Aad P. A. van Moorsel

Orcid: 0000-0001-7233-6943

Affiliations:
  • University of Newcastle, School of Computing Science


According to our database1, Aad P. A. van Moorsel authored at least 148 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A quantitative analysis of the security of PoW-based blockchains.
Clust. Comput., December, 2024

Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems.
Int. J. Inf. Sec., April, 2024

2023
GTV: Generating Tabular Data via Vertical Federated Learning.
CoRR, 2023

A Dataset of Coordinated Cryptocurrency-Related Social Media Campaigns.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study.
Int. J. Netw. Manag., 2022

In Private, Secure, Conversational FinBots We Trust.
CoRR, 2022

Verifier's Dilemma in Ethereum Blockchain: A Quantitative Analysis.
Proceedings of the Quantitative Evaluation of Systems - 19th International Conference, 2022

LDRNet: Enabling Real-Time Document Localization on Mobile Devices.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2022

Federated Learning for Tabular Data: Exploring Potential Risk to Privacy.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

2021
The OpBench Ethereum opcode benchmark framework: Design, implementation, validation and experiments.
Perform. Evaluation, 2021

Know Your Customer: Balancing Innovation and Regulation for Financial Inclusion.
CoRR, 2021

Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials.
CoRR, 2021

Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

2020
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices.
Big Data Soc., January, 2020

A User-centric Security Solution for Internet of Things and Edge Convergence.
ACM Trans. Cyber Phys. Syst., 2020

BlockSim: An Extensible Simulation Tool for Blockchain Systems.
Frontiers Blockchain, 2020

Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context.
CoRR, 2020

Non-blocking two-phase commit using blockchain.
Concurr. Comput. Pract. Exp., 2020

Cyclic Bayesian Attack Graphs: A Systematic Computational Approach.
Proceedings of the 19th IEEE International Conference on Trust, 2020

The relationship between trust in AI and trustworthy machine learning technologies.
Proceedings of the FAT* '20: Conference on Fairness, 2020

Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Keeping it Human: A Focus Group Study of Public Attitudes Towards AI in Banking.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Fitting and Regression for Distributions of Ethereum Smart Contracts.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

Context-based consensus for appendable-block blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2020

Black-Box Models for Restart, Reboot and Rejuvenation.
Proceedings of the Handbook of Software Aging and Rejuvenation, 2020

2019
Consumer-facing technology fraud: Economics, attack methods and potential solutions.
Future Gener. Comput. Syst., 2019

Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions.
ACM Comput. Surv., 2019

Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World.
IEEE Commun. Surv. Tutorials, 2019

Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol.
Proceedings of the Financial Cryptography and Data Security, 2019

Unsupervised Machine Learning for Card Payment Fraud Detection.
Proceedings of the Risks and Security of Internet and Systems, 2019

OpBench: A CPU Performance Benchmark for Ethereum Smart Contract Operation Code.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Benchmarks and Models for Blockchain: Consensus Algorithms.
SIGMETRICS Perform. Evaluation Rev., 2018

BlockSim: A Simulation Framework for Blockchain Systems.
SIGMETRICS Perform. Evaluation Rev., 2018

Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
IACR Cryptol. ePrint Arch., 2018

Benchmarks and Models for Blockchain.
Proceedings of the 2018 ACM/SPEC International Conference on Performance Engineering, 2018

Investigation of 3-D secure's model for fraud detection.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

Mobile Based Continuous Authentication Using Deep Features.
Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, 2018

Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum.
Proceedings of the 14th European Dependable Computing Conference, 2018

Performance Benchmarking for Ethereum Opcodes.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Urban Risk Analytics in the Cloud.
IT Prof., 2017

Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?
IEEE Secur. Priv., 2017

Risk Assessment Methodology For EMV Financial Transaction Systems.
Proceedings of the thirty third Annual UK Performance Engineering Workshops, 2017

The Impact of Profit Uncertainty on Miner Decisions in Blockchain Systems.
Proceedings of the thirty third Annual UK Performance Engineering Workshops, 2017

Blockchain-based Smart Contracts: A Systematic Mapping Study.
CoRR, 2017

Smartphone Continuous Authentication Using Deep Learning Autoencoders.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

ADaCS: A Tool for Analysing Data Collection Strategies.
Proceedings of the Computer Performance Engineering - 14th European Workshop, 2017

2016
Modeling and analysis of influence power for information security decisions.
Perform. Evaluation, 2016

WRAD: Tool Support for Workflow Resiliency Analysis and Design.
Proceedings of the Software Engineering for Resilient Systems - 8th International Workshop, 2016

NFC Payment Spy: A Privacy Attack on Contactless Payments.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

2015
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Resiliency Variance in Workflows with Choice.
Proceedings of the Software Engineering for Resilient Systems - 7th International Workshop, 2015

Impact of Policy Design on Workflow Resiliency Computation Time.
Proceedings of the Quantitative Evaluation of Systems, 12th International Conference, 2015

Modelling user availability in workflow resiliency analysis.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Optimisation of data collection strategies for model-based evaluation and decision-making: poster.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Selecting Optimal Subset of Security Controls.
Proceedings of the Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, 2015

Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Nudging towards security: developing an application for wireless network selection for android phones.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2014
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

A Formal Model for Soft Enforcement: Influencing the Decision-Maker.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Nudging for Quantitative Access Control Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment.
Proceedings of the Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience, 2014

Quantitative Workflow Resiliency.
Proceedings of the Computer Security - ESORICS 2014, 2014

A Decision Making Model of Influencing Behavior in Information Security.
Proceedings of the Computer Performance Engineering - 11th European Workshop, 2014

Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Performance Modelling and Evaluation of Enterprise Information Security Technologies.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Defense-in-Depth Against Malicious Insiders in the Cloud.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

Risks of Offline Verify PIN on Contactless Cards.
Proceedings of the Financial Cryptography and Data Security, 2013

Detection of attack strategies.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

A Generic Logging Template for Infrastructure as a Service Cloud.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Optimization of data collection strategies for model-based evaluation and decision-making.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Deriving requirements for an online community interaction scheme: indications from older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Uncertainty and Uncertainty Tolerance in Service Provisioning.
J. Internet Serv. Inf. Secur., 2011

A Community Knowledge Base for IT Security.
IT Prof., 2011

It All Depends, and Increasingly So.
IEEE Secur. Priv., 2011

Quantitative Evaluation of Enterprise DRM Technology.
Proceedings of the Fifth International Workshop on the Practical Application of Stochastic Modelling, 2011

Formal Mapping of WSLA Contracts on Stochastic Models.
Proceedings of the Computer Performance Engineering, 2011

The case for dynamic security solutions in public cloud workflow deployments.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2010
Evaluating the adaptivity of computing systems.
Perform. Evaluation, 2010

A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Design and implementation of user-managed access framework for web 2.0 applications.
Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing, 2010

Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Ontology Editing Tool for Information Security and Human Factors Experts.
Proceedings of the KMIS 2010, 2010

User-managed access to web resources.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

10292 Abstracts Collection and Summary - Resilience Assessment and Evaluation.
Proceedings of the Resilience Assessment and Evaluation, 18.07. - 23.07.2010, 2010

A collaborative ontology development tool for information security managers.
Proceedings of the 4th ACM Symposium on Computer Human Interaction for Management of Information Technology, 2010

Mitigating Provider Uncertainty in Service Provision Contracts.
Proceedings of the Economic Models and Algorithms for Distributed Systems, 2010

2009
An information security ontology incorporating human-behavioural implications.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A Knowledge Base for Justified Information Security Decision-making.
Proceedings of the ICSOFT 2009, 2009

An Architecture for Cross-Cloud System Management.
Proceedings of the Contemporary Computing - Second International Conference, 2009

Fast Generation of Scale Free Networks with Directed Arcs.
Proceedings of the Computer Performance Engineering, 2009

Introduction to the proceedings of the EDOC 2009 workshop Middleware for Web Services (MWS) 2009.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

Dependability in the cloud: Challenges and opportunities.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Panel: Complexity and Resilience.
Proceedings of the Computer Safety, 2008

Runtime Security Adaptation Using Adaptive SSL.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Efficient Resource Management for Game Server Hosting.
Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 2008

The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

Architecting Dependable Access Control Systems for Multi-domain Computing Environments.
Proceedings of the Architecting Dependable Systems VI, 2008

Logging based IP Traceback in switched ethernets.
Proceedings of the First European Workshop on System Security, 2008

Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust.
Proceedings of the Computer Performance Engineering, 2008

Introduction to the Proceedings of the EDOC 2008 Workshop Middleware for Web Services (MWS) 2008.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

COTraSE: Connection Oriented Traceback in Switched Ethernet.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Adaptive SSL: Design, Implementation and Overhead Analysis.
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007

DOA 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Evaluation of P2P Search Algorithms for Discovering Trust Paths.
Proceedings of the Formal Methods and Stochastic Models for Performance Evaluation, 2007

Introduction to the Proceedings of the EDOC 2007 Workshop Middleware for Web Services (MWS) 2007.
Proceedings of the Workshops Proceedings of the 11th International IEEE Enterprise Distributed Object Computing Conference, 2007

2006
Analysis of Restart Mechanisms in Software Systems.
IEEE Trans. Software Eng., 2006

The Fast and the Fair: A Fault-Injection-Driven Comparison of Restart Oracles for Reliable Web Services.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006

Experimental Analysis of the Correlation of HTTP GET Invocations.
Proceedings of the Formal Methods and Stochastic Models for Performance Evaluation, 2006

Introduction to the Proceedings of the EDOC 2006 Workshop Middleware for Web Services (MWS) 2006.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

Secure and Provable Service Support for Human-Intensive Real-Estate Processes.
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006

2005
Grid, Management and Self-Management.
Comput. J., 2005

On Best-Effort and Dependability, Service-Orientation and Panacea.
Proceedings of the Service Availability, 2005

The Self-Star Vision.
Proceedings of the Self-star Properties in Complex Information Systems, 2005

2004
Optimal restart times for moments of completion time.
IEE Proc. Softw., 2004

Analysis and Algorithms for Restart.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

Meeting Deadlines through Restart.
Proceedings of the MMB & PGTS 2004, 2004

A Measurement Study of the Interplay Between Application Level Restart and Transport Protocol.
Proceedings of the Service Availability, 2004

The Role of Agreements in IT Management Software.
Proceedings of the Architecting Dependable Systems III [the book is a result of the ICSE 2004 and DSN 2004 workshops], 2004

2003
Managed Utility Computing.
Proceedings of the 4th International Conference on Web Information Systems Engineering, 2003

Managed Utility Computing: The Grid as Management Backplane.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Web Services Management Network: An Overlay Network for Federated Service Management.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

Management +=Grid.
Proceedings of the Self-Managing Distributed Systems, 2003

First Workshop on the Design of Self-Managing Systems.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Specifying and Monitoring Guarantees in Commercial Grids through SLA.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

2002
Optimal allocation of test resources for software reliability growth modeling in software development.
IEEE Trans. Reliab., 2002

Ten-Step Survival Guide for the Emerging Business Web.
Proceedings of the Web Services, 2002

Automated SLA Monitoring for Web Services.
Proceedings of the Management Technologies for E-Commerce and E-Business Applications, 2002

1999
The 'QoS Query Service' for Improved Quality-of-Service Decision Making in CORBA.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

1998
A methodology for detection and estimation of software aging.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

Numerical Solution of Non-Homogeneous Markov Processes through Uniformization.
Proceedings of the 12<sup>th</sup> European Simulation Multiconference - Simulation, 1998

Reusable Software Components for Performability Tools and Their Utilization for Web-Based Configurable Tools.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 1998

1997
Optimization of reliability allocation and testing schedule for software systems.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

1996
Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures.
IEEE Trans. Software Eng., 1996

Expected Impulsive Rewards in Markov Regenerative Stochastic Petri Nets.
Proceedings of the Application and Theory of Petri Nets 1996, 1996

Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models.
Proceedings of the Proceedings 29st Annual Simulation Symposium (SS '96), 1996

1995
Using the probabilistic evaluation tool for the analytical solution of large Markov models.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

UltraSAN version 3 overview.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

1994
Xmgm: Performance Modeling Using Matrix Geometric Techniques.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Performability evaluation concepts and techniques.
PhD thesis, 1993

1992
A Method for Analysing the Performance Aspects of the Fault-Tolerance Mechanisms in FDDI.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992


  Loading...