Jeffrey M. Voas

Orcid: 0000-0003-1139-3690

According to our database1, Jeffrey M. Voas authored at least 279 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Awards

IEEE Fellow

IEEE Fellow 2010, "For leadership in the development of trustworthy software, including improved metrics and process optimization".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Thoughts on Dependability.
Computer, April, 2024

Internet of Things-Flavored Chips.
Computer, April, 2024

Reliability Engineering in a Time of Rapidly Converging Technologies.
IEEE Trans. Reliab., March, 2024

Also in this Issue.
Computer, March, 2024

The Influencer.
Computer, March, 2024

"Thirsty" Computing.
Computer, February, 2024

Outlook 2024.
Computer, January, 2024

Niceties, Necessities, Antiquities, and Ubiquities.
Computer, January, 2024

Data Centers in Your Backyard?
Computer, January, 2024

2023
"Propagating" Disinformation.
Computer, December, 2023

Emerging Disruptive Technologies.
Computer, December, 2023

Hiding in the Shadows: Do Shadows Still Exist?
Computer, November, 2023

Lower Energy Large Language Models (LLMs).
Computer, October, 2023

Metaverse's Rise and Decline.
Computer, October, 2023

Social Media's Mental Health Quagmire.
Computer, October, 2023

"Sensoring" the Farm.
Computer, October, 2023

Are We Writing for Bots or Humans?
Computer, September, 2023

Dusting Off Your Resume.
Computer, August, 2023

In This Issue.
Computer, June, 2023

Disappearing.
Computer, June, 2023

"Frameworking" Carbon-Aware Computing Research.
Computer, May, 2023

Sustainable Blockchain?
Computer, May, 2023

Good Enough.
Computer, April, 2023

Nations Play Their Chips.
Computer, April, 2023

Thoughts on Automotive IoT.
Computer, March, 2023

Perfect Strangers.
Computer, March, 2023

Computing New Medicines.
Computer, February, 2023

Outlook 2023.
Computer, 2023

Is It Live, or Is It Deepfake?
Computer, 2023

Machining a Sixth Sense: Intuition.
Computer, 2023

Summary of Combinatorial methods for testing Internet of Things smart home systems.
Proceedings of the IEEE International Conference on Software Testing, Verification and Validation, ICST 2023, 2023

2022
Combinatorial methods for testing Internet of Things smart home systems.
Softw. Test. Verification Reliab., 2022

Ransomware as a Business (RaaB).
IT Prof., 2022

Outlook: Forward Thinking for 2022.
Computer, 2022

Energy Considerations.
Computer, 2022

Warming Your Chicken.
Computer, 2022

Crying "Cybersecurity!".
Computer, 2022

"Dumbing Down".
Computer, 2022

Carbon "Footprinting" IT.
Computer, 2022

Zero-Trust Artificial Intelligence?
Computer, 2022

RegTech's Rise.
Computer, 2022

Cyber Olympics: Game On!
Computer, 2022

Blockchain's Carbon and Environmental Footprints.
Computer, 2022

Ransomware: Pay to Play?
Computer, 2022

Cryptojacking.
Computer, 2022

Algorithms: Society's Invisible Puppeteers.
Computer, 2022

"Smarter" Seeking "Wiser".
Computer, 2022

Revisiting Software Metrology.
Computer, 2022

2021
Scarcity and Global Insecurity: The Semiconductor Shortage.
IT Prof., 2021

Piracy's Impact on "the Silver Screen".
IT Prof., 2021

Outlook 2021.
Computer, 2021

Confronting Your Digital Accuser.
Computer, 2021

"Opening" Banking.
Computer, 2021

Lost and Never Found.
Computer, 2021

Homework [EIC'S Message].
Computer, 2021

Online Eats "Food Courts".
Computer, 2021

Monetizing You.
Computer, 2021

Scarcity.
Computer, 2021

Is Anybody Listening?
Computer, 2021

Tell Me a Story.
Computer, 2021

About This Issue.
Computer, 2021

Computing and Socioeconomic Transformations.
Computer, 2021

Where's the Silicon?
Computer, 2021

Major Computing Technologies of the Past 75 Years.
Computer, 2021

Reproducibility, Fabrication, and Falsification.
Computer, 2021

Rearchitecting the Malls: The Shifting U.S. Retail Landscape.
Computer, 2021

Hackathons 101.
Computer, 2021

2020
Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet?
Computer, 2020

Rethinking Home, Office, School.
Computer, 2020

Cyberpandemics.
Computer, 2020

Citations and Letters.
Computer, 2020

The "Patching" Mentality.
Computer, 2020

Thoughts on Complexity, Trust, and Truth.
Computer, 2020

Reinventing Wheels.
Computer, 2020

Outlooks on Diverse Technologies.
Computer, 2020

A Value-Added Gem.
Computer, 2020

Algorithms, Algorithms, Algorithms.
Computer, 2020

Security or Privacy: Can You Have Both?
Computer, 2020

Cyberthreats in 2025.
Computer, 2020

5G, Security, and You.
Computer, 2020

Thoughts on General Data Protection Regulation and Online Human Surveillance.
Computer, 2020

Aggregating Atomic Clocks for Time-Stamping.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

2019
Innovations Using Blockchain-Part 2.
IT Prof., 2019

Innovations Using Blockchain-Part 1.
IT Prof., 2019

No Preconceptions.
IT Prof., 2019

Supply Chain Trust.
IT Prof., 2019

Predictions on Predictions.
Computer, 2019

Rethinking Distributed Ledger Technology.
Computer, 2019

Taking Score on the Success of Blockchain, So Far.
Computer, 2019

Thoughts on Cyberbullying.
Computer, 2019

Trusting Pirated Software.
Computer, 2019

Online Advertising Fraud.
Computer, 2019

2018
Blockchain-Enabled E-Voting.
IEEE Softw., 2018

Stakeholder Identification and Use Case Representation for Internet-of-Things Applications in Healthcare.
IEEE Syst. J., 2018

Building Caring Healthcare Systems in the Internet of Things.
IEEE Syst. J., 2018

Computer Science Education in 2018.
IT Prof., 2018

IoT Metrology.
IT Prof., 2018

A Closer Look at IoTs Things.
IT Prof., 2018

Blockchain in Developing Countries.
IT Prof., 2018

Smarter Education.
IT Prof., 2018

How Do You Create an Internet of Things Workforce?
IT Prof., 2018

IoT's Certification Quagmire.
Computer, 2018

Educating Next-Gen Computer Scientists.
Computer, 2018

Cybertrust in the IoT Age.
Computer, 2018

Cyberthreats under the Bed.
Computer, 2018

Hackings Brand-Equity Nexus.
Computer, 2018

Testing IoT Systems.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Keynote Talk #1.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
The Economics of "Fake News".
IT Prof., 2017

Do Crypto-Currencies Fuel Ransomware?
IT Prof., 2017

Trusting the Internet of Things.
IT Prof., 2017

The IoT Blame Game.
Computer, 2017

Curriculum Considerations for the Internet of Things.
Computer, 2017

Human Tagging.
Computer, 2017

What Happened to Software Metrics?
Computer, 2017

Verified Time.
Computer, 2017

Hacking Power Grids: A Current Problem.
Computer, 2017

Banking on Availability.
Computer, 2017

DDoS in the IoT: Mirai and Other Botnets.
Computer, 2017

"Alexa, Can I Trust You?".
Computer, 2017

2016
Caring: An Undiscovered "Super -ility" of Smart Healthcare.
IEEE Softw., 2016

Software is Driving Software Engineering?
IEEE Softw., 2016

Cybersecurity or Privacy [Guest editors' introduction].
IT Prof., 2016

Learning Internet-of-Things Security "Hands-On".
IEEE Secur. Priv., 2016

Insights on Formal Methods in Cybersecurity.
Computer, 2016

Demystifying the Internet of Things.
Computer, 2016

What Happened to Formal Methods for Security?
Computer, 2016

Communications and Privacy under Surveillance.
Computer, 2016

Standards for the Internet of Things: A Case Study in Disaster Response.
Computer, 2016

Metamorphic Testing for Cybersecurity.
Computer, 2016

Building Blocks of the Internet of Things.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Decoding the Mystery of the Internet of Things.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
So Where Are We? A Guest Opinion Editorial.
IEEE Trans. Reliab., 2015

The Internet of Anything and Sustainability.
IT Prof., 2015

Third-Party Software's Trust Quagmire.
Computer, 2015

Vetting Mobile App Vendors.
Computer, 2015

Securely Making "Things" Right.
Computer, 2015

Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem.
Computer, 2015

2014
NIST: Building a Solid Foundation.
IT Prof., 2014

Big Data, Networked Worlds.
Computer, 2014

Imagineering an Internet of Anything.
Computer, 2014

2013
STEM's Grand Challenge: Reviving Applied Mathematics.
IT Prof., 2013

Beyond the Cloud: Cyberphysical Systems.
IT Prof., 2013

Cloud Computing.
IT Prof., 2013

Does Security Trump Reliability?
Computer, 2013

2012
The Mobile Software App Takeover.
IEEE Softw., 2012

Software Testing: What Goes Around Comes Around.
IT Prof., 2012

BYOD: Security and Privacy Considerations.
IT Prof., 2012

Who Owns What? The Social Media Quagmire.
IT Prof., 2012

The Internet of Things: A Reality Check.
IT Prof., 2012

A Matter of Policy.
IT Prof., 2012

NASA Contributions to IT.
IT Prof., 2012

Building Security into Off-the-Shelf Smartphones.
Computer, 2012

Mobile Application and Device Power Usage Measurements.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Thoughts on Higher Education and Scientific Research.
IT Prof., 2011

Vetting Mobile Apps.
IT Prof., 2011

Mobile-App Addiction: Threat to Security?
IT Prof., 2011

Storytelling: From Cave Art to Digital Media.
IT Prof., 2011

The Evolution of Ubiquitously Intelligent Computing.
IT Prof., 2011

Timing Matters: Tackling Intractable Problems.
IT Prof., 2011

Certainty through Uncertainty?
Computer, 2011

2010
Effectively Defining "Shall Not" Requirements.
IT Prof., 2010

Free and Open Source Software.
IT Prof., 2010

Ethics and the Cloud.
IT Prof., 2010

Mobile Applications: The Fifth Cycle.
IT Prof., 2010

Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems.
IEEE Secur. Priv., 2010

In Trust We Trust.
Computer, 2010

A Nonlinear Perspective on Higher Education.
Computer, 2010

2009
Cloud Computing: New Wine or Just a New Bottle?
IT Prof., 2009

The Metaphysics of Software Trust.
IT Prof., 2009

Privacy and/or Security: Take Your Pick.
IT Prof., 2009

An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008.
IT Prof., 2009

Trustworthiness in Software Environments.
IT Prof., 2009

Cyberpandemics: History, Inevitability, Response.
IEEE Secur. Priv., 2009

Standards interoperability: Applying software safety assurance standards to the evolution of legacy software.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

2008
Software Product Certification.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations.
IT Prof., 2008

Information Integrity and IT Professionals' Integrity, Intertwined.
IT Prof., 2008

IT as a Profession: Is Competent Creation the Primary Goal?
IT Prof., 2008

Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are?
IT Prof., 2008

What's in a Name? Distinguishing between SaaS and SOA.
IT Prof., 2008

Standards Confusion and Harmonization.
Computer, 2008

Thirteen rules for trust.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
The Services Paradigm: Who Can You Trust?
IT Prof., 2007

A Baker's Dozen: 13 Software Engineering Challenges.
IT Prof., 2007

One in a Baker's Dozen: Debugging Debugging.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Improving the Predictable Assembly of Service-Oriented Architectures.
IEEE Softw., 2006

Software Certification Services: Encouraging Trust and Reasonable Expectations.
IT Prof., 2006

Software test cases: is one ever enough?
IT Prof., 2006

Reliability and Fault Tolerance in Trust.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

COMPSAC Panel Session on Trustworthy Computing.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
The Role of Policy in Balancing Outsourcing and Homeland Security.
IT Prof., 2005

2004
Software's Secret Sauce: The "-ilities".
IEEE Softw., 2004

Software Engineering's Role in Business.
IEEE Softw., 2004

Persistent Software Attributes.
IEEE Softw., 2004

Software Quality from a Behavioral Perspective.
IT Prof., 2004

Programming with Assertions: A Prospectus.
IT Prof., 2004

A Uniform Meta-Model for Mediating Formal Electronic Conferences.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
Trusted Software's Holy Grail.
Softw. Qual. J., 2003

Guest Editor's Introduction: Assuring Software Quality Assurance.
IEEE Softw., 2003

Adaptive Software Quality.
Proceedings of the ICEIS 2003, 2003

Challenges and Recent Advances in Developing Trustworthy Software-Based Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2001
Fault Tolerance.
IEEE Softw., 2001

Guest Editor's Introduction: Software Fault Tolerance-Making Software Behave.
IEEE Softw., 2001

Composing Software Component "ilities".
IEEE Softw., 2001

Quality Time - Faster, Better, and Cheaper.
IEEE Softw., 2001

Why testing software under expected operational profiles is not sufficient.
Softw. Focus, 2001

Discovering Unanticipated Software Output Modes.
Ann. Softw. Eng., 2001

Why Is It So Hard to Predict Software System Trustworthiness from Software Component Trustworthiness?.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Why Testing under Expected Operational Scenarios is Not Sufficient.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001

Software Dependability in Distributed and Mobile Computing Environments.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001

2000
Malicious IT - Guest Editors' Introduction.
IEEE Softw., 2000

Quality Time - A New Generation of Software Quality Conferences.
IEEE Softw., 2000

Quality Time - Will the Real Operational Profile Please Stand Up?
IEEE Softw., 2000

Quality Time - Can Chaotic Methods Improve Software Quality Predictions?
IEEE Softw., 2000

Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software?
IEEE Softw., 2000

Dependability certification of software components.
J. Syst. Softw., 2000

Toward a More Reliable Theory of Software Reliability.
Computer, 2000

Developing a Usage-Based Software Certification Process.
Computer, 2000

Defective software: An overview of legal remedies and technical measures available to consumers.
Adv. Comput., 2000

Limited Software Warranties.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000

Disposable COTS-Intensive Software Systems (A Position Statement).
Proceedings of the 4th European Conference on Software Maintenance and Reengineering, 2000

1999
Software Quality's Eight Greatest Myths.
IEEE Softw., 1999

Certifying Software for High-Assurance Environments.
IEEE Softw., 1999

Guest Editor's Introduction: Certification-Reducing the Hidden Costs of Poor Quality.
IEEE Softw., 1999

Quality Time - A US Government-Regulated Software Industry.
IEEE Softw., 1999

Quality Time - Does Untested Software Threaten Infrastructures?
IEEE Softw., 1999

Quality Time - Protecting Against What? The Achilles Heel of Information Assurance.
IEEE Softw., 1999

Disposable information systems: the future of software maintenance?
J. Softw. Maintenance Res. Pract., 1999

The Future of Computer Assurance.
Computer, 1999

Inoculating Software for Survivability.
Commun. ACM, 1999

A World Without Risks: Let Me Out!
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

COTS and High Assurance: An Oxymoron?
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

User Participation-based Software Certification.
Proceedings of the Validation and Verification of Knowledge Based Systems, 1999

Can Generic Software Be Assured?
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

1998
Maintaining Component-Based Systems.
IEEE Softw., 1998

COTS Software: The Economical Choice?
IEEE Softw., 1998

Certifying Off-the-Shelf Software Components.
Computer, 1998

The Challenges of Using COTS Software in Component-Based Development (Guest Editor's Introduction).
Computer, 1998

Does software reliability engineering (SRE) offer any benefits to mobile code's security woes?
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

Maintaining COTS-Based Systems: Is it Possible? (Panel).
Proceedings of the 1998 International Conference on Software Maintenance, 1998

Are COTS Products and Component Packaging Killing Software Malleability?
Proceedings of the 1998 International Conference on Software Maintenance, 1998

Agent Trustworthiness.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Certifying High Assurance Software.
Proceedings of the COMPSAC '98, 1998

1997
Software testability measurement for intelligent assertion placement.
Softw. Qual. J., 1997

Predicting How Badly "Good" Software Can Behave.
IEEE Softw., 1997

Quality Time: Can Clean Pipes Produce Dirty Water?
IEEE Softw., 1997

Quality Time: How Assertions Can Increase Test Effectiveness.
IEEE Softw., 1997

A 'Crystal Ball' for Software Liability.
Computer, 1997

Fault Injection for the Masses.
Computer, 1997

The Ability of Directed Tests to Predict Software Quality.
Ann. Softw. Eng., 1997

Panel: Qualifying The Reliability Of COTS Software Components.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Reducing uncertainty about common-mode failures.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

1996
Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them?
Proceedings of the 15th International Conference on Computer Safety, 1996

Investigating rare-event failure tolerance: reductions in future uncertainty.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

The Avalanche Paradigm: An Experimental Software Programming Technique for Improving Fault-tolerance.
Proceedings of the IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), 1996

1995
Software Testability: The New Verification.
IEEE Softw., 1995

Software Testability: An Experiment in Measuring Simulation Reusability.
Proceedings of the ACM SIGSOFT Symposium on Software Reusability, 1995

An Automated Code-Based Fault-Tree Mitigation Technique.
Proceedings of the 14th International Conference on Computer Safety, 1995

Predicting software's minimum-time-to-hazard and mean-time-to-hazard for rare input events.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995

Detecting program modules with low testability.
Proceedings of the International Conference on Software Maintenance, 1995

Software Testability Measurement for Assertion Placement and Fault Localization.
Proceedings of the Second International Workshop on Automated Debugging, 1995

1994
Views on Software Testability (Panel Abstract).
Proceedings of the 1994 International Symposium on Software Testing and Analysis, 1994

Putting assertions in their place.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994

1993
Semantic metrics for software testability.
J. Syst. Softw., 1993

Designing programs that are less likely to hide faults.
J. Syst. Softw., 1993

A framework for defining semantic metrics.
J. Syst. Softw., 1993

A model for detecting the existence of software corruption in real time.
Comput. Secur., 1993

Confidently Assessing a Zero Probability of Software Failure.
Proceedings of the 12th International Conference on Computer Safety, 1993

Faults on Its Sleeve: Amplifying Software Reliability Testing.
Proceedings of the 1993 International Symposium on Software Testing and Analysis, 1993

A software analysis technique for quantifying reliability in high-risk medical devices.
Proceedings of the Sixth Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'93), 1993

1992
PIE: A Dynamic Failure-Based Technique.
IEEE Trans. Software Eng., 1992

Estimating the Probability of Failure When Testing Reveals No Failures.
IEEE Trans. Software Eng., 1992

The Revealing Power of a Test Case.
Softw. Test. Verification Reliab., 1992

Improving the software development process using testability research.
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992

1991
Predicting Where Faults Can Hide from Testing.
IEEE Softw., 1991

On the inadequacies of data state space sampling as a measure of the trustworthiness of programs.
ACM SIGSOFT Softw. Eng. Notes, 1991

A Dynamic Failure Model for Predicting the Impact that a Program Location has on the Program.
Proceedings of the ESEC '91, 1991


  Loading...