default search action
Search dblp for Publications
export results for "toc:db/journals/ijccbs/ijccbs6.bht:"
@article{DBLP:journals/ijccbs/BennamaB16, author = {Miloud Bennama and Thouraya Bouabana{-}Tebibel}, title = {A CTL-based {OCL} extension using {CPN} {ML} for {UML} validation}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {4}, pages = {302--321}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.081807}, doi = {10.1504/IJCCBS.2016.081807}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/BennamaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/BhatiR16, author = {Bhoopesh Singh Bhati and Chandra Shekhar Rai}, title = {Intrusion detection systems and techniques: a review}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {3}, pages = {173--190}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.079077}, doi = {10.1504/IJCCBS.2016.079077}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/BhatiR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/CherfiaBB16, author = {Taha Abdelmoutaleb Cherfia and Fa{\"{\i}}za Belala and Kamel Barkaoui}, title = {A bigraph-based framework for specification and analysis of context-aware systems}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {4}, pages = {322--342}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.081808}, doi = {10.1504/IJCCBS.2016.081808}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/CherfiaBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/Chivers16, author = {Howard Chivers}, title = {Control consistency as a management tool: the identification of systematic security control weaknesses in air traffic management}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {3}, pages = {229--245}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.079079}, doi = {10.1504/IJCCBS.2016.079079}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/Chivers16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/DebbiDB16, author = {Hichem Debbi and Aimad Debbi and Mustapha Bourahla}, title = {Debugging of probabilistic systems using structural equation modelling}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {4}, pages = {250--274}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.081805}, doi = {10.1504/IJCCBS.2016.081805}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccbs/DebbiDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/LeverK16, author = {Kirsty E. Lever and Kashif Kifayat}, title = {Risk assessment and attack graph generation for collaborative infrastructures: a survey}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {3}, pages = {204--228}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.079081}, doi = {10.1504/IJCCBS.2016.079081}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/LeverK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/PaunMB16, author = {Vladimir{-}Alexandru Paun and Bruno Monsuez and Philippe Baufreton}, title = {Hierarchical timed abstract state machines for {WCET} estimation}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {4}, pages = {343--363}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.081810}, doi = {10.1504/IJCCBS.2016.081810}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/PaunMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/PeresG16, author = {Florent Peres and Mohamed Ghazel}, title = {A {\(\mathrm{\mu}\)}-calculus formulation of the diagnosability of discrete event systems}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {4}, pages = {275--301}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.081806}, doi = {10.1504/IJCCBS.2016.081806}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/PeresG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/SahliBB16, author = {Hamza Sahli and Fa{\"{\i}}za Belala and Chafia Bouanaka}, title = {Formal verification of cloud systems elasticity}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {4}, pages = {364--384}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.081809}, doi = {10.1504/IJCCBS.2016.081809}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccbs/SahliBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/SultanaK16, author = {H. Parveen Sultana and P. Venkata Krishna}, title = {Two-level medium access control in cyber physical system-based smart wireless networks}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {3}, pages = {191--203}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.079078}, doi = {10.1504/IJCCBS.2016.079078}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/SultanaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/AsimMK15, author = {Muhammad Asim and Hala M. Mokhtar and Muhammad Zahid Khan}, title = {An energy efficient management scheme for wireless sensor networks}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {2}, pages = {133--153}, year = {2015}, url = {https://doi.org/10.1504/IJCCBS.2015.073541}, doi = {10.1504/IJCCBS.2015.073541}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/AsimMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/BicchieraiBV15, author = {Irene Bicchierai and Giacomo Bucci and Enrico Vicario}, title = {Supporting {SW-FMEA} through an ontology-based methodology}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {1}, pages = {1--28}, year = {2015}, url = {https://doi.org/10.1504/IJCCBS.2015.068840}, doi = {10.1504/IJCCBS.2015.068840}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/BicchieraiBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/CeccarelliB15, author = {Andrea Ceccarelli and Andrea Bondavalli}, title = {On trustworthy measurements when testing dependable systems: a discussion and experiences}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {2}, pages = {154--170}, year = {2015}, url = {https://doi.org/10.1504/IJCCBS.2015.073543}, doi = {10.1504/IJCCBS.2015.073543}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/CeccarelliB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/KattaRKS15, author = {Vikash Katta and Christian Raspotnig and P{\'{e}}ter K{\'{a}}rp{\'{a}}ti and Tor St{\aa}lhane}, title = {Investigating fulfilment of traceability requirements in a combined process for safety and security assessments}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {2}, pages = {100--132}, year = {2015}, url = {https://doi.org/10.1504/IJCCBS.2015.073530}, doi = {10.1504/IJCCBS.2015.073530}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/KattaRKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/OussalahZ15, author = {Yasser Oussalah and Nadia Zeghib}, title = {Formal specification of flexible web service composition}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {2}, pages = {81--99}, year = {2015}, url = {https://doi.org/10.1504/IJCCBS.2015.073517}, doi = {10.1504/IJCCBS.2015.073517}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/OussalahZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/ProsvirnovaR15, author = {Tatiana Prosvirnova and Antoine Rauzy}, title = {Automated generation of minimal cut sets from AltaRica 3.0 models}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {1}, pages = {50--80}, year = {2015}, url = {https://doi.org/10.1504/IJCCBS.2015.068852}, doi = {10.1504/IJCCBS.2015.068852}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/ProsvirnovaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/VyasM15, author = {Pankaj Vyas and R. K. Mittal}, title = {The applications of {SFTA} and {SFMEA} approaches during software development process: an analytical review}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {1}, pages = {29--49}, year = {2015}, url = {https://doi.org/10.1504/IJCCBS.2015.068851}, doi = {10.1504/IJCCBS.2015.068851}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/VyasM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.