Jeffrey M. Voas

According to our database1, Jeffrey M. Voas authored at least 196 papers between 1991 and 2019.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Awards

IEEE Fellow

IEEE Fellow 2010, "For leadership in the development of trustworthy software, including improved metrics and process optimization".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Innovations Using Blockchain-Part 2.
IT Professional, 2019

Innovations Using Blockchain-Part 1.
IT Professional, 2019

No Preconceptions.
IT Professional, 2019

Supply Chain Trust.
IT Professional, 2019

Rethinking Distributed Ledger Technology.
IEEE Computer, 2019

Taking Score on the Success of Blockchain, So Far.
IEEE Computer, 2019

Thoughts on Cyberbullying.
IEEE Computer, 2019

Trusting Pirated Software.
IEEE Computer, 2019

Online Advertising Fraud.
IEEE Computer, 2019

2018
Blockchain-Enabled E-Voting.
IEEE Software, 2018

Stakeholder Identification and Use Case Representation for Internet-of-Things Applications in Healthcare.
IEEE Systems Journal, 2018

Building Caring Healthcare Systems in the Internet of Things.
IEEE Systems Journal, 2018

Computer Science Education in 2018.
IT Professional, 2018

IoT Metrology.
IT Professional, 2018

A Closer Look at IoTs Things.
IT Professional, 2018

Blockchain in Developing Countries.
IT Professional, 2018

Smarter Education.
IT Professional, 2018

How Do You Create an Internet of Things Workforce?
IT Professional, 2018

IoT's Certification Quagmire.
IEEE Computer, 2018

Educating Next-Gen Computer Scientists.
IEEE Computer, 2018

Cybertrust in the IoT Age.
IEEE Computer, 2018

Cyberthreats under the Bed.
IEEE Computer, 2018

Hackings Brand-Equity Nexus.
IEEE Computer, 2018

Testing IoT Systems.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Keynote Talk #1.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
The Economics of "Fake News".
IT Professional, 2017

Do Crypto-Currencies Fuel Ransomware?
IT Professional, 2017

Trusting the Internet of Things.
IT Professional, 2017

The IoT Blame Game.
IEEE Computer, 2017

Curriculum Considerations for the Internet of Things.
IEEE Computer, 2017

Human Tagging.
IEEE Computer, 2017

What Happened to Software Metrics?
IEEE Computer, 2017

Verified Time.
IEEE Computer, 2017

Hacking Power Grids: A Current Problem.
IEEE Computer, 2017

Banking on Availability.
IEEE Computer, 2017

DDoS in the IoT: Mirai and Other Botnets.
IEEE Computer, 2017

"Alexa, Can I Trust You?".
IEEE Computer, 2017

2016
Caring: An Undiscovered "Super -ility" of Smart Healthcare.
IEEE Software, 2016

Software is Driving Software Engineering?
IEEE Software, 2016

Cybersecurity or Privacy [Guest editors' introduction].
IT Professional, 2016

Learning Internet-of-Things Security "Hands-On".
IEEE Security & Privacy, 2016

Insights on Formal Methods in Cybersecurity.
IEEE Computer, 2016

Demystifying the Internet of Things.
IEEE Computer, 2016

What Happened to Formal Methods for Security?
IEEE Computer, 2016

Communications and Privacy under Surveillance.
IEEE Computer, 2016

Standards for the Internet of Things: A Case Study in Disaster Response.
IEEE Computer, 2016

Metamorphic Testing for Cybersecurity.
IEEE Computer, 2016

Building Blocks of the Internet of Things.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Decoding the Mystery of the Internet of Things.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
So Where Are We? A Guest Opinion Editorial.
IEEE Trans. Reliability, 2015

The Internet of Anything and Sustainability.
IT Professional, 2015

Third-Party Software's Trust Quagmire.
IEEE Computer, 2015

Vetting Mobile App Vendors.
IEEE Computer, 2015

Securely Making "Things" Right.
IEEE Computer, 2015

Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem.
IEEE Computer, 2015

2014
NIST: Building a Solid Foundation.
IT Professional, 2014

Big Data, Networked Worlds.
IEEE Computer, 2014

Imagineering an Internet of Anything.
IEEE Computer, 2014

2013
STEM's Grand Challenge: Reviving Applied Mathematics.
IT Professional, 2013

Beyond the Cloud: Cyberphysical Systems.
IT Professional, 2013

Cloud Computing.
IT Professional, 2013

Does Security Trump Reliability?
IEEE Computer, 2013

2012
The Mobile Software App Takeover.
IEEE Software, 2012

Software Testing: What Goes Around Comes Around.
IT Professional, 2012

BYOD: Security and Privacy Considerations.
IT Professional, 2012

Who Owns What? The Social Media Quagmire.
IT Professional, 2012

The Internet of Things: A Reality Check.
IT Professional, 2012

A Matter of Policy.
IT Professional, 2012

NASA Contributions to IT.
IT Professional, 2012

Building Security into Off-the-Shelf Smartphones.
IEEE Computer, 2012

Mobile Application and Device Power Usage Measurements.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Thoughts on Higher Education and Scientific Research.
IT Professional, 2011

Vetting Mobile Apps.
IT Professional, 2011

Mobile-App Addiction: Threat to Security?
IT Professional, 2011

Storytelling: From Cave Art to Digital Media.
IT Professional, 2011

The Evolution of Ubiquitously Intelligent Computing.
IT Professional, 2011

Timing Matters: Tackling Intractable Problems.
IT Professional, 2011

Certainty through Uncertainty?
IEEE Computer, 2011

2010
Effectively Defining "Shall Not" Requirements.
IT Professional, 2010

Free and Open Source Software.
IT Professional, 2010

Ethics and the Cloud.
IT Professional, 2010

Mobile Applications: The Fifth Cycle.
IT Professional, 2010

Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems.
IEEE Security & Privacy, 2010

In Trust We Trust.
IEEE Computer, 2010

A Nonlinear Perspective on Higher Education.
IEEE Computer, 2010

2009
Cloud Computing: New Wine or Just a New Bottle?
IT Professional, 2009

The Metaphysics of Software Trust.
IT Professional, 2009

Privacy and/or Security: Take Your Pick.
IT Professional, 2009

An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008.
IT Professional, 2009

Trustworthiness in Software Environments.
IT Professional, 2009

Cyberpandemics: History, Inevitability, Response.
IEEE Security & Privacy, 2009

Standards interoperability: Applying software safety assurance standards to the evolution of legacy software.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

2008
Software Product Certification.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations.
IT Professional, 2008

Information Integrity and IT Professionals' Integrity, Intertwined.
IT Professional, 2008

IT as a Profession: Is Competent Creation the Primary Goal?
IT Professional, 2008

Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are?
IT Professional, 2008

What's in a Name? Distinguishing between SaaS and SOA.
IT Professional, 2008

Standards Confusion and Harmonization.
IEEE Computer, 2008

2007
The Services Paradigm: Who Can You Trust?
IT Professional, 2007

A Baker's Dozen: 13 Software Engineering Challenges.
IT Professional, 2007

One in a Baker's Dozen: Debugging Debugging.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Improving the Predictable Assembly of Service-Oriented Architectures.
IEEE Software, 2006

Software Certification Services: Encouraging Trust and Reasonable Expectations.
IT Professional, 2006

Software test cases: is one ever enough?
IT Professional, 2006

Reliability and Fault Tolerance in Trust.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

COMPSAC Panel Session on Trustworthy Computing.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
The Role of Policy in Balancing Outsourcing and Homeland Security.
IT Professional, 2005

2004
Software's Secret Sauce: The "-ilities".
IEEE Software, 2004

Software Engineering's Role in Business.
IEEE Software, 2004

Persistent Software Attributes.
IEEE Software, 2004

Software Quality from a Behavioral Perspective.
IT Professional, 2004

Programming with Assertions: A Prospectus.
IT Professional, 2004

A Uniform Meta-Model for Mediating Formal Electronic Conferences.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
Trusted Software's Holy Grail.
Software Quality Journal, 2003

Guest Editor's Introduction: Assuring Software Quality Assurance.
IEEE Software, 2003

Adaptive Software Quality.
Proceedings of the ICEIS 2003, 2003

Trusted Software's Holy Grail.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Challenges and Recent Advances in Developing Trustworthy Software-Based Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2001
Fault Tolerance.
IEEE Software, 2001

Guest Editor's Introduction: Software Fault Tolerance-Making Software Behave.
IEEE Software, 2001

Composing Software Component "ilities".
IEEE Software, 2001

Quality Time - Faster, Better, and Cheaper.
IEEE Software, 2001

Why testing software under expected operational profiles is not sufficient.
Software Focus, 2001

Discovering Unanticipated Software Output Modes.
Ann. Software Eng., 2001

Why Is It So Hard to Predict Software System Trustworthiness from Software Component Trustworthiness?.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Discovering Unanticipated Software Output Modes.
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

Why Testing under Expected Operational Scenarios is Not Sufficient.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001

Software Dependability in Distributed and Mobile Computing Environments.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001

2000
Malicious IT - Guest Editors' Introduction.
IEEE Software, 2000

Quality Time - A New Generation of Software Quality Conferences.
IEEE Software, 2000

Quality Time - Will the Real Operational Profile Please Stand Up?
IEEE Software, 2000

Quality Time - Can Chaotic Methods Improve Software Quality Predictions?
IEEE Software, 2000

Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software?
IEEE Software, 2000

Dependability certification of software components.
Journal of Systems and Software, 2000

Toward a More Reliable Theory of Software Reliability.
IEEE Computer, 2000

Developing a Usage-Based Software Certification Process.
IEEE Computer, 2000

Defective software: An overview of legal remedies and technical measures available to consumers.
Advances in Computers, 2000

Limited Software Warranties.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000

Disposable COTS-Intensive Software Systems (A Position Statement).
Proceedings of the 4th European Conference on Software Maintenance and Reengineering, 2000

1999
Software Quality's Eight Greatest Myths.
IEEE Software, 1999

Certifying Software for High-Assurance Environments.
IEEE Software, 1999

Guest Editor's Introduction: Certification-Reducing the Hidden Costs of Poor Quality.
IEEE Software, 1999

Quality Time - A US Government-Regulated Software Industry.
IEEE Software, 1999

Quality Time - Does Untested Software Threaten Infrastructures?
IEEE Software, 1999

Quality Time - Protecting Against What? The Achilles Heel of Information Assurance.
IEEE Software, 1999

Disposable information systems: the future of software maintenance?
Journal of Software Maintenance, 1999

The Future of Computer Assurance.
IEEE Computer, 1999

Inoculating Software for Survivability.
Commun. ACM, 1999

A World Without Risks: Let Me Out!
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

COTS and High Assurance: An Oxymoron?
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

User Participation-based Software Certification.
Proceedings of the Validation and Verification of Knowledge Based Systems, 1999

Can Generic Software Be Assured?
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

1998
Maintaining Component-Based Systems.
IEEE Software, 1998

COTS Software: The Economical Choice?
IEEE Software, 1998

Certifying Off-the-Shelf Software Components.
IEEE Computer, 1998

The Challenges of Using COTS Software in Component-Based Development (Guest Editor's Introduction).
IEEE Computer, 1998

Does software reliability engineering (SRE) offer any benefits to mobile code's security woes?
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

Maintaining COTS-Based Systems: Is it Possible? (Panel).
Proceedings of the 1998 International Conference on Software Maintenance, 1998

Are COTS Products and Component Packaging Killing Software Malleability?
Proceedings of the 1998 International Conference on Software Maintenance, 1998

Agent Trustworthiness.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Certifying High Assurance Software.
Proceedings of the COMPSAC '98, 1998

1997
Software testability measurement for intelligent assertion placement.
Software Quality Journal, 1997

Predicting How Badly "Good" Software Can Behave.
IEEE Software, 1997

Quality Time: Can Clean Pipes Produce Dirty Water?
IEEE Software, 1997

Quality Time: How Assertions Can Increase Test Effectiveness.
IEEE Software, 1997

A 'Crystal Ball' for Software Liability.
IEEE Computer, 1997

Fault Injection for the Masses.
IEEE Computer, 1997

The Ability of Directed Tests to Predict Software Quality.
Ann. Software Eng., 1997

Panel: Qualifying The Reliability Of COTS Software Components.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Reducing uncertainty about common-mode failures.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

1996
Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them?
Proceedings of the 15th International Conference on Computer Safety, 1996

Investigating rare-event failure tolerance: reductions in future uncertainty.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

The Avalanche Paradigm: An Experimental Software Programming Technique for Improving Fault-tolerance.
Proceedings of the IEEE Symposium and Workshop on Engineering of Computer Based Systems (ECBS'96), 1996

1995
Software Testability: The New Verification.
IEEE Software, 1995

Software Testability: An Experiment in Measuring Simulation Reusability.
Proceedings of the ACM SIGSOFT Symposium on Software Reusability, 1995

An Automated Code-Based Fault-Tree Mitigation Technique.
Proceedings of the 14th International Conference on Computer Safety, 1995

Predicting software's minimum-time-to-hazard and mean-time-to-hazard for rare input events.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995

Detecting program modules with low testability.
Proceedings of the International Conference on Software Maintenance, 1995

Software Testability Measurement for Assertion Placement and Fault Localization.
Proceedings of the Second International Workshop on Automated Debugging, 1995

1994
Views on Software Testability (Panel Abstract).
Proceedings of the 1994 International Symposium on Software Testing and Analysis, 1994

Putting assertions in their place.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994

1993
Semantic metrics for software testability.
Journal of Systems and Software, 1993

Designing programs that are less likely to hide faults.
Journal of Systems and Software, 1993

A framework for defining semantic metrics.
Journal of Systems and Software, 1993

A model for detecting the existence of software corruption in real time.
Computers & Security, 1993

Confidently Assessing a Zero Probability of Software Failure.
Proceedings of the 12th International Conference on Computer Safety, 1993

Faults on Its Sleeve: Amplifying Software Reliability Testing.
Proceedings of the 1993 International Symposium on Software Testing and Analysis, 1993

A software analysis technique for quantifying reliability in high-risk medical devices.
Proceedings of the Sixth Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'93), 1993

1992
PIE: A Dynamic Failure-Based Technique.
IEEE Trans. Software Eng., 1992

Estimating the Probability of Failure When Testing Reveals No Failures.
IEEE Trans. Software Eng., 1992

The Revealing Power of a Test Case.
Softw. Test., Verif. Reliab., 1992

Improving the software development process using testability research.
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992

1991
Predicting Where Faults Can Hide from Testing.
IEEE Software, 1991

A Dynamic Failure Model for Predicting the Impact that a Program Location has on the Program.
Proceedings of the ESEC '91, 1991


  Loading...