default search action
International Journal of Critical Computer-Based Systems, Volume 10
Volume 10, Number 1, 2020
- Marta Olszewska, Fatima Shokri-Manninen, Andrew Edmunds, Marina Waldén:
Applying guidelines for system modelling in Event-B - a systematic literature review. 1-36 - Besma Khaireddine, Marwa Ben AbdelAli, Lamia Labed Jilani, Aleksandr Zakharchenko, Ali Mili:
Correctness enhancement: a pervasive software engineering paradigm. 37-73 - Andrea Tortorelli, Andrea Fiaschetti, Alessandro Giuseppi, Vincenzo Suraci, Roberto Germanà, Francesco Delli Priscoli:
A security metric for assessing the security level of critical infrastructures. 74-94
Volume 10, Number 2, 2021
- Ammar Boucherit, Laura M. Castro, Osman Hasan, Abdallah Khababa:
Towards a hybrid formal analysis technique for safety-critical software architectures. 95-119 - Sarah Chabane, Rabéa Ameur-Boulifa, Mezghiche Mohamed:
Towards compositional verification of synchronous reactive systems. 120-142 - Salim Chehida, Yves Ledru, Yoann Blein, Germán Vega:
An SMT-based approach for generating trace examples and counter-examples of parametric properties. 143-183
Volume 10, Number 3, 2022
- Kakelli Anil Kumar, Kaustubh Kumar, Nag Lohith Chiluka:
Deep learning models for multi-class malware classification using Windows exe API calls. 185-201 - Michel Batteux, Tatiana Prosvirnova, Antoine B. Rauzy:
Abstract executions of stochastic discrete event systems. 202-226 - Sheetal Gokhale, Irfan A. Siddavatam, Ashwini Dalvi, Mohammed Shaikh, Suchitra Patil:
Formal modelling and verification of high interactive honeypot using coloured Petri nets. 227-247 - Mohith C. Shekar, Harinahalli Lokesh Gururaj, Francesco Flammini:
Securing personal identity using blockchain. 248-267
Volume 10, Number 4, 2023
- Manish Rai, Sachin Goyal, Mahesh Kumar Pawar:
An enhanced digital image watermarking technique using DWT-HD-SVD and deep convolutional neural network. 269-286 - Louella Colaco, Arun S. Nair, Biju K. Raveendran, Sasikumar Punnekkat:
Task models for mixed criticality systems - a review. 287-329 - Manikant Panthi, Tanmoy Kanti Das:
Detection of cyber-attacks for sensor measurement data using supervised machine learning models for modern power grid system. 330-354 - G. Gowthami, S. Silvia Priscila:
Tuna swarm optimisation-based feature selection and deep multimodal-sequential-hierarchical progressive network for network intrusion detection approach. 355-374
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.