default search action
Aad P. A. van Moorsel
Aad van Moorsel
Person information
- affiliation: University of Newcastle, School of Computing Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j25]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems. Int. J. Inf. Sec. 23(2): 981-997 (2024) - 2023
- [c114]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. ESORICS Workshops (2) 2023: 569-584 - [c113]Karolis Zilius, Tasos Spiliotopoulos, Aad van Moorsel:
A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns. ICWSM 2023: 1112-1121 - [i19]Karolis Zilius, Tasos Spiliotopoulos, Aad van Moorsel:
A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns. CoRR abs/2301.06601 (2023) - [i18]Zilong Zhao, Han Wu, Aad van Moorsel, Lydia Y. Chen:
GTV: Generating Tabular Data via Vertical Federated Learning. CoRR abs/2302.01706 (2023) - [i17]Ehsan Toreini, Maryam Mehrnezhad, Aad van Moorsel:
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems. CoRR abs/2309.06061 (2023) - 2022
- [j24]Maher Alharby, Aad van Moorsel:
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study. Int. J. Netw. Manag. 32(2) (2022) - [c112]Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel:
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy. ISSRE 2022: 193-204 - [c111]Han Wu, Holland Qian, Huaming Wu, Aad van Moorsel:
LDRNet: Enabling Real-Time Document Localization on Mobile Devices. PKDD/ECML Workshops (1) 2022: 618-629 - [c110]Daria Smuseva, Ivan Malakhov, Andrea Marin, Aad van Moorsel, Sabina Rossi:
Verifier's Dilemma in Ethereum Blockchain: A Quantitative Analysis. QEST 2022: 317-336 - [i16]Magdalene Ng, Kovila P. L. Coopamootoo, Tasos Spiliotopoulos, Dave Horsfall, Mhairi Aitken, Ehsan Toreini, Karen Elliott, Aad van Moorsel:
In Private, Secure, Conversational FinBots We Trust. CoRR abs/2204.10344 (2022) - [i15]Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel:
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy. CoRR abs/2210.06856 (2022) - 2021
- [j23]Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel:
The OpBench Ethereum opcode benchmark framework: Design, implementation, validation and experiments. Perform. Evaluation 146: 102168 (2021) - [c109]Isaac Matthews, Sadegh Soudjani, Aad van Moorsel:
Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs. SciSec 2021: 171-186 - [i14]Isaac Matthews, Sadegh Soudjani, Aad van Moorsel:
Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs. CoRR abs/2103.10212 (2021) - [i13]Tasos Spiliotopoulos, Dave Horsfall, Magdalene Ng, Kovila P. L. Coopamootoo, Aad van Moorsel, Karen Elliott:
Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials. CoRR abs/2106.06053 (2021) - [i12]Karen Elliott, Kovila P. L. Coopamootoo, Edward Curran, Paul D. Ezhilchelvan, Samantha Finnigan, Dave Horsfall, Zhichao Ma, Magdalene Ng, Tasos Spiliotopoulos, Han Wu, Aad van Moorsel:
Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion. CoRR abs/2112.09767 (2021) - 2020
- [j22]Mhairi Aitken, Ehsan Toreini, Peter Carmichael, Kovila P. L. Coopamootoo, Karen Elliott, Aad van Moorsel:
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Big Data Soc. 7(1): 205395172090889 (2020) - [j21]Paul D. Ezhilchelvan, Amjad Aldweesh, Aad van Moorsel:
Non-blocking two-phase commit using blockchain. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j20]Maher Alharby, Aad van Moorsel:
BlockSim: An Extensible Simulation Tool for Blockchain Systems. Frontiers Blockchain 3: 28 (2020) - [j19]Deepak Puthal, Laurence T. Yang, Schahram Dustdar, Zhenyu Wen, Jun Song, Aad van Moorsel, Rajiv Ranjan:
A User-centric Security Solution for Internet of Things and Edge Convergence. ACM Trans. Cyber Phys. Syst. 4(3): 32:1-32:19 (2020) - [c108]Roben Castagna Lunardi, Maher Alharby, Henry C. Nunes, Avelino F. Zorzo, Changyu Dong, Aad van Moorsel:
Context-based consensus for appendable-block blockchains. Blockchain 2020: 401-408 - [c107]Maher Alharby, Aad van Moorsel:
Fitting and Regression for Distributions of Ethereum Smart Contracts. BRAINS 2020: 248-255 - [c106]Maher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel:
Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma. DSN 2020: 209-220 - [c105]Mhairi Aitken, Magdalene Ng, Ehsan Toreini, Aad van Moorsel, Kovila P. L. Coopamootoo, Karen Elliott:
Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 21-38 - [c104]Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance. EuroS&P Workshops 2020: 190-199 - [c103]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel:
The relationship between trust in AI and trustworthy machine learning technologies. FAT* 2020: 272-283 - [c102]Isaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel:
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. TrustCom 2020: 129-136 - [p2]Katinka Wolter, Tommi Pesu, Aad van Moorsel, William J. Knottenbelt:
Black-Box Models for Restart, Reboot and Rejuvenation. Handbook of Software Aging and Rejuvenation 2020: 155-194 - [i11]Maher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel:
Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma. CoRR abs/2004.12768 (2020) - [i10]Maher Alharby, Aad van Moorsel:
BlockSim: An Extensible Simulation Tool for Blockchain Systems. CoRR abs/2004.13438 (2020) - [i9]Isaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel:
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. CoRR abs/2005.06350 (2020) - [i8]Magdalene Ng, Kovila P. L. Coopamootoo, Ehsan Toreini, Mhairi Aitken, Karen Elliott, Aad van Moorsel:
Simulating the Effects of Social Presence on Trust, Privacy Concerns \& Usage Intentions in Automated Bots for Finance. CoRR abs/2006.15449 (2020) - [i7]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Vladimiro González-Zelaya, Paolo Missier, Magdalene Ng, Aad van Moorsel:
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context. CoRR abs/2007.08911 (2020) - [i6]Mohammed Aamir Ali, Thomas Groß, Aad van Moorsel:
Investigation of 3-D Secure's Model for Fraud Detection. CoRR abs/2009.12390 (2020)
2010 – 2019
- 2019
- [j18]Rathin Chandra Shit, Suraj Sharma, Deepak Puthal, Philip James, Biswajeet Pradhan, Aad van Moorsel, Albert Y. Zomaya, Rajiv Ranjan:
Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World. IEEE Commun. Surv. Tutorials 21(4): 3532-3564 (2019) - [j17]Mutaz Barika, Saurabh Kumar Garg, Albert Y. Zomaya, Lizhe Wang, Aad van Moorsel, Rajiv Ranjan:
Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions. ACM Comput. Surv. 52(5): 95:1-95:41 (2019) - [j16]Mohammed Aamir Ali, Muhammad Ajmal Azad, Mario Parreño Centeno, Feng Hao, Aad van Moorsel:
Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Gener. Comput. Syst. 100: 408-427 (2019) - [c101]Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel:
OpBench: A CPU Performance Benchmark for Ethereum Smart Contract Operation Code. Blockchain 2019: 274-281 - [c100]Mario Parreño Centeno, Mohammed Aamir Ali, Yu Guan, Aad van Moorsel:
Unsupervised Machine Learning for Card Payment Fraud Detection. CRiSIS 2019: 247-262 - [c99]Mohammed Aamir Ali, Aad van Moorsel:
Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol. Financial Cryptography 2019: 201-221 - [i5]Ehsan Toreini, Mhairi Aitken, Kovila P. L. Coopamootoo, Karen Elliott, Carlos Gonzalez Zelaya, Aad van Moorsel:
The relationship between trust in AI and trustworthy machine learning technologies. CoRR abs/1912.00782 (2019) - 2018
- [j15]Aad van Moorsel:
Benchmarks and Models for Blockchain: Consensus Algorithms. SIGMETRICS Perform. Evaluation Rev. 46(3): 113 (2018) - [j14]Maher Alharby, Aad van Moorsel:
BlockSim: A Simulation Framework for Blockchain Systems. SIGMETRICS Perform. Evaluation Rev. 46(3): 135-138 (2018) - [c98]Amjad Aldweesh, Maher Alharby, Aad van Moorsel:
Performance Benchmarking for Ethereum Opcodes. AICCSA 2018: 1-2 - [c97]Amjad Aldweesh, Maher Alharby, Ellis Solaiman, Aad van Moorsel:
Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum. EDCC 2018: 144-149 - [c96]Mario Parreño Centeno, Yu Guan, Aad van Moorsel:
Mobile Based Continuous Authentication Using Deep Features. EMDL@MobiSys 2018: 19-24 - [c95]Paul D. Ezhilchelvan, Amjad Aldweesh, Aad van Moorsel:
Non-Blocking Two Phase Commit Using Blockchain. CRYBLOCK@MobiSys 2018: 36-41 - [c94]Mohammed Aamir Ali, Thomas Groß, Aad van Moorsel:
Investigation of 3-D secure's model for fraud detection. STAST 2018: 3:1-3:11 - [c93]Aad van Moorsel:
Benchmarks and Models for Blockchain. ICPE 2018: 3 - [i4]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. IACR Cryptol. ePrint Arch. 2018: 489 (2018) - 2017
- [j13]Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad P. A. van Moorsel:
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Secur. Priv. 15(2): 78-86 (2017) - [j12]Rajiv Ranjan, Jedsada Phengsuwan, Philip James, Stuart L. Barr, Aad van Moorsel:
Urban Risk Analytics in the Cloud. IT Prof. 19(2): 4-9 (2017) - [c92]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CCS 2017: 211-227 - [c91]John C. Mace, Nipun Balan Thekkummal, Charles Morisset, Aad van Moorsel:
ADaCS: A Tool for Analysing Data Collection Strategies. EPEW 2017: 230-245 - [c90]Aad P. A. van Moorsel, Matthew Forshaw, Francisco Rocha:
Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case. ISSRE 2017: 240-249 - [c89]Mario Parreño Centeno, Aad van Moorsel, Stefano Castruccio:
Smartphone Continuous Authentication Using Deep Learning Autoencoders. PST 2017: 147-158 - [c88]Mohammed Alqahtani, Aad van Moorsel:
Risk Assessment Methodology For EMV Financial Transaction Systems. UKPEW 2017: 137-150 - [c87]Maher Alharby, Aad van Moorsel:
The Impact of Profit Uncertainty on Miner Decisions in Blockchain Systems. UKPEW 2017: 151-167 - [i3]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CoRR abs/1708.01171 (2017) - [i2]Maher Alharby, Aad van Moorsel:
Blockchain-based Smart Contracts: A Systematic Mapping Study. CoRR abs/1710.06372 (2017) - 2016
- [j11]Iryna Yevseyeva, Charles Morisset, Aad P. A. van Moorsel:
Modeling and analysis of influence power for information security decisions. Perform. Evaluation 98: 36-51 (2016) - [c86]Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao, Aad P. A. van Moorsel:
NFC Payment Spy: A Privacy Attack on Contactless Payments. SSR 2016: 92-111 - [c85]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
WRAD: Tool Support for Workflow Resiliency Analysis and Design. SERENE 2016: 79-87 - 2015
- [j10]Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, Ed Ruck-Keene:
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 3-46 (2015) - [c84]James Turland, Lynne M. Coventry, Debora Jeske, Pam Briggs, Aad P. A. van Moorsel:
Nudging towards security: developing an application for wireless network selection for android phones. BCS HCI 2015: 193-201 - [c83]Andrew Stephen McGough, David Wall, John Brennan, Georgios Theodoropoulos, Ed Ruck-Keene, Budi Arief, Carl Gamble, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis:
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). MIST@CCS 2015: 1-12 - [c82]Iryna Yevseyeva, Vitor Basto-Fernandes, Michael Emmerich, Aad van Moorsel:
Selecting Optimal Subset of Security Controls. CENTERIS/ProjMAN/HCist 2015: 1035-1042 - [c81]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Modelling user availability in workflow resiliency analysis. HotSoS 2015: 7:1-7:10 - [c80]Robert Cain, Aad P. A. van Moorsel:
Optimisation of data collection strategies for model-based evaluation and decision-making: poster. HotSoS 2015: 28:1-28:2 - [c79]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Impact of Policy Design on Workflow Resiliency Computation Time. QEST 2015: 244-259 - [c78]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Resiliency Variance in Workflows with Choice. SERENE 2015: 128-143 - 2014
- [c77]Wen Zeng, Maciej Koutny, Aad P. A. van Moorsel:
Performance Modelling and Evaluation of Enterprise Information Security Technologies. CIT 2014: 504-511 - [c76]Martin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel:
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. CCS 2014: 716-726 - [c75]Iryna Yevseyeva, Charles Morisset, Thomas Groß, Aad P. A. van Moorsel:
A Decision Making Model of Influencing Behavior in Information Security. EPEW 2014: 194-208 - [c74]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Quantitative Workflow Resiliency. ESORICS (1) 2014: 344-361 - [c73]Lynne M. Coventry, Pam Briggs, Debora Jeske, Aad P. A. van Moorsel:
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment. HCI (8) 2014: 229-239 - [c72]Charles Morisset, Thomas Groß, Aad P. A. van Moorsel, Iryna Yevseyeva:
Nudging for Quantitative Access Control Systems. HCI (24) 2014: 340-351 - [c71]Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad P. A. van Moorsel:
A Formal Model for Soft Enforcement: Influencing the Decision-Maker. STM 2014: 113-128 - [c70]Budi Arief, Kovila P. L. Coopamootoo, Martin Emms, Aad P. A. van Moorsel:
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. WPES 2014: 201-204 - 2013
- [c69]Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel:
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms. CD-ARES Workshops 2013: 321-336 - [c68]Suliman A. Alsuhibany, Aad P. A. van Moorsel:
Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets. ARES 2013: 437-445 - [c67]Winai Wongthai, Francisco Liberal Rocha, Aad P. A. van Moorsel:
A Generic Logging Template for Infrastructure as a Service Cloud. AINA Workshops 2013: 1153-1160 - [c66]Suliman A. Alsuhibany, Charles Morisset, Aad P. A. van Moorsel:
Detection of attack strategies. CRiSIS 2013: 1-8 - [c65]Martin Emms, Budi Arief, Nicholas Little, Aad P. A. van Moorsel:
Risks of Offline Verify PIN on Contactless Cards. Financial Cryptography 2013: 313-321 - [c64]Francisco Rocha, Thomas Gross, Aad P. A. van Moorsel:
Defense-in-Depth Against Malicious Insiders in the Cloud. IC2E 2013: 88-97 - 2012
- [c63]Martin Emms, Budi Arief, Aad P. A. van Moorsel:
Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. APF 2012: 203-214 - [c62]David Greathead, Lynne M. Coventry, Budi Arief, Aad P. A. van Moorsel:
Deriving requirements for an online community interaction scheme: indications from older adults. CHI Extended Abstracts 2012: 1541-1546 - [c61]Robert Cain, Aad P. A. van Moorsel:
Optimization of data collection strategies for model-based evaluation and decision-making. DSN 2012: 1-10 - [e4]Katinka Wolter, Alberto Avritzer, Marco Vieira, Aad P. A. van Moorsel:
Resilience Assessment and Evaluation of Computing Systems. Springer 2012, ISBN 978-3-642-29031-2 [contents] - 2011
- [j9]Mohamed Kaâniche, Aad P. A. van Moorsel:
It All Depends, and Increasingly So. IEEE Secur. Priv. 9(6): 56-57 (2011) - [j8]Stefan Fenz, Simon Edward Parkin, Aad P. A. van Moorsel:
A Community Knowledge Base for IT Security. IT Prof. 13(3): 24-30 (2011) - [j7]Johari Abdullah, Aad P. A. van Moorsel:
Uncertainty and Uncertainty Tolerance in Service Provisioning. J. Internet Serv. Inf. Secur. 1(4): 89-109 (2011) - [c60]Budi Arief, Aad P. A. van Moorsel, David Greathead, Lynne M. Coventry:
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies. CASoN 2011: 25-30 - [c59]John C. Mace, Aad P. A. van Moorsel, Paul Watson:
The case for dynamic security solutions in public cloud workflow deployments. DSN Workshops 2011: 111-116 - [c58]Rouaa Yassin Kassab, Aad P. A. van Moorsel:
Formal Mapping of WSLA Contracts on Stochastic Models. EPEW 2011: 117-132 - [c57]Wen Zeng, Aad P. A. van Moorsel:
Quantitative Evaluation of Enterprise DRM Technology. PASM@ICPE 2011: 159-174 - 2010
- [j6]Philipp Reinecke, Katinka Wolter, Aad P. A. van Moorsel:
Evaluating the adaptivity of computing systems. Perform. Evaluation 67(8): 676-693 (2010) - [c56]John C. Mace, Simon Edward Parkin, Aad P. A. van Moorsel:
A collaborative ontology development tool for information security managers. CHIMIT 2010: 5 - [c55]Maciej P. Machulak, Eve Maler, Domenico Catalano, Aad P. A. van Moorsel:
User-managed access to web resources. Digital Identity Management 2010: 35-44 - [c54]John C. Mace, Simon Edward Parkin, Aad P. A. van Moorsel:
Ontology Editing Tool for Information Security and Human Factors Experts. KMIS 2010: 207-212 - [c53]Maciej P. Machulak, Aad P. A. van Moorsel:
Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications. ICDCS Workshops 2010: 62-71 - [c52]Maciej P. Machulak, Lukasz Moren, Aad P. A. van Moorsel:
Design and implementation of user-managed access framework for web 2.0 applications. MW4SOC 2010: 1-6 - [c51]Simon E. Parkin, Aad P. A. van Moorsel, Philip Inglesant, Martina Angela Sasse:
A stealth approach to usable security: helping IT security managers to identify workable security solutions. NSPW 2010: 33-50 - [p1]Chris Smith, Aad van Moorsel:
Mitigating Provider Uncertainty in Service Provision Contracts. Economic Models and Algorithms for Distributed Systems 2010: 143-159 - [e3]Alberto Avritzer, Aad P. A. van Moorsel, Katinka Wolter:
Resilience Assessment and Evaluation, 18.07. - 23.07.2010. Dagstuhl Seminar Proceedings 10292, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i1]Alberto Avritzer, Aad P. A. van Moorsel, Katinka Wolter:
10292 Abstracts Collection and Summary - Resilience Assessment and Evaluation. Resilience Assessment and Evaluation 2010
2000 – 2009
- 2009
- [c50]Kaustubh R. Joshi, Guy Bunker, Farnam Jahanian, Aad P. A. van Moorsel, Joseph Weinman:
Dependability in the cloud: Challenges and opportunities. DSN 2009: 103-104 - [c49]Hye-young Paik, Karl M. Göschka, Aad P. A. van Moorsel, Raymond K. Wong, Ian Warren:
Introduction to the proceedings of the EDOC 2009 workshop Middleware for Web Services (MWS) 2009. EDOCW 2009: 72-73 - [c48]Huqiu Zhang, Aad P. A. van Moorsel:
Fast Generation of Scale Free Networks with Directed Arcs. EPEW 2009: 131-148 - [c47]Ravi Teja Dodda, Chris Smith, Aad P. A. van Moorsel:
An Architecture for Cross-Cloud System Management. IC3 2009: 556-567 - [c46]Daria Stepanova, Simon Edward Parkin, Aad P. A. van Moorsel:
A Knowledge Base for Justified Information Security Decision-making. ICSOFT (2) 2009: 326-331 - [c45]Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles:
An information security ontology incorporating human-behavioural implications. SIN 2009: 46-55 - 2008
- [c44]Marios S. Andreou, Aad P. A. van Moorsel:
COTraSE: Connection Oriented Traceback in Switched Ethernet. IAS 2008: 198-204 - [c43]