 - [c71]Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad P. A. van Moorsel:
A Formal Model for Soft Enforcement: Influencing the Decision-Maker. STM 2014: 113-128 - [c70]Budi Arief, Kovila P. L. Coopamootoo, Martin Emms, Aad P. A. van Moorsel:
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. WPES 2014: 201-204 - 2013
- [c69]Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel:
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms. CD-ARES Workshops 2013: 321-336 - [c68]Suliman A. Alsuhibany, Aad P. A. van Moorsel:
Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets. ARES 2013: 437-445 - [c67]Winai Wongthai, Francisco Liberal Rocha, Aad P. A. van Moorsel:
A Generic Logging Template for Infrastructure as a Service Cloud. AINA Workshops 2013: 1153-1160 - [c66]Suliman A. Alsuhibany, Charles Morisset, Aad P. A. van Moorsel:
Detection of attack strategies. CRiSIS 2013: 1-8 - [c65]Martin Emms, Budi Arief, Nicholas Little, Aad P. A. van Moorsel:
Risks of Offline Verify PIN on Contactless Cards. Financial Cryptography 2013: 313-321 - [c64]Francisco Rocha, Thomas Gross, Aad P. A. van Moorsel:
Defense-in-Depth Against Malicious Insiders in the Cloud. IC2E 2013: 88-97 - 2012
- [c63]Martin Emms, Budi Arief, Aad P. A. van Moorsel:
Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. APF 2012: 203-214 - [c62]David Greathead, Lynne M. Coventry, Budi Arief, Aad P. A. van Moorsel:
Deriving requirements for an online community interaction scheme: indications from older adults. CHI Extended Abstracts 2012: 1541-1546 - [c61]Robert Cain, Aad P. A. van Moorsel:
Optimization of data collection strategies for model-based evaluation and decision-making. DSN 2012: 1-10 - [e4]Katinka Wolter, Alberto Avritzer, Marco Vieira, Aad P. A. van Moorsel:
Resilience Assessment and Evaluation of Computing Systems. Springer 2012, ISBN 978-3-642-29031-2 [contents] - 2011
- [j9]Mohamed Kaâniche, Aad P. A. van Moorsel:
It All Depends, and Increasingly So. IEEE Secur. Priv. 9(6): 56-57 (2011) - [j8]Stefan Fenz, Simon Edward Parkin, Aad P. A. van Moorsel:
A Community Knowledge Base for IT Security. IT Prof. 13(3): 24-30 (2011) - [j7]Johari Abdullah, Aad P. A. van Moorsel:
Uncertainty and Uncertainty Tolerance in Service Provisioning. J. Internet Serv. Inf. Secur. 1(4): 89-109 (2011) - [c60]Budi Arief, Aad P. A. van Moorsel, David Greathead, Lynne M. Coventry:
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies. CASoN 2011: 25-30 - [c59]John C. Mace, Aad P. A. van Moorsel, Paul Watson:
The case for dynamic security solutions in public cloud workflow deployments. DSN Workshops 2011: 111-116 - [c58]Rouaa Yassin Kassab, Aad P. A. van Moorsel:
Formal Mapping of WSLA Contracts on Stochastic Models. EPEW 2011: 117-132 - [c57]Wen Zeng, Aad P. A. van Moorsel:
Quantitative Evaluation of Enterprise DRM Technology. PASM@ICPE 2011: 159-174 - 2010
- [j6]Philipp Reinecke, Katinka Wolter, Aad P. A. van Moorsel:
Evaluating the adaptivity of computing systems. Perform. Evaluation 67(8): 676-693 (2010) - [c56]John C. Mace, Simon Edward Parkin, Aad P. A. van Moorsel:
A collaborative ontology development tool for information security managers. CHIMIT 2010: 5 - [c55]Maciej P. Machulak, Eve Maler, Domenico Catalano, Aad P. A. van Moorsel:
User-managed access to web resources. Digital Identity Management 2010: 35-44 - [c54]John C. Mace, Simon Edward Parkin, Aad P. A. van Moorsel:
Ontology Editing Tool for Information Security and Human Factors Experts. KMIS 2010: 207-212 - [c53]Maciej P. Machulak, Aad P. A. van Moorsel:
Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications. ICDCS Workshops 2010: 62-71 - [c52]Maciej P. Machulak, Lukasz Moren, Aad P. A. van Moorsel:
Design and implementation of user-managed access framework for web 2.0 applications. MW4SOC 2010: 1-6 - [c51]Simon E. Parkin, Aad P. A. van Moorsel, Philip Inglesant, Martina Angela Sasse:
A stealth approach to usable security: helping IT security managers to identify workable security solutions. NSPW 2010: 33-50 - [p1]Chris Smith, Aad van Moorsel:
Mitigating Provider Uncertainty in Service Provision Contracts. Economic Models and Algorithms for Distributed Systems 2010: 143-159 - [e3]Alberto Avritzer, Aad P. A. van Moorsel, Katinka Wolter:
Resilience Assessment and Evaluation, 18.07. - 23.07.2010. Dagstuhl Seminar Proceedings 10292, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i1]Alberto Avritzer, Aad P. A. van Moorsel, Katinka Wolter:
10292 Abstracts Collection and Summary - Resilience Assessment and Evaluation. Resilience Assessment and Evaluation 2010
2000 – 2009
- 2009
- [c50]Kaustubh R. Joshi, Guy Bunker, Farnam Jahanian, Aad P. A. van Moorsel, Joseph Weinman:
Dependability in the cloud: Challenges and opportunities. DSN 2009: 103-104 - [c49]Hye-young Paik, Karl M. Göschka, Aad P. A. van Moorsel, Raymond K. Wong, Ian Warren:
Introduction to the proceedings of the EDOC 2009 workshop Middleware for Web Services (MWS) 2009. EDOCW 2009: 72-73 - [c48]Huqiu Zhang, Aad P. A. van Moorsel:
Fast Generation of Scale Free Networks with Directed Arcs. EPEW 2009: 131-148 - [c47]Ravi Teja Dodda, Chris Smith, Aad P. A. van Moorsel:
An Architecture for Cross-Cloud System Management. IC3 2009: 556-567 - [c46]Daria Stepanova, Simon Edward Parkin, Aad P. A. van Moorsel:
A Knowledge Base for Justified Information Security Decision-making. ICSOFT (2) 2009: 326-331 - [c45]Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles:
An information security ontology incorporating human-behavioural implications. SIN 2009: 46-55 - 2008
- [c44]Marios S. Andreou, Aad P. A. van Moorsel:
COTraSE: Connection Oriented Traceback in Switched Ethernet. IAS 2008: 198-204 - [c43]Andrea Bondavalli, István Majzik, Aad P. A. van Moorsel:
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008). DSN 2008: 542-543 - [c42]Vladimir Tosic, Karl M. Göschka, Aad P. A. van Moorsel, Ian Warren, Raymond K. Wong:
Introduction to the Proceedings of the EDOC 2008 Workshop Middleware for Web Services (MWS) 2008. EDOCW 2008: 338-342 - [c41]Huqiu Zhang, Aad P. A. van Moorsel:
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust. EPEW 2008: 242-256 - [c40]Marios S. Andreou, Aad P. A. van Moorsel:
Logging based IP Traceback in switched ethernets. EUROSEC 2008: 1-7 - [c39]Maciej P. Machulak, Simon E. Parkin, Aad P. A. van Moorsel:
Architecting Dependable Access Control Systems for Multi-domain Computing Environments. WADS 2008: 49-75 - [c38]Simon Edward Parkin, Rouaa Yassin Kassab, Aad P. A. van Moorsel:
The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies. ISAS 2008: 43-58 - [c37]Dan Martin, Aad P. A. van Moorsel, Graham Morgan:
Efficient Resource Management for Game Server Hosting. ISORC 2008: 593-596 - [c36]Christiaan J. Lamprecht, Aad P. A. van Moorsel:
Runtime Security Adaptation Using Adaptive SSL. PRDC 2008: 305-312 - [c35]Aad P. A. van Moorsel:
Panel: Complexity and Resilience. SAFECOMP 2008: 13-15 - 2007
- [c34]Vladimir Tosic, Karl M. Göschka, Aad P. A. van Moorsel, Raymond K. Wong:
Introduction to the Proceedings of the EDOC 2007 Workshop Middleware for Web Services (MWS) 2007. EDOCW 2007: 69-72 - [c33]Emerson Ribeiro de Mello, Aad P. A. van Moorsel, Joni da Silva Fraga:
Evaluation of P2P Search Algorithms for Discovering Trust Paths. EPEW 2007: 112-124 - [c32]Pascal Felber, Calton Pu, Aad P. A. van Moorsel:
DOA 2007 PC Co-chairs' Message. OTM Conferences (1) 2007: 437 - [c31]Christiaan J. Lamprecht, Aad P. A. van Moorsel:
Adaptive SSL: Design, Implementation and Overhead Analysis. SASO 2007: 289-294 - [e2]Miroslaw Malek, Manfred Reitenspieß, Aad P. A. van Moorsel:
Service Availability, 4th International Service Availability Symposium, ISAS 2007, Durham, NH, USA, May 21-22, 2007, Proceedings. Lecture Notes in Computer Science 4526, Springer 2007, ISBN 978-3-540-72735-4 [contents] - 2006
- [j5]Aad P. A. van Moorsel, Katinka Wolter:
Analysis of Restart Mechanisms in Software Systems. IEEE Trans. Software Eng. 32(8): 547-558 (2006) - [c30]Emerson Ribeiro de Mello, Savas Parastatidis, Philipp Reinecke, Chris Smith, Aad P. A. van Moorsel, Jim Webber:
Secure and Provable Service Support for Human-Intensive Real-Estate Processes. IEEE SCC 2006: 495-504 - [c29]Vladimir Tosic, Aad P. A. van Moorsel, Raymond K. Wong:
Introduction to the Proceedings of the EDOC 2006 Workshop Middleware for Web Services (MWS) 2006. EDOC Workshops 2006: 7 - [c28]Philipp Reinecke, Aad P. A. van Moorsel, Katinka Wolter:
Experimental Analysis of the Correlation of HTTP GET Invocations. EPEW 2006: 226-237 - [c27]Philipp Reinecke, Aad P. A. van Moorsel, Katinka Wolter:
The Fast and the Fair: A Fault-Injection-Driven Comparison of Restart Oracles for Reliable Web Services. QEST 2006: 375-384 - 2005
- [j4]Aad P. A. van Moorsel:
Grid, Management and Self-Management. Comput. J. 48(3): 325-332 (2005) - [c26]Özalp Babaoglu, Márk Jelasity, Alberto Montresor, Christof Fetzer, Stefano Leonardi, Aad P. A. van Moorsel:
The Self-Star Vision. Self-star Properties in Complex Information Systems 2005: 1-20 - [c25]Aad P. A. van Moorsel:
On Best-Effort and Dependability, Service-Orientation and Panacea. ISAS 2005: 99-101 - [e1]Özalp Babaoglu, Márk Jelasity, Alberto Montresor, Christof Fetzer, Stefano Leonardi, Aad P. A. van Moorsel, Maarten van Steen:
Self-star Properties in Complex Information Systems, Conceptual and Practical Foundations [the book is a result from a workshop at Bertinoro, Italy, Summer 2004]. Lecture Notes in Computer Science 3460, Springer 2005, ISBN 3-540-26009-9 [contents] - 2004
- [j3]Aad P. A. van Moorsel, Katinka Wolter:
Optimal restart times for moments of completion time. IEE Proc. Softw. 151(5): 219-223 (2004) - [c24]Carlos Molina-Jiménez, Jim Pruyne, Aad P. A. van Moorsel:
The Role of Agreements in IT Management Software. WADS 2004: 36-58 - [c23]Philipp Reinecke, Aad P. A. van Moorsel, Katinka Wolter:
A Measurement Study of the Interplay Between Application Level Restart and Transport Protocol. ISAS 2004: 86-100 - [c22]Aad P. A. van Moorsel, Katinka Wolter:
Meeting Deadlines through Restart. MMB 2004: 155-160 - [c21]Aad P. A. van Moorsel, Katinka Wolter:
Analysis and Algorithms for Restart. QEST 2004: 195-204 - 2003
- [c20]Akhil Sahai, Sven Graupner, Vijay Machiraju, Aad P. A. van Moorsel:
Specifying and Monitoring Guarantees in Commercial Grids through SLA. CCGRID 2003: 292-299 - [c19]Lisa Spainhower, Aad P. A. van Moorsel:
First Workshop on the Design of Self-Managing Systems. DSN 2003: 765 - [c18]Sven Graupner, Vijay Machiraju, Akhil Sahai, Aad P. A. van Moorsel:
Management +=Grid. DSOM 2003: 194-196 - [c17]Vijay Machiraju, Akhil Sahai, Aad P. A. van Moorsel:
Web Services Management Network: An Overlay Network for Federated Service Management. Integrated Network Management 2003: 351-364 - [c16]Vijay Machiraju, Akhil Sahai, Aad P. A. van Moorsel:
Managed Utility Computing: The Grid as Management Backplane. LADC 2003: 4-7 - [c15]Aad P. A. van Moorsel:
Managed Utility Computing. WISE 2003: 277 - 2002
- [j2]Michael R. Lyu, Sampath Rangarajan, Aad P. A. van Moorsel:
Optimal allocation of test resources for software reliability growth modeling in software development. IEEE Trans. Reliab. 51(2): 183-192 (2002) - [c14]Akhil Sahai, Vijay Machiraju, Mehmet Sayal, Aad P. A. van Moorsel, Fabio Casati:
Automated SLA Monitoring for Web Services. DSOM 2002: 28-41 - [c13]Aad P. A. van Moorsel:
Ten-Step Survival Guide for the Emerging Business Web. WES 2002: 1-11
1990 – 1999
- 1999
- [c12]Aad P. A. van Moorsel:
The 'QoS Query Service' for Improved Quality-of-Service Decision Making in CORBA. SRDS 1999: 274-285 - 1998
- [c11]Aad P. A. van Moorsel, Yiqing Huang:
Reusable Software Components for Performability Tools and Their Utilization for Web-Based Configurable Tools. Computer Performance Evaluation (Tools) 1998: 37-50 - [c10]Aad P. A. van Moorsel, Katinka Wolter:
Numerical Solution of Non-Homogeneous Markov Processes through Uniformization. ESM 1998: 710-717 - [c9]Sachin Garg, Aad P. A. van Moorsel, Kalyanaraman Vaidyanathan, Kishor S. Trivedi:
A methodology for detection and estimation of software aging. ISSRE 1998: 283-292 - 1997
- [c8]Michael R. Lyu, Sampath Rangarajan, Aad P. A. van Moorsel:
Optimization of reliability allocation and testing schedule for software systems. ISSRE 1997: 336-347 - 1996
- [j1]Muhammad A. Qureshi, William H. Sanders, Aad P. A. van Moorsel, Reinhard German:
Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures. IEEE Trans. Software Eng. 22(9): 603-614 (1996) - [c7]Aad P. A. van Moorsel, Latha A. Kant, William H. Sanders:
Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models. Annual Simulation Symposium 1996: 173-182 - [c6]Reinhard German, Aad P. A. van Moorsel, Muhammad A. Qureshi, William H. Sanders:
Expected Impulsive Rewards in Markov Regenerative Stochastic Petri Nets. Application and Theory of Petri Nets 1996: 172-191 - 1995
- [c5]Muhammad A. Qureshi, William H. Sanders, Aad P. A. van Moorsel, Reinhard German:
Algorithms for the generation of state-level representations of stochastic activity networks with general reward structures. PNPM 1995: 180-190 - [c4]Boudewijn R. Haverkort, Aad P. A. van Moorsel:
Using the probabilistic evaluation tool for the analytical solution of large Markov models. PNPM 1995: 206-207 - [c3]Daniel D. Deavours, W. Douglas Obal II, Muhammad A. Qureshi, William H. Sanders, Aad P. A. van Moorsel:
UltraSAN version 3 overview. PNPM 1995: 216-217 - 1994
- [c2]Boudewijn R. Haverkort, Aad P. A. van Moorsel, Dirk-Jan Speelman:
Xmgm: Performance Modeling Using Matrix Geometric Techniques. MASCOTS 1994: 152-157 - 1993
- [b1]Aad P. A. van Moorsel:
Performability evaluation concepts and techniques. University Twente, 1993, pp. I-XIV, 1-275 - 1992
- [c1]Aad P. A. van Moorsel, Boudewijn R. Haverkort, Ignas G. Niemegeers:
A Method for Analysing the Performance Aspects of the Fault-Tolerance Mechanisms in FDDI. INFOCOM 1992: 372-381
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint