


default search action
International Journal of Critical Computer-Based Systems, Volume 1
Volume 1, Numbers 1/2/3, 2010
- Vasily V. Balashov

, Anatoly G. Bakhmurov, Maxim V. Chistolinov, Ruslan L. Smeliansky
, Dmitry Yu. Volkanov
, Nikita V. Youshchenko:
A hardware-in-the-loop simulation environment for real-time systems development and architecture evaluation. 5-23 - Vyacheslav S. Kharchenko

, Volodymyr Sklyar:
Scalable diversity-oriented decisions and technologies for dependable SoPC-based safety-critical computer systems and infrastructures. 24-40 - Victor V. Toporkov

, Alexey Tselishchev:
Safety scheduling strategies in distributed computing. 41-58 - Vasilis P. Koutras, Agapios N. Platis:

Semi-Markov performance modelling of a redundant system with partial, full and failed rejuvenation. 59-85 - Krzysztof Kepa

, Fearghal Morgan, Krzysztof Kosciuszkiewicz, Tomasz Surmacz
:
SeReCon: a secure reconfiguration controller for self-reconfigurable systems. 86-103 - Lukasz Krukowski, Jaroslaw Sugier:

Designing AES cryptographic unit for automatic implementation in low-cost FPGA devices. 104-116 - Janusz Biernat:

Fast fault-tolerant adders. 117-127 - Ian Philip Wolforth, Martin Walker

, Yiannis Papadopoulos
, Lars Grunske
:
Capture and reuse of composable failure patterns. 128-147 - Ervin Tóth, Zoltán Hornák, Gergely Tóth:

Protection system against overload and distributed denial of service attacks. 148-160 - Jan Magott, Marek Woda

:
Model for evaluation of SOA security metrics using attack graphs. 161-177 - Wojciech Tylman

:
Misuse-based intrusion detection using Bayesian networks. 178-190 - Wlodzimierz M. Zuberek

, Ilona Bluemke
, Donald C. Craig:
Modelling and performance analysis of component-based systems. 191-207 - Leszek Kotulski, Dariusz Dymek

:
Using UML(VR) for the support of the test data generation. 208-219 - Antonio da Silva

, José-Fernán Martínez, Alberto Gonzalez-Calero, Lourdes López-Santidrián
, Ana Belén García, Vicente Hernández
:
XML schema based fault set definition to improve fault injection tools interoperability. 220-237 - Krzysztof Sacha

:
Verification and implementation of software for dependable controllers. 238-254 - Tomasz Walkowiak

, Jacek Mazurkiewicz
:
Functional availability analysis of discrete transport system simulated by SSF tool. 255-266 - Bernhard Fechner

, Andre Osterloh:
A meta-level true random number generator. 267-279
Volume 1, Number 4, 2010
- Jesús J. Martinez Molina, Miguel A. Hernández Ruíz, Manuel Gil Pérez

, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta:
Event-driven architecture based on patterns for detecting complex attacks. 283-309 - Marco Domenico Aime, Paolo Carlo Pomi, Marco Vallini:

Ontology and algorithms for the dependable configuration of information systems. 310-335 - Andrea Bondavalli

, Lorenzo Falai, Stefano Porcarelli, Salvatore Sabina, Fabrizio Zanini:
Available and safe message freshness detection algorithm. 336-363 - Ibrahim Habli, Richard Hawkins, Tim Kelly:

Software safety: relating software assurance and software integrity. 364-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














