Aad P. A. van Moorsel
Orcid: 0000-0001-7233-6943Affiliations:
- University of Newcastle, School of Computing Science
According to our database1,
Aad P. A. van Moorsel
authored at least 148 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Clust. Comput., December, 2024
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems.
Int. J. Inf. Sec., April, 2024
2023
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023
Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning Systems.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study.
Int. J. Netw. Manag., 2022
Proceedings of the Quantitative Evaluation of Systems - 19th International Conference, 2022
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2022
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022
2021
The OpBench Ethereum opcode benchmark framework: Design, implementation, validation and experiments.
Perform. Evaluation, 2021
CoRR, 2021
Identifying and Supporting Financially Vulnerable Consumers in a Privacy-Preserving Manner: A Use Case Using Decentralised Identifiers and Verifiable Credentials.
CoRR, 2021
Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs.
Proceedings of the Science of Cyber Security - Third International Conference, 2021
2020
Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices.
Big Data Soc., January, 2020
ACM Trans. Cyber Phys. Syst., 2020
Frontiers Blockchain, 2020
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context.
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the FAT* '20: Conference on Fairness, 2020
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
Proceedings of the Handbook of Software Aging and Rejuvenation, 2020
2019
Future Gener. Comput. Syst., 2019
Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions.
ACM Comput. Surv., 2019
Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World.
IEEE Commun. Surv. Tutorials, 2019
Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol.
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
SIGMETRICS Perform. Evaluation Rev., 2018
SIGMETRICS Perform. Evaluation Rev., 2018
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 ACM/SPEC International Conference on Performance Engineering, 2018
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018
Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning, 2018
Proceedings of the 14th European Dependable Computing Conference, 2018
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018
2017
IEEE Secur. Priv., 2017
Proceedings of the thirty third Annual UK Performance Engineering Workshops, 2017
Proceedings of the thirty third Annual UK Performance Engineering Workshops, 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017
Proceedings of the Computer Performance Engineering - 14th European Workshop, 2017
2016
Perform. Evaluation, 2016
Proceedings of the Software Engineering for Resilient Systems - 8th International Workshop, 2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
2015
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
Proceedings of the Software Engineering for Resilient Systems - 7th International Workshop, 2015
Proceedings of the Quantitative Evaluation of Systems, 12th International Conference, 2015
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Optimisation of data collection strategies for model-based evaluation and decision-making: poster.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Proceedings of the Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, 2015
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware).
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Nudging towards security: developing an application for wireless network selection for android phones.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015
2014
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment.
Proceedings of the Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Performance Engineering - 11th European Workshop, 2014
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Performance Modelling and Evaluation of Enterprise Information Security Technologies.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Optimization of data collection strategies for model-based evaluation and decision-making.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Deriving requirements for an online community interaction scheme: indications from older adults.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
2011
J. Internet Serv. Inf. Secur., 2011
Proceedings of the Fifth International Workshop on the Practical Application of Stochastic Modelling, 2011
Proceedings of the Computer Performance Engineering, 2011
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011
2010
A stealth approach to usable security: helping IT security managers to identify workable security solutions.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing, 2010
Architecture and Protocol for User-Controlled Access Management in Web 2.0 Applications.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Ontology Editing Tool for Information Security and Human Factors Experts.
Proceedings of the KMIS 2010, 2010
Proceedings of the 6th Workshop on Digital Identity Management, 2010
Proceedings of the Resilience Assessment and Evaluation, 18.07. - 23.07.2010, 2010
Proceedings of the 4th ACM Symposium on Computer Human Interaction for Management of Information Technology, 2010
Proceedings of the Economic Models and Algorithms for Distributed Systems, 2010
2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
A Knowledge Base for Justified Information Security Decision-making.
Proceedings of the ICSOFT 2009, 2009
Proceedings of the Contemporary Computing - Second International Conference, 2009
Proceedings of the Computer Performance Engineering, 2009
Introduction to the proceedings of the EDOC 2009 workshop Middleware for Web Services (MWS) 2009.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008
Proceedings of the 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 2008
The Impact of Unavailability on the Effectiveness of Enterprise Information Security Technologies.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008
Architecting Dependable Access Control Systems for Multi-domain Computing Environments.
Proceedings of the Architecting Dependable Systems VI, 2008
Proceedings of the First European Workshop on System Security, 2008
Proceedings of the Computer Performance Engineering, 2008
Introduction to the Proceedings of the EDOC 2008 Workshop Middleware for Web Services (MWS) 2008.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Formal Methods and Stochastic Models for Performance Evaluation, 2007
Introduction to the Proceedings of the EDOC 2007 Workshop Middleware for Web Services (MWS) 2007.
Proceedings of the Workshops Proceedings of the 11th International IEEE Enterprise Distributed Object Computing Conference, 2007
2006
The Fast and the Fair: A Fault-Injection-Driven Comparison of Restart Oracles for Reliable Web Services.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006
Proceedings of the Formal Methods and Stochastic Models for Performance Evaluation, 2006
Introduction to the Proceedings of the EDOC 2006 Workshop Middleware for Web Services (MWS) 2006.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006
2005
Proceedings of the Service Availability, 2005
Proceedings of the Self-star Properties in Complex Information Systems, 2005
2004
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004
Meeting Deadlines through Restart.
Proceedings of the MMB & PGTS 2004, 2004
A Measurement Study of the Interplay Between Application Level Restart and Transport Protocol.
Proceedings of the Service Availability, 2004
Proceedings of the Architecting Dependable Systems III [the book is a result of the ICSE 2004 and DSN 2004 workshops], 2004
2003
Proceedings of the 4th International Conference on Web Information Systems Engineering, 2003
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003
Web Services Management Network: An Overlay Network for Federated Service Management.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003
2002
Optimal allocation of test resources for software reliability growth modeling in software development.
IEEE Trans. Reliab., 2002
Proceedings of the Web Services, 2002
Proceedings of the Management Technologies for E-Commerce and E-Business Applications, 2002
1999
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999
1998
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998
Numerical Solution of Non-Homogeneous Markov Processes through Uniformization.
Proceedings of the 12<sup>th</sup> European Simulation Multiconference - Simulation, 1998
Reusable Software Components for Performability Tools and Their Utilization for Web-Based Configurable Tools.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 1998
1997
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997
1996
Algorithms for the Generation of State-Level Representations of Stochastic Activity Networks with General Reward Structures.
IEEE Trans. Software Eng., 1996
Proceedings of the Application and Theory of Petri Nets 1996, 1996
Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models.
Proceedings of the Proceedings 29st Annual Simulation Symposium (SS '96), 1996
1995
Using the probabilistic evaluation tool for the analytical solution of large Markov models.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995
1994
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994
1993
Performability evaluation concepts and techniques.
PhD thesis, 1993
1992
A Method for Analysing the Performance Aspects of the Fault-Tolerance Mechanisms in FDDI.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992