


default search action
International Journal of Critical Computer-Based Systems, Volume 1
Volume 1, Numbers 1/2/3, 2010
- Vasily V. Balashov
, Anatoly G. Bakhmurov, Maxim V. Chistolinov, Ruslan L. Smeliansky
, Dmitry Yu. Volkanov
, Nikita V. Youshchenko:
A hardware-in-the-loop simulation environment for real-time systems development and architecture evaluation. 5-23 - Vyacheslav S. Kharchenko
, Volodymyr Sklyar:
Scalable diversity-oriented decisions and technologies for dependable SoPC-based safety-critical computer systems and infrastructures. 24-40 - Victor V. Toporkov
, Alexey Tselishchev:
Safety scheduling strategies in distributed computing. 41-58 - Vasilis P. Koutras, Agapios N. Platis:
Semi-Markov performance modelling of a redundant system with partial, full and failed rejuvenation. 59-85 - Krzysztof Kepa
, Fearghal Morgan, Krzysztof Kosciuszkiewicz, Tomasz Surmacz
:
SeReCon: a secure reconfiguration controller for self-reconfigurable systems. 86-103 - Lukasz Krukowski, Jaroslaw Sugier:
Designing AES cryptographic unit for automatic implementation in low-cost FPGA devices. 104-116 - Janusz Biernat:
Fast fault-tolerant adders. 117-127 - Ian Philip Wolforth, Martin Walker
, Yiannis Papadopoulos
, Lars Grunske
:
Capture and reuse of composable failure patterns. 128-147 - Ervin Tóth, Zoltán Hornák, Gergely Tóth:
Protection system against overload and distributed denial of service attacks. 148-160 - Jan Magott, Marek Woda
:
Model for evaluation of SOA security metrics using attack graphs. 161-177 - Wojciech Tylman
:
Misuse-based intrusion detection using Bayesian networks. 178-190 - Wlodzimierz M. Zuberek
, Ilona Bluemke
, Donald C. Craig:
Modelling and performance analysis of component-based systems. 191-207 - Leszek Kotulski, Dariusz Dymek
:
Using UML(VR) for the support of the test data generation. 208-219 - Antonio da Silva
, José-Fernán Martínez, Alberto Gonzalez-Calero, Lourdes López-Santidrián
, Ana Belén García, Vicente Hernández
:
XML schema based fault set definition to improve fault injection tools interoperability. 220-237 - Krzysztof Sacha:
Verification and implementation of software for dependable controllers. 238-254 - Tomasz Walkowiak
, Jacek Mazurkiewicz
:
Functional availability analysis of discrete transport system simulated by SSF tool. 255-266 - Bernhard Fechner
, Andre Osterloh:
A meta-level true random number generator. 267-279
Volume 1, Number 4, 2010
- Jesús J. Martinez Molina, Miguel A. Hernández Ruíz, Manuel Gil Pérez
, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta:
Event-driven architecture based on patterns for detecting complex attacks. 283-309 - Marco Domenico Aime, Paolo Carlo Pomi, Marco Vallini:
Ontology and algorithms for the dependable configuration of information systems. 310-335 - Andrea Bondavalli
, Lorenzo Falai, Stefano Porcarelli, Salvatore Sabina, Fabrizio Zanini:
Available and safe message freshness detection algorithm. 336-363 - Ibrahim Habli, Richard Hawkins, Tim Kelly:
Software safety: relating software assurance and software integrity. 364-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.