Jump to: 2014 | 2013 | 2012 | 2011 | 2010
Number of items: 10.

2014

Venters, Colin, Austin, J, Dibsdale, Charlie E., Dimitrova, V, Djemame, Karim, Fletcher, M, Fores, S, Hobson, S, Lau, Lydia, McAvoy, John, Marshall, A, Townend, Paul, Taylor, N, Viduto, Valentina, Webster, D and Xu, Jie (2014) To Trust or Not to Trust? Developing Trusted Digital Spaces through Timely Reliable and Personalized Provenance. In: Provenance for Sensemaking, 10th November 2014, Paris, France.

Viduto, Valentina, Djemame, K, Townend, P, Xu, J, Fores, S, Lau, L, Fletcher, M, Dibsdale, Charlie, Hobson, S, McAvoy, J and Austin, J (2014) Trust and Risk Relationship Analysis on a Workflow Basis: A Use Case. In: Proceedings of the Ninth International Conference on Internet Monitoring and Protection. ICIMP 2014 . IARIA, Paris, France, pp. 7-12. ISBN 9781634390071

2013

Townend, Paul, Viduto, Valentina, Webster, David, Djemame, Karim, Lau, Lydia, Dimitrova, Vania, Xu, Jie, Fores, Sarah, Dibsdale, Charlie, Austin, Jim, McAvoy, John and Hobson, Stephen (2013) Risk Assessment and Trust in Services Computing: Applications and Experience. In: 2013 IEEE International Conference on Services Computing. SCC 2013 . IEEE, California, USA, pp. 392-399. ISBN 978-0-7695-5026-8

Viduto, Valentina, Townend, P., Xu, J., Djemame, K. and Bochenkov, A. (2013) A Graph-Based Approach to Address Trust and Reputation in Ubiquitous Networks. In: 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering. SOSE 2013 . IEEE, Hawaii, USA, pp. 397-402. ISBN 978-1-4673-5659-6

Townend, P., Webster, D., Venters, C. C., Dimitrova, V., Djemame, K., Lau, L., Xu, Jie, Fores, S., Viduto, Valentina, Dibsdale, C., Taylor, N., Austin, J., Mcavoy, J. and Hobson, S. (2013) Personalised Provenance Reasoning Models and Risk Assessment in Business Systems: A Case Study. In: 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering. SOSE 2013 . IEEE, California, USA, pp. 329-334. ISBN 978-1-4673-5659-6

2012

Viduto, Valentina, Maple, Carsten, Huang, Wei and Lopez-Perez, David (2012) A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem. Decision Support Systems, 53 (3). pp. 599-610. ISSN 0167-9236

Viduto, Valentina, Maple, Carsten, Huang, Wei and Bochenkov, A. (2012) A multi-objective genetic algorithm for minimising network security risk and cost. In: International Conference on High Performance Computing and Simulation. HPCS 2012 . IEEE, Madrid, Spain, pp. 462-467. ISBN 978-1-4673-2359-8

2011

Viduto, Valentina, Huang, W and Maple, C (2011) Toward optimal multi-objective models of network security: Survey. In: 17th International Conference on Automation and Computing, 10th September 2011, University of Huddersfield, Huddersfield, United Kingdom.

Viduto, Valentina, Maple, Carsten and Huang, Wei (2011) Managing threats by the use of visualisation techniques. International Journal of Space-Based and Situated Computing, 1 (2/3). pp. 204-212. ISSN 2044-4893

2010

Maple, Carsten and Viduto, Valentina (2010) A Visualisation Technique for the Identification of Security Threats in Networked Systems. In: 14th International Conference on Information Visualisation. IV 2010 . IEEE, London, UK, pp. 551-556. ISBN 978-1-4244-7846-0

This list was generated on Sun Dec 22 02:11:10 2024 UTC.