Janusz Górski

Orcid: 0000-0002-7397-9403

According to our database1, Janusz Górski authored at least 46 papers between 1976 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components.
Proceedings of the Resilience of Cyber-Physical Systems, 2019

2018
Towards automation of IT systems repairs.
Softw. Qual. J., 2018

Introducing agile practices into development processes of safety critical software.
Proceedings of the 19th International Conference on Agile Software Development, 2018

A summary of the 4th international workshop on agile development of safety-critical software (ASCS 2018).
Proceedings of the 19th International Conference on Agile Software Development, 2018

Session details: ASCS: 4th international workshop on agile development of safety-critical software.
Proceedings of the 19th International Conference on Agile Software Development, 2018

2017
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile.
Proceedings of the Computer Network Security, 2017

2016
AgileSafe - a method of introducing agile practices into safety-critical software development processes.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

2013
Towards Agile Development of Critical Software.
Proceedings of the Software Engineering for Resilient Systems, 5th International Workshop, 2013

Comparative Conformance Cases for Monitoring Multiple Implementations of Critical Requirements.
Proceedings of the Computer Safety, Reliability, and Security, 2013

2012
Assessment of Risks introduced to Safety Critical Software by Agile Practices - a Software Engineer's Perspective.
Comput. Sci., 2012

Supporting Assurance by Evidence-Based Argument Services.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Agile Development of Critical Software - Can It be Justified?.
Proceedings of the ENASE 2012, 2012

2011
Support for argument structures review and assessment.
Reliab. Eng. Syst. Saf., 2011

Experience with instantiating an automated testing process in the context of incremental and evolutionary software development.
e Informatica Softw. Eng. J., 2011

SCF - A framework supporting achieving and assessing conformity with standards.
Comput. Stand. Interfaces, 2011

2010
Context Sensitive Privacy Management in a Distributed Environment.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

2008
Expert Assessment of Arguments: A Method and Its Experimental Evaluation.
Proceedings of the Computer Safety, 2008

An Approach to Evaluation of Arguments in Trust Cases.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

2007
Extending GQM by Argument Structures.
Proceedings of the Balancing Agility and Formalism in Software Engineering, 2007

Trustworthiness: safety, security and privacy issues.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

Supporting Compliance with Security Standards by Trust Case Templates.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

2006
Empirical Evaluation of Reading Techniques for UML Models Inspection.
Int. Trans. Syst. Sci. Appl., 2006

An Approach for Evaluating Trust in IT Infrastructure.
Proceedings of the 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 2006

Hazard Prevention by Forced Time Constraints.
Proceedings of the 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 2006

Performance analysis of untraceability protocols for mobile agents using an adaptable framework.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

2005
Trust case: justifying trust in an IT solution.
Reliab. Eng. Syst. Saf., 2005

Untraceability of mobile agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

A model-based approach to analysis of authentication protocols.
Proceedings of the Information Processing and Security Systems., 2005

Tool support for detecting defects in object-oriented models.
Proceedings of the Enhanced Methods in Computer Security, 2005

How can we justify trust in software based systems?
Proceedings of the Enhanced Methods in Computer Security, 2005

2003
Safety of computer control systems: challenges and results in software development.
Annu. Rev. Control., 2003

An Approach to Trust Case Development.
Proceedings of the Computer Safety, 2003

2001
Formal Support for Fault Modelling and Analysis.
Proceedings of the Computer Safety, 2001

Software support for collaborative risk management.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001

2000
Failure Mode and Effect Analysis for Safety-Critical Systems with Software Components.
Proceedings of the Computer Safety, 2000

1998
Object Oriented Safety Analysis of an Extra High Voltage Substation Bay.
Proceedings of the Computer Safety, 1998

1996
Safety Analysis Based on Object-oriented Modelling of Critical Systems.
Proceedings of the 15th International Conference on Computer Safety, 1996

Deriving Real-Time Requirements for Software from Safety Analysis.
Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996

1995
Modeling Fault Trees Using Petri Nets.
Proceedings of the 14th International Conference on Computer Safety, 1995

Software Engineering Education: A <i>Dragging-Through</i> Approach.
Proceedings of the Software Engineering Education, 8th SEI CSEE Conference, New Orleans, LA, USA, March 29, 1995

1994
Formal specification and verification of a real-time kernel.
Proceedings of the Sixth Euromicro Workshop on Real-Time Systems, 1994

1987
Formal specification of basic mechanisms of a message passing kernel.
Microprocess. Microprogramming, 1987

1978
Sticky variables and memory optimization.
ACM SIGPLAN Notices, 1978

A Modular Representation of the Access Control System.
ACM SIGOPS Oper. Syst. Rev., 1978

1976
On Consecutive Storage of Records.
Proceedings of the Mathematical Foundations of Computer Science 1976, 1976


  Loading...