default search action
Robin E. Bloomfield
Person information
- affiliation: City University of London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Srivatsan Varadarajan, Robin Bloomfield, John Rushby, Gopal Gupta, Anitha Murugesan, Robert J. Stroud, Kateryna Netkachova, Isaac Hong Wong, Joaquín Arias:
Enabling Theory-Based Continuous Assurance: A Coherent Approach with Semantics and Automated Synthesis. SAFECOMP (Workshops) 2024: 173-187 - [i11]Robin Bloomfield, Kateryna Netkachova, John Rushby:
Defeaters and Eliminative Argumentation in Assurance 2.0. CoRR abs/2405.15800 (2024) - [i10]Daniel Sikar, Artur Garcez, Robin Bloomfield, Tillman Weyde, Kaleem Peeroo, Naman Singh, Maeve Hutchinson, Mirela Reljan-Delaney:
The Misclassification Likelihood Matrix: Some Classes Are More Likely To Be Misclassified Than Others. CoRR abs/2407.07818 (2024) - [i9]Daniel Sikar, Artur Garcez, Tillman Weyde, Robin Bloomfield, Kaleem Peeroo:
When to Accept Automated Predictions and When to Defer to Human Judgment? CoRR abs/2407.07821 (2024) - [i8]Robin Bloomfield, John Rushby:
Assurance of AI Systems From a Dependability Perspective. CoRR abs/2407.13948 (2024) - [i7]Anitha Murugesan, Isaac Hong Wong, Joaquín Arias, Robert J. Stroud, Srivatsan Varadarajan, Elmer Salazar, Gopal Gupta, Robin Bloomfield, John Rushby:
Automating Semantic Analysis of System Assurance Cases using Goal-directed ASP. CoRR abs/2408.11699 (2024) - [i6]Robin Bloomfield, John Rushby:
Confidence in Assurance 2.0 Cases. CoRR abs/2409.10665 (2024) - 2023
- [c35]Anitha Murugesan, Isaac Hong Wong, Robert J. Stroud, Joaquín Arias, Elmer Salazar, Gopal Gupta, Robin Bloomfield, Srivatsan Varadarajan, John Rushby:
Semantic Analysis of Assurance Cases using s(CASP). ICLP Workshops 2023 - 2022
- [i5]John Rushby, Robin Bloomfield:
Assessing Confidence with Assurance 2.0. CoRR abs/2205.04522 (2022) - 2021
- [i4]Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Luke Hinde, Philippa Ryan:
Safety Case Templates for Autonomous Systems. CoRR abs/2102.02625 (2021) - 2020
- [i3]Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshita, Makoto Takeyama, Yutaka Matsubara, Peter Popov Kazuki Imai, Yoshinori Tsutake:
Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1. CoRR abs/2003.00789 (2020) - [i2]Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshita, Makoto Takeyama, Yutaka Matsubara, Peter Popov Kazuki Imai, Yoshinori Tsutake:
Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 2. CoRR abs/2003.00790 (2020) - [i1]Robin Bloomfield, John Rushby:
Assurance 2.0. CoRR abs/2004.10474 (2020)
2010 – 2019
- 2019
- [j17]Robin Bloomfield, Heidy Khlaaf, Philippa Ryan Conmy, Gareth Fletcher:
Disruptive Innovations and Disruptive Assurance: Assuring Machine Learning and Autonomy. Computer 52(9): 82-89 (2019) - 2018
- [j16]Robin Bloomfield, Peter Bishop, Eoin Butler, Robert J. Stroud:
Security-Informed Safety: Supporting Stakeholders with Codes of Practice. Computer 51(8): 60-65 (2018) - 2017
- [j15]Kateryna Netkachova, Robin E. Bloomfield:
Is Chocolate Good for You - or, Is the Cloud Secure? Computer 50(8): 74-78 (2017) - [j14]Robin E. Bloomfield, Peter T. Popov, Kizito Salako, Vladimir Stankovic, David Wright:
Preliminary interdependency analysis: An approach to support critical-infrastructure risk-assessment. Reliab. Eng. Syst. Saf. 167: 198-217 (2017) - [c34]Robin E. Bloomfield:
Invited Talk: Structured Engineering Argumentation. JSAI-isAI Workshops 2017: 335 - [c33]Robin Bloomfield, Peter G. Bishop, Eoin Butler, Kateryna Netkachova:
Using an Assurance Case Framework to Develop Security Strategy and Policies. SAFECOMP Workshops 2017: 27-28 - 2016
- [j13]Kateryna Netkachova, Robin E. Bloomfield:
Security-Informed Safety. Computer 49(6): 98-102 (2016) - [c32]Robin E. Bloomfield, Marcus Bendele, Peter G. Bishop, Robert J. Stroud, Simon Tonks:
The Risk Assessment of ERTMS-Based Railway Systems from a Cyber Security Perspective: Methodology and Lessons Learned. RSSRail 2016: 3-19 - 2015
- [j12]Riyanat O. Shittu, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
Intrusion alert prioritisation and attack detection using post-correlation analysis. Comput. Secur. 50: 1-15 (2015) - [j11]Robin E. Bloomfield:
Autonomy, Robotics, and Dependability. IEEE Secur. Priv. 13(5): 3-5 (2015) - [c31]Kateryna Netkachova, Kevin Mueller, Michael Paulitsch, Robin Bloomfield:
Security-Informed Safety Case Approach to Analysing MILS Systems. MILS@HiPEAC 2015 - [c30]Abigail Parisaca Vargas, Robin Bloomfield:
Using Ontologies to Support Model-based Exploration of the Dependencies between Causes and Consequences of Hazards. KEOD 2015: 316-327 - [c29]Kateryna Netkachova, Oleksandr Netkachov, Robin E. Bloomfield:
Tool Support for Assurance Case Building Blocks - Providing a Helping Hand with CAE. SAFECOMP Workshops 2015: 62-71 - [c28]Kateryna Netkachova, Robin E. Bloomfield, Peter T. Popov, Oleksandr Netkachov:
Using Structured Assurance Case Approach to Analyse Security and Reliability of Critical Infrastructures. SAFECOMP Workshops 2015: 345-354 - 2014
- [j10]Peter G. Bishop, Robin E. Bloomfield, Bev Littlewood, Peter T. Popov, Andrey Povyakalo, Lorenzo Strigini:
A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train. Reliab. Eng. Syst. Saf. 130: 61-68 (2014) - [c27]Robin E. Bloomfield, Kateryna Netkachova:
Building Blocks for Assurance Cases. ISSRE Workshops 2014: 186-191 - [c26]Riyanat O. Shittu, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysis. LCN 2014: 322-330 - 2013
- [j9]Robin E. Bloomfield, Jay Lala:
Safety-Critical Systems: The Next Generation. IEEE Secur. Priv. 11(4): 11-13 (2013) - [j8]Robin Bloomfield:
Open Assurance. IEEE Secur. Priv. 11(5): 3-4 (2013) - [c25]Peter G. Bishop, Robin E. Bloomfield, Lukasz Cyra:
Combining testing and proof to gain high assurance in software: A case study. ISSRE 2013: 248-257 - [c24]Robin E. Bloomfield, Kateryna Netkachova, Robert J. Stroud:
Security-Informed Safety: If It's Not Secure, It's Not Safe. SERENE 2013: 17-32 - 2012
- [j7]Robin E. Bloomfield:
Are Things Getting Worse? IEEE Secur. Priv. 10(5): 3 (2012) - [c23]Riyanat O. Shittu, Alex Healing, Robin E. Bloomfield, Muttukrishnan Rajarajan:
Visual Analytic Agent-Based Framework for Intrusion Alert Analysis. CyberC 2012: 201-207 - [c22]Michael Paulitsch, Rupert Reiger, Lorenzo Strigini, Robin E. Bloomfield:
Evidence-Based Security in Aerospace: From Safety to Security and Back Again. ISSRE Workshops 2012: 21-22 - [c21]Richard Bloomfield, Robin E. Bloomfield, Ilir Gashi, Robert J. Stroud:
How Secure Is ERTMS? SAFECOMP Workshops 2012: 247-258 - 2011
- [j6]Robin E. Bloomfield:
Resilient to the Unexpected. IEEE Secur. Priv. 9(3): 3-4 (2011) - [j5]Peter G. Bishop, Robin E. Bloomfield, Bev Littlewood, Andrey Povyakalo, David Wright:
Toward a Formalism for Conservative Claims about the Dependability of Software-Based Systems. IEEE Trans. Software Eng. 37(5): 708-717 (2011) - [c20]Peter G. Bishop, Robin E. Bloomfield, Ilir Gashi, Vladimir Stankovic:
Diversity for Security: A Study with Off-the-Shelf AntiVirus Engines. ISSRE 2011: 11-19 - 2010
- [c19]Robin E. Bloomfield, Peter G. Bishop:
Safety and Assurance Cases: Past, Present and Possible Future - an Adelard Perspective. SSS 2010: 51-67 - [e2]Erich Rome, Robin E. Bloomfield:
Critical Information Infrastructures Security, 4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers. Lecture Notes in Computer Science 6027, Springer 2010, ISBN 978-3-642-14378-6 [contents]
2000 – 2009
- 2009
- [c18]Robin E. Bloomfield, Nick Chozos, Kizito Salako:
Current Capabilities, Requirements and a Proposed Strategy for Interdependency Analysis in the UK. CRITIS 2009: 188-200 - [c17]Robin E. Bloomfield, Lubos Buzna, Peter T. Popov, Kizito Salako, David Wright:
Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure. CRITIS 2009: 201-212 - 2008
- [c16]Robin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic:
Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. ISSRE 2008: 219-228 - 2007
- [c15]Robin E. Bloomfield, Bev Littlewood, David Wright:
Confidence: Its Role in Dependability Cases for Risk Assessment. DSN 2007: 338-346 - [c14]Robin E. Bloomfield, Marcelo Masera, Ann Miller, O. Sami Saydjari, Charles B. Weinstock:
Assurance Cases for Security: The Metrics Challenge. DSN 2007: 807-808 - 2006
- [j4]Robin E. Bloomfield, Sofia Guerra, Ann Miller, Marcelo Masera, Charles B. Weinstock:
International Working Group on Assurance Cases (for Security). IEEE Secur. Priv. 4(3): 66-68 (2006) - 2005
- [c13]Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra, Konstantinos Tourlas:
Justification of Smart Sensors for Nuclear Applications. SAFECOMP 2005: 194-207 - 2003
- [j3]Peter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra:
Software criticality analysis of COTS/SOUP. Reliab. Eng. Syst. Saf. 81(3): 291-301 (2003) - [c12]Robin E. Bloomfield, Bev Littlewood:
Multi-Legged Arguments: The Impact of Diversity upon Confidence in Dependability Arguments. DSN 2003: 25-34 - [c11]Peter G. Bishop, Robin E. Bloomfield:
Using a Log-normal Failure Rate Distribution for Worst Case Bound Reliability Prediction. ISSRE 2003: 237-245 - [c10]Peter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra, Claire Jones:
Integrity Static Analysis of COTS/SOUP. SAFECOMP 2003: 63-76 - 2002
- [c9]Robin E. Bloomfield, Sofia Guerra:
Process Modelling to Support Dependability Arguments. DSN 2002: 113-122 - [c8]Peter G. Bishop, Robin E. Bloomfield:
Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects. ISSRE 2002: 295-303 - [c7]Peter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra:
Software Criticality Analysis of COTS/SOUP. SAFECOMP 2002: 198-211 - 2001
- [c6]Mourad Oussalah, Hung T. Nguyen, Vladik Kreinovich, Robin E. Bloomfield, Martin Newby:
Theoretical foundation for iterative assessment of conditional confidence measures in the framework of conditional measure theoretic-approach. EUSFLAT Conf. 2001: 422-423 - 2000
- [c5]Robin E. Bloomfield, Dan Craigen, Frank Koob, Markus Ullmann, Stefan Wittmann:
Formal Methods Diffusion: Past Lessons and Future Prospects. SAFECOMP 2000: 211-226
1990 – 1999
- 1998
- [c4]Peter Bishop, Robin Bloomfield:
A Methodology for Safety Case Development. SSS 1998: 194-203 - 1996
- [j2]Peter G. Bishop, Robin E. Bloomfield:
A conservative theory for long-term reliability-growth prediction [of software]. IEEE Trans. Reliab. 45(4): 550-560 (1996) - [c3]Peter G. Bishop, Robin E. Bloomfield:
A conservative theory for long term reliability growth prediction. ISSRE 1996: 308-317 - [c2]Robin Bloomfield, John Bowers, Luke Emmet, Stephen Viller:
PERE: Evaluation and Improvement of Dependable Processes. SAFECOMP 1996: 322-331 - 1995
- [c1]Peter G. Bishop, Robin E. Bloomfield:
The SHIP Safety Case Approach. SAFECOMP 1995: 437-451
1980 – 1989
- 1988
- [e1]Robin E. Bloomfield, Lynn S. Marshall, Roger B. Jones:
VDM '88, VDM - The Way Ahead, 2nd VDM-Europe Symposium, Dublin, Ireland, September 11-16, 1988, Proceedings. Lecture Notes in Computer Science 328, Springer 1988, ISBN 3-540-50214-9 [contents] - 1986
- [j1]Robin E. Bloomfield, Peter K. D. Froome:
The Application of Formal Methods to the Assessment of High Integrity Software. IEEE Trans. Software Eng. 12(9): 988-993 (1986)
Coauthor Index
aka: Peter G. Bishop
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint