default search action
International Journal of Critical Computer-Based Systems, Volume 9
Volume 9, Numbers 1/2, 2019
- Harsimran Kaur, Ashish Sharma:
A versatile approach for ranking and modelling of non-functional requirements. 3-25 - Peter T. Breuer, Jonathan P. Bowen:
Fully encrypted high-speed microprocessor architecture: the secret computer in simulation. 26-55 - Giles Howard, Michael J. Butler, John Colley, Vladimiro Sassone:
A methodology for assuring the safety and security of critical infrastructure based on STPA and Event-B. 56-75 - Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
Formal methods in dynamic software updating: a survey. 76-114 - Ugo Gentile, Luigi Serio:
Survey on international standards and best practices for patch management of complex industrial control systems: the critical infrastructure of particle accelerators case study. 115-132 - Michel Batteux, Tatiana Prosvirnova, Antoine Rauzy:
AltaRica 3.0 in ten modelling patterns. 133-165
Volume 9, Number 3, 2019
- Sofiene Beji, Sardaouna Hamadou, John Mullins, Abdelouahed Gherbi:
Iterative integration of TTEthernet network flows. 167-192 - Hocine Souilah, Abderrahmane Baadache, Louiza Bouallouche-Medjkoune:
A challenge-based countermeasure against the spoofed PS-Poll-based DoS attack in IEEE 802.11 networks. 193-214 - Enrico Schiavone, Andrea Ceccarelli, Ariadne Maria Brito Rizzoni Carvalho, Andrea Bondavalli:
Design, implementation, and assessment of a usable multi-biometric continuous authentication system. 215-247 - Mohamed Escheikh, Zayneb Tayachi, Kamel Barkaoui:
Performability modelling and analysis of server virtualised systems subject to workload-dependent software aging. 248-292
Volume 9, Number 4, 2019
- Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain. 293-317 - Frederico Cerveira, Alcides Fonseca, Raul Barbosa, Henrique Madeira:
Soft error sensitivity and vulnerability of languages and their implementations. 318-347 - Tânia Basso, Hebert de Oliveira Silva, Regina Moraes:
Extending a re-identification risk-based anonymisation framework and evaluating its impact on data mining classifiers. 348-378 - Fateh Latreche, Faiza Belala:
Timed CTL checking of time critical cloud applications using timed bigraphs. 379-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.