


default search action
International Journal of Critical Computer-Based Systems, Volume 10
Volume 10, Number 1, 2020
- Marta Olszewska, Fatima Shokri-Manninen, Andrew Edmunds, Marina Waldén:

Applying guidelines for system modelling in Event-B - a systematic literature review. 1-36 - Besma Khaireddine

, Marwa Ben AbdelAli, Lamia Labed Jilani, Aleksandr Zakharchenko
, Ali Mili:
Correctness enhancement: a pervasive software engineering paradigm. 37-73 - Andrea Tortorelli, Andrea Fiaschetti, Alessandro Giuseppi

, Vincenzo Suraci
, Roberto Germanà, Francesco Delli Priscoli:
A security metric for assessing the security level of critical infrastructures. 74-94
Volume 10, Number 2, 2021
- Ammar Boucherit, Laura M. Castro, Osman Hasan, Abdallah Khababa:

Towards a hybrid formal analysis technique for safety-critical software architectures. 95-119 - Sarah Chabane, Rabéa Ameur-Boulifa, Mezghiche Mohamed:

Towards compositional verification of synchronous reactive systems. 120-142 - Salim Chehida, Yves Ledru, Yoann Blein, Germán Vega:

An SMT-based approach for generating trace examples and counter-examples of parametric properties. 143-183
Volume 10, Number 3, 2022
- Kakelli Anil Kumar, Kaustubh Kumar, Nag Lohith Chiluka:

Deep learning models for multi-class malware classification using Windows exe API calls. 185-201 - Michel Batteux, Tatiana Prosvirnova

, Antoine B. Rauzy:
Abstract executions of stochastic discrete event systems. 202-226 - Sheetal Gokhale, Irfan A. Siddavatam, Ashwini Dalvi

, Mohammed Shaikh, Suchitra Patil:
Formal modelling and verification of high interactive honeypot using coloured Petri nets. 227-247 - Mohith C. Shekar, Harinahalli Lokesh Gururaj, Francesco Flammini

:
Securing personal identity using blockchain. 248-267
Volume 10, Number 4, 2023
- Manish Rai, Sachin Goyal, Mahesh Kumar Pawar:

An enhanced digital image watermarking technique using DWT-HD-SVD and deep convolutional neural network. 269-286 - Louella Colaco, Arun S. Nair, Biju K. Raveendran, Sasikumar Punnekkat:

Task models for mixed criticality systems - a review. 287-329 - Manikant Panthi, Tanmoy Kanti Das:

Detection of cyber-attacks for sensor measurement data using supervised machine learning models for modern power grid system. 330-354 - G. Gowthami, S. Silvia Priscila

:
Tuna swarm optimisation-based feature selection and deep multimodal-sequential-hierarchical progressive network for network intrusion detection approach. 355-374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














