Aad P. A. van Moorsel

According to our database1, Aad P. A. van Moorsel
  • authored at least 100 papers between 1992 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?
IEEE Security & Privacy, 2017

Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

2016
Modeling and analysis of influence power for information security decisions.
Perform. Eval., 2016

WRAD: Tool Support for Workflow Resiliency Analysis and Design.
Proceedings of the Software Engineering for Resilient Systems - 8th International Workshop, 2016

NFC Payment Spy: A Privacy Attack on Contactless Payments.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

2015
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software.
JoWUA, 2015

Resiliency Variance in Workflows with Choice.
Proceedings of the Software Engineering for Resilient Systems - 7th International Workshop, 2015

Impact of Policy Design on Workflow Resiliency Computation Time.
Proceedings of the Quantitative Evaluation of Systems, 12th International Conference, 2015

Modelling user availability in workflow resiliency analysis.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Optimisation of data collection strategies for model-based evaluation and decision-making: poster.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Nudging towards security: developing an application for wireless network selection for android phones.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2014
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

A Formal Model for Soft Enforcement: Influencing the Decision-Maker.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Nudging for Quantitative Access Control Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment.
Proceedings of the Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience, 2014

Quantitative Workflow Resiliency.
Proceedings of the Computer Security - ESORICS 2014, 2014

A Decision Making Model of Influencing Behavior in Information Security.
Proceedings of the Computer Performance Engineering - 11th European Workshop, 2014

Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Performance Modelling and Evaluation of Enterprise Information Security Technologies.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Defense-in-Depth Against Malicious Insiders in the Cloud.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

Risks of Offline Verify PIN on Contactless Cards.
Proceedings of the Financial Cryptography and Data Security, 2013

Detection of attack strategies.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

A Generic Logging Template for Infrastructure as a Service Cloud.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Optimization of data collection strategies for model-based evaluation and decision-making.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Deriving requirements for an online community interaction scheme: indications from older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Uncertainty and Uncertainty Tolerance in Service Provisioning.
J. Internet Serv. Inf. Secur., 2011

A Community Knowledge Base for IT Security.
IT Professional, 2011

It All Depends, and Increasingly So.
IEEE Security & Privacy, 2011

Quantitative Evaluation of Enterprise DRM Technology.
Electr. Notes Theor. Comput. Sci., 2011

Formal Mapping of WSLA Contracts on Stochastic Models.
Proceedings of the Computer Performance Engineering, 2011

The case for dynamic security solutions in public cloud workflow deployments.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2010
Evaluating the adaptivity of computing systems.
Perform. Eval., 2010

A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Design and implementation of user-managed access framework for web 2.0 applications.
Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing, 2010

Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Ontology Editing Tool for Information Security and Human Factors Experts.
Proceedings of the KMIS 2010, 2010

User-managed access to web resources.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

10292 Abstracts Collection and Summary - Resilience Assessment and Evaluation.
Proceedings of the Resilience Assessment and Evaluation, 18.07. - 23.07.2010, 2010

A collaborative ontology development tool for information security managers.
Proceedings of the 4th ACM Symposium on Computer Human Interaction for Management of Information Technology, 2010

2009
An information security ontology incorporating human-behavioural implications.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A Knowledge Base for Justified Information Security Decision-making.
Proceedings of the ICSOFT 2009, 2009

An Architecture for Cross-Cloud System Management.
Proceedings of the Contemporary Computing - Second International Conference, 2009

Fast Generation of Scale Free Networks with Directed Arcs.
Proceedings of the Computer Performance Engineering, 2009

Introduction to the proceedings of the EDOC 2009 workshop Middleware for Web Services (MWS) 2009.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

Dependability in the cloud: Challenges and opportunities.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Panel: Complexity and Resilience.
Proceedings of the Computer Safety, 2008

Runtime Security Adaptation Using Adaptive SSL.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Efficient Resource Management for Game Server Hosting.
Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 2008

The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

Architecting Dependable Access Control Systems for Multi-domain Computing Environments.
Proceedings of the Architecting Dependable Systems VI, 2008

Logging based IP Traceback in switched ethernets.
Proceedings of the First European Workshop on System Security, 2008

Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust.
Proceedings of the Computer Performance Engineering, 2008

Introduction to the Proceedings of the EDOC 2008 Workshop Middleware for Web Services (MWS) 2008.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

COTraSE: Connection Oriented Traceback in Switched Ethernet.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Adaptive SSL: Design, Implementation and Overhead Analysis.
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007

DOA 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Evaluation of P2P Search Algorithms for Discovering Trust Paths.
Proceedings of the Formal Methods and Stochastic Models for Performance Evaluation, 2007

Introduction to the Proceedings of the EDOC 2007 Workshop Middleware for Web Services (MWS) 2007.
Proceedings of the Workshops Proceedings of the 11th International IEEE Enterprise Distributed Object Computing Conference, 2007

2006
Analysis of Restart Mechanisms in Software Systems.
IEEE Trans. Software Eng., 2006

The Fast and the Fair: A Fault-Injection-Driven Comparison of Restart Oracles for Reliable Web Services.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006

Experimental Analysis of the Correlation of HTTP GET Invocations.
Proceedings of the Formal Methods and Stochastic Models for Performance Evaluation, 2006

Introduction to the Proceedings of the EDOC 2006 Workshop Middleware for Web Services (MWS) 2006.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

Secure and Provable Service Support for Human-Intensive Real-Estate Processes.
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006

2005
Grid, Management and Self-Management.
Comput. J., 2005

On Best-Effort and Dependability, Service-Orientation and Panacea.
Proceedings of the Service Availability, 2005

The Self-Star Vision.
Proceedings of the Self-star Properties in Complex Information Systems, 2005

2004
Optimal restart times for moments of completion time.
IEE Proceedings - Software, 2004

Analysis and Algorithms for Restart.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

Meeting Deadlines through Restart.
Proceedings of the MMB & PGTS 2004, 2004

A Measurement Study of the Interplay Between Application Level Restart and Transport Protocol.
Proceedings of the Service Availability, 2004

The Role of Agreements in IT Management Software.
Proceedings of the Architecting Dependable Systems III [the book is a result of the ICSE 2004 and DSN 2004 workshops], 2004

2003
Managed Utility Computing.
Proceedings of the 4th International Conference on Web Information Systems Engineering, 2003

Managed Utility Computing: The Grid as Management Backplane.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Web Services Management Network: An Overlay Network for Federated Service Management.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

Management +=Grid.
Proceedings of the Self-Managing Distributed Systems, 2003

First Workshop on the Design of Self-Managing Systems.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Specifying and Monitoring Guarantees in Commercial Grids through SLA.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

2002
Optimal allocation of test resources for software reliability growth modeling in software development.
IEEE Trans. Reliability, 2002

Ten-Step Survival Guide for the Emerging Business Web.
Proceedings of the Web Services, 2002

Automated SLA Monitoring for Web Services.
Proceedings of the Management Technologies for E-Commerce and E-Business Applications, 2002

1999
The 'QoS Query Service' for Improved Quality-of-Service Decision Making in CORBA.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

1998
A methodology for detection and estimation of software aging.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

Numerical Solution of Non-Homogeneous Markov Processes through Uniformization.
Proceedings of the 12<sup>th</sup> European Simulation Multiconference - Simulation, 1998

Reusable Software Components for Performability Tools and Their Utilization for Web-Based Configurable Tools.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 1998

1997
Optimization of reliability allocation and testing schedule for software systems.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

1996
Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures.
IEEE Trans. Software Eng., 1996

Expected Impulsive Rewards in Markov Regenerative Stochastic Petri Nets.
Proceedings of the Application and Theory of Petri Nets 1996, 1996

Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models.
Proceedings of the Proceedings 29st Annual Simulation Symposium (SS '96), 1996

1995
Algorithms for the generation of state-level representations of stochastic activity networks with general reward structures.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

Using the probabilistic evaluation tool for the analytical solution of large Markov models.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

UltraSAN version 3 overview.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

1994
Xmgm: Performance Modeling Using Matrix Geometric Techniques.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Performability evaluation concepts and techniques.
PhD thesis, 1993

1992
A Method for Analysing the Performance Aspects of the Fault-Tolerance Mechanisms in FDDI.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992


  Loading...