Andrea Bondavalli

Orcid: 0000-0001-7366-6530

Affiliations:
  • University of Florence, Italy


According to our database1, Andrea Bondavalli authored at least 249 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives.
IEEE Trans. Emerg. Top. Comput., 2024

Improving the Efficiency of Software-Based Fault Protection Mechanisms With HUSTLE.
IEEE Access, 2024

Position Paper - Bringing Classifiers into Critical Systems: Are We Barking up the Wrong Tree?
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops, 2024

Security Modeling Challenges and Research Directions Around the ADVISE Meta Framework.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops, 2024

2023
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard.
ACM Trans. Cyber Phys. Syst., October, 2023

An extension of the ADVISE Meta modeling framework and its application for an early-stage security analysis of a public transport supervision system.
J. Reliab. Intell. Environ., September, 2023

Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection.
Comput. Secur., April, 2023

Toward Conceptual Analysis of Cyber-Physical Systems Projects Focusing on the Composition of Legacy Systems.
IEEE Access, 2023

Tolerate Failures of the Visual Camera With Robust Image Classifiers.
IEEE Access, 2023

A Methodology for the Qualification of Operating Systems and Hypervisors for the Deployment in IoT Devices.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops, 2023

Detection of Adversarial Attacks by Observing Deep Features with Structured Data Algorithms.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Anomaly Detectors for Self-Aware Edge and IoT Devices.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Modeling of GPGPU architectures for performance analysis of CUDA programs.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Ensembling Uncertainty Measures to Improve Safety of Black-Box Classifiers.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

HUSTLE: A Hardware Unit for Self-test-Libraries Efficient Execution.
Proceedings of the Applications in Electronics Pervading Industry, Environment and Society, 2023

2022
Stochastic Activity Networks Templates: Supporting Variability in Performability Models.
IEEE Trans. Reliab., 2022

On the Properness of Incorporating Binary Classification Machine Learning Algorithms Into Safety-Critical Systems.
IEEE Trans. Emerg. Top. Comput., 2022

A Monitoring Framework with Integrated Sensing Technologies for Enhanced Food Safety and Traceability.
Sensors, 2022

Towards Enhancing Traffic Sign Recognition through Sliding Windows.
Sensors, 2022

A cyber-physical-social approach for engineering Functional Safety Requirements for automotive systems.
J. Syst. Softw., 2022

Impact of Machine Learning on Safety Monitors.
Proceedings of the Computer Safety, Reliability, and Security, 2022

Towards a General Model for Intrusion Detection: An Exploratory Study.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2022

Failure modes and failure mitigation in GPGPUs: a reference model and its application.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
MADneSs: A Multi-Layer Anomaly Detection Framework for Complex Dynamic Systems.
IEEE Trans. Dependable Secur. Comput., 2021

Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape.
Trans. Data Sci., 2021

Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., 2021

IQCPSoS: A Model-Based Approach for Modeling and Analyzing Information Quality Requirements for Cyber-Physical System-of-Systems.
J. Data Semant., 2021

A stochastic modeling approach for traffic analysis of a tramway system with virtual tags and local positioning.
J. Braz. Comput. Soc., 2021

Development and validation of a safe communication protocol compliant to railway standards.
J. Braz. Comput. Soc., 2021

Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application.
IEEE Access, 2021

Understanding the properness of incorporating machine learning algorithms in safety-critical systems.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Quantitative comparison of supervised algorithms and feature sets for traffic sign recognition.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?
Proceedings of the 26th IEEE Pacific Rim International Symposium on Dependable Computing, 2021

Feature Rankers to Predict Classification Performance of Unsupervised Intrusion Detectors.
Proceedings of the 10th Latin-American Symposium on Dependable Computing, 2021

Static Analysis Tools Applied to Smart Contracts.
Proceedings of the 10th Latin-American Symposium on Dependable Computing, 2021

Reliable Traffic Sign Recognition System.
Proceedings of the 10th Latin-American Symposium on Dependable Computing, 2021

Spoofing Detectability as a Property of Biometric Characteristics.
Proceedings of the Italian Conference on Cybersecurity, 2021

Investigation on Vulnerabilities Location in Solidity Smart Contracts.
Proceedings of the Blockchain and Applications - 3rd International Congress, 2021

2020
A Template-Based Methodology for the Specification and Automated Composition of Performability Models.
IEEE Trans. Reliab., 2020

On the educated selection of unsupervised algorithms via attacks and anomaly classes.
J. Inf. Secur. Appl., 2020

A Formal Definition of Stochastic Activity Networks Templates.
CoRR, 2020

Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems.
Proceedings of the 15th IEEE International Conference of System of Systems Engineering, 2020

Patterns for Development of Safety-Critical Systems with Agile: Trace Safety Requirements and Perform Automated Testing.
Proceedings of the EuroPLoP '20: European Conference on Pattern Languages of Programs 2020, 2020

Agility of Security Practices and Agile Process Models: An Evaluation of Cost for Incorporating Security in Agile Process Models.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Classification of Ethereum Vulnerabilities and their Propagations.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

2019
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach.
ACM Trans. Cyber Phys. Syst., 2019

Design, implementation, and assessment of a usable multi-biometric continuous authentication system.
Int. J. Crit. Comput. Based Syst., 2019

An Initial Investigation on Sliding Windows for Anomaly-Based Intrusion Detection.
Proceedings of the 2019 IEEE World Congress on Services, 2019

The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Results.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Performability Analysis of a Tramway System with Virtual Tags and Local Positioning.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019

Practical Experience Report: Implementation, Verification and Validation of a Safe and Secure Communication Protocol for the Railway Domain.
Proceedings of the 9th Latin-American Symposium on Dependable Computing, 2019

Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019

Resilient Access to Heterogeneous Measurement Data for Grid Observability.
Proceedings of the 15th European Dependable Computing Conference, 2019

Toward a Model-Based Approach for Analyzing Information Quality Requirements for Smart Grid.
Proceedings of the 15th European Dependable Computing Conference, 2019

On the Evaluation Measures for Machine Learning Algorithms for Safety-Critical Systems.
Proceedings of the 15th European Dependable Computing Conference, 2019

2018
PrivAPP: An integrated approach for the design of privacy-aware applications.
Softw. Pract. Exp., 2018

Labelling relevant events to support the crisis management operator.
J. Softw. Evol. Process., 2018

Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile.
J. Softw. Evol. Process., 2018

System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions.
IEEE Syst. J., 2018

A Requirements-Driven Methodology for the Proper Selection and Configuration of Blockchains.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

On Algorithms Selection for Unsupervised Anomaly Detection.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Risk Assessment of Blockchain Technology.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

On the Safety of Automotive Systems Incorporating Machine Learning Based Components: A Position Paper.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Identification of critical situations via Event Processing and Event Trust Analysis.
Knowl. Inf. Syst., 2017

Towards an approach for analyzing trust in Cyber-Physical-Social Systems.
Proceedings of the 12th System of Systems Engineering Conference, 2017

A conceptual model for analyzing information quality in System-of-Systems.
Proceedings of the 12th System of Systems Engineering Conference, 2017

Exploring anomaly detection in systems of systems.
Proceedings of the Symposium on Applied Computing, 2017

Risk Assessment of a Biometric Continuous Authentication Protocol for Internet Services.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach.
Proceedings of the Critical Information Infrastructures Security, 2017

Continuous Biometric Verification for Non-Repudiation of Remote Services.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Emergence in Cyber-Physical Systems-of-Systems (CPSoSs).
Proceedings of the Cyber-Physical Systems of Systems - Foundations, 2016

Basic Concepts on Systems of Systems.
Proceedings of the Cyber-Physical Systems of Systems - Foundations, 2016

Modeling QoE in Dependable Tele-Immersive Applications: A Case Study of World Opera.
IEEE Trans. Parallel Distributed Syst., 2016

On the impact of emergent properties on SoS security.
Proceedings of the 11th System of Systems Engineering Conference, 2016

Challenging Anomaly Detection in Complex Dynamic Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Continuous Authentication and Non-repudiation for the Security of Critical Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented Architectures.
Proceedings of the Computer Safety, Reliability, and Security, 2016

A multi-criteria ranking of security countermeasures.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Usability Assessment in a Multi-Biometric Continuous Authentication System.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

A Holistic Viewpoint-Based SysML Profile to Design Systems-of-Systems.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

On the Dependability for Dynamic Software Product Lines: A Comparative Systematic Mapping Study.
Proceedings of the 42th Euromicro Conference on Software Engineering and Advanced Applications, 2016

Combining SAN and P-Graphs for the Analysis and Optimization of Industrial Processes.
Proceedings of the 12th European Dependable Computing Conference, 2016

A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Continuous and Transparent User Identity Verification for Secure Internet Services.
IEEE Trans. Dependable Secur. Comput., 2015

An OS-level Framework for Anomaly Detection in Complex Software Systems.
IEEE Trans. Dependable Secur. Comput., 2015

On trustworthy measurements when testing dependable systems: a discussion and experiences.
Int. J. Crit. Comput. Based Syst., 2015

Towards an understanding of emergence in systems-of-systems.
Proceedings of the 10th System of Systems Engineering Conference, SoSE 2015, 2015

A Multi-layer Anomaly Detector for Dynamic Service-Based Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Continuous User Identity Verification for Trusted Operators in Control Rooms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Introducing Meta-Requirements for Describing System of Systems.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Executable Models to Support Automated Software FMEA.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Quantifying the Impact of External Attacks on a Distributed Automatic Track Warning System.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

Cost Prediction for V&V and Certification Processes.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

Software Faults Emulation at Model-Level: Towards Automated Software FMEA.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

MB4CP 2015 Keynote I: Dependability Modeling and Analysis Methods Integrated in Model-Driven Industrial Architectural Frameworks.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

Towards a UML Profile for Privacy-Aware Applications.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Insider Threat Assessment: a Model-Based Methodology.
ACM SIGOPS Oper. Syst. Rev., 2014

Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform.
Proceedings of the Seventh International Workshop on the Practical Application of Stochastic Modelling, 2014

Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities.
CoRR, 2014

On Security Countermeasures Ranking through Threat Analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Cost-Effective Testing for Critical Off-the-Shelf Services.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Adding Security Concerns to Safety Critical Certification.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection.
Proceedings of the 17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2014

A DSL-Supported Workflow for the Automated Assembly of Large Stochastic Models.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

2013
Master Failure Detection Protocol in Internal Synchronization Environment.
IEEE Trans. Instrum. Meas., 2013

Optimal configuration of fault-tolerance parameters for distributed replicated server access.
Int. J. Crit. Comput. Based Syst., 2013

Resilient estimation of synchronisation uncertainty through software clocks.
Int. J. Crit. Comput. Based Syst., 2013

A reusable modular toolchain for automated dependability evaluation.
Proceedings of the 7th International Conference on Performance Evaluation Methodologies and Tools, 2013

A methodology and supporting techniques for the quantitative assessment of insider threats.
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, 2013

On the Need of a Methodological Approach for the Assessment of Software Architectures within ISO26262.
Proceedings of the SAFECOMP 2013, 2013

Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Multi-hypothesis GPS and Electronic Fence Data Fusion for Safety-Critical Positioning in Railway Worksites.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Experimental analysis of the first order time difference of indicators used in the monitoring of complex systems.
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013

A monitoring and testing framework for critical off-the-shelf applications and services.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Meeting the challenges in the design and evaluation of a trackside real-time safety-critical system.
Proceedings of the 16th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2013

2012
Experimental Characterization of Uncertainty Sources in a Software-Only Synchronization System.
IEEE Trans. Instrum. Meas., 2012

Adaptare: Supporting automatic and dependable adaptation in dynamic environments.
ACM Trans. Auton. Adapt. Syst., 2012

A hidden Markov model based intrusion detection system for wireless sensor networks.
Int. J. Crit. Comput. Based Syst., 2012

Modeling the resilience of large and evolving systems
CoRR, 2012

Improving Security of Internet Services through Continuous and Transparent User Identity Verification.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

A Federated Simulation Framework with ATN Fault Injection Module for Reliablity Analysis of UAVs in Non-controlled Airspace.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Quantitative Security Evaluation of a Multi-biometric Authentication System.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Model-based analysis of a protocol for reliable communication in railway worksites.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Design and Implementation of Real-Time Wearable Devices for a Safety-Critical Track Warning System.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Timed Broadcast via Off-the-Shelf WLAN Distributed Coordination Function for Safety-Critical Systems.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Future of Resilience Assessment: The AMBER Research Roadmap.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

Modelling and Model-Based Assessment.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

Foundations of Metrology in the Observation of Critical Systems.
Proceedings of the Resilience Assessment and Evaluation of Computing Systems, 2012

2011
The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems.
IEEE Trans. Mob. Comput., 2011

An Intelligent Maintenance based on Machine Learning Approach for Wireless and Mobile Systems.
Proceedings of the WINSYS 2011, 2011

Towards a Federated Simulation Approach for Reliability Evaluation of Unmanned Aircraft Vehicles within Aeronautical Communcations Networking.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

A Statistical Anomaly-Based Algorithm for On-line Fault Detection in Complex Software Critical Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2011

RACME: A Framework to Support V&V and Certification.
Proceedings of the 5th Latin-American Symposium on Dependable Computing, 2011

Towards identifying OS-level anomalies to detect application software failures.
Proceedings of the IEEE International Workshop on Measurement and Networking, 2011

Localization errors of low-cost GPS devices in railway worksite-like scenarios.
Proceedings of the IEEE International Workshop on Measurement and Networking, 2011

A Reliable and Self-Aware Clock for reference time failure detection in internal synchronization environment.
Proceedings of the IEEE International Workshop on Measurement and Networking, 2011

Dependability Concerns in Model-Driven Engineering.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

A Service Discovery Approach for Testing Dynamic SOAs.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

Towards a MDE Transformation Workflow for Dependability Analysis.
Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011

A Testing Service for Lifelong Validation of Dynamic SOA.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

An event correlation approach for fault diagnosis in SCADA infrastructures.
Proceedings of the 13th European Workshop on Dependable Computing, 2011

2010
A New Approach and a Related Tool for Dependability Measurements on Distributed Systems.
IEEE Trans. Instrum. Meas., 2010

Available and safe message freshness detection algorithm.
Int. J. Crit. Comput. Based Syst., 2010

Practical Aspects in Analyzing and Sharing the Results of Experimental Evaluation.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Experimental Validation of a Synchronization Uncertainty-Aware Software Clock.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Improving Robustness of Network Fault Diagnosis to Uncertainty in Observations.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Towards a Framework for Self-Adaptive Reliable Network Services in Highly-Uncertain Environments.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2010

AMBER Roadmap: Ongoing Research Directions.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

2009
A Decomposition-Based Modeling Framework for Complex Systems.
IEEE Trans. Reliab., 2009

QoS Perceived by Users of Ubiquitous UMTS: Compositional Models and Thorough Analysis.
J. Softw., 2009

An Experimental Framework for the Analysis and Validation of Software Clocks.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Architecting and Validating Dependable Systems: Experiences and Visions.
Proceedings of the Architecting Dependable Systems VII, 2009

2008
Assuring Resilient Time Synchronization.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Analysis of User Perceived QoS in Ubiquitous UMTS Environments Subject to Faults.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

An integrated framework for the dependability evaluation of distributed mobile applications.
Proceedings of the SERENE 2008, 2008

A framework for dependable QoS adaptation in probabilistic environments.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

How hard is Assessing and Measuring Resilience? Panel.
Proceedings of the Seventh European Dependable Computing Conference, 2008

International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

A Resilient SIL 2 Driver Machine Interface for Train Control Systems.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

2007
Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters.
IEEE Trans. Dependable Secur. Comput., 2007

A Self-Aware Clock for Pervasive Computing Systems.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Towards Making NekoStat a Proper Measurement Tool for the Validation of Distributed Systems.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2007), 2007

The CRUTIAL Architecture for Critical Information Infrastructures.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

Analysis of a Redundant Architecture for Critical Infrastructure Protection.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia.
IEEE Trans. Dependable Secur. Comput., 2006

Hidden Markov Models as a Support for Diagnosis: Formalization of the Problem and Synthesis of the Solution.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Integration of an MPS Modeling Approach into Mobius.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006

Dependability Evaluation of Web Service-Based Processes.
Proceedings of the Formal Methods and Stochastic Models for Performance Evaluation, 2006

2005
A Modeling Methodology for Hierarchical Control System and its Aplication.
J. Braz. Comput. Soc., 2005

NekoStat extension to Neko: Quantitative Evaluation of Distributed Algorithms.
Proceedings of the Second International Conference on the Quantitative Evaluaiton of Systems (QEST 2005), 2005

Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension.
Proceedings of the Dependable Computing, Second Latin-American Symposium, 2005

Evaluation of the Impact of Congestion on Service Availability in GPRS Infrastructures.
Proceedings of the Service Availability, 2005

Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Dependability modeling and evaluation of multiple-phased systems using DEEM.
IEEE Trans. Reliab., 2004

Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications.
IEEE Trans. Dependable Secur. Comput., 2004

Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach.
Comput. J., 2004

A Freshness Detection Mechanism for Railway Applications.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Congestion analysis during outage, congestion treatment and outage recovery for simple GPRS networks.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

A Modular Approach for Model-Based Dependability Evaluation of a Class of Systems.
Proceedings of the Service Availability, 2004

Architectural challenges for a dependable Information Society.
Proceedings of the Building the Information Society, 2004

Model-based evaluation of a radio resource management system for wireless networks.
Proceedings of the First Conference on Computing Frontiers, 2004

2003
Service-Level Availability Estimation of GPRS.
IEEE Trans. Mob. Comput., 2003

Guest Editorial: Special Issue on Reliable Distributed Systems.
IEEE Trans. Computers, 2003

Analysis of Safety Related Architectures.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

A Framework for Reconfiguration-Based Fault-Tolerance in Distributed Systems.
Proceedings of the Architecting Dependable Systems II, 2003

2002
An adaptive approach to achieving hardware and software fault tolerance in a distributed computing environment.
J. Syst. Archit., 2002

Implementation of Threshold-based Diagnostic Mechanisms for COTS-Based Applications.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Analyzing quality of service of GPRS network systems from a user's perspective.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Stochastic Dependability Analysis of System Architecture Based on UML Models.
Proceedings of the Architecting Dependable Systems [the book is a result of the ICSE 2002 Workshop on Software Architectures for Dependable Systems], 2002

Performance Analysis of a Consensus Algorithm Combining Stochastic Activity Networks and Measurements.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Markov Regenerative Stochastic Petri Nets to Model and Evaluate Phased Mission Systems Dependability.
IEEE Trans. Computers, 2001

Design Validation of Embedded Dependable Systems.
IEEE Micro, 2001

Hierarchical modelling of complex control systems: dependability analysis of a railway interlocking.
Comput. Syst. Sci. Eng., 2001

Dependability analysis in the early phases of UML-based system design.
Comput. Syst. Sci. Eng., 2001

Evaluation of Fault-Tolerant Multiprocessor Systems for High Assurance Applications.
Comput. J., 2001

Modeling and Analysis of the Behavior of GPRS Systems.
Proceedings of the 6th Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2001), 2001

Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems.
Proceedings of the Computer Safety, 2001

Analysis and Estimation of the Quality of Service of Group Communication Protocols.
Proceedings of the 4th International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2001), 2001

Towards Optimal Database Maintenance in Wireless Communication Systems.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001

Analysis of the Effects of Outages on the Quality of Service of GPRS Network Systems.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Threshold-Based Mechanisms to Discriminate Transient from Intermittent Faults.
IEEE Trans. Computers, 2000

The meaning and role of value in scheduling flexible real-time systems.
J. Syst. Archit., 2000

Evaluation of Integrated Error Processing and Fault Diagnosis in Multiprocessor Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

Scheduling Solutions for Supporting Dependable Real-Time Applications.
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000

Design, Methods, and Tools for ORC.
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000

A Position on Design, Methods, and Tools for Object-Oriented Real-Time Computing.
Proceedings of the 3rd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2000), 2000

Analysis of group communication protocols to assess quality of service properties.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

DEEM: A Tool for the Dependability Modeling and Evaluation of Multiple Phased Systems.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
GUARDS: A Generic Upgradable Architecture for Real-Time Dependable Systems.
IEEE Trans. Parallel Distributed Syst., 1999

A Contribution to the Evaluation of the Reliability of Iterative-Execution Software.
Softw. Test. Verification Reliab., 1999

An Optimal Value-Based Admission Policy and its Reflective Use in Real-Time Systems.
Real Time Syst., 1999

High-level Integrated Design Environment for dependability (HIDE).
Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999

Automated Dependability Analysis of UML Designs.
Proceedings of the 2nd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '99), 1999

Automatic Dependability Analysis for Supporting Design Decisions in UML.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

Dependability Modelling and Sensitivity Analysis of Scheduled Maintenance Systems.
Proceedings of the Dependable Computing, 1999

1998
Temporal analysis of data flow control systems.
Autom., 1998

State Restoration in a COTS-Based N-Modular Architecture.
Proceedings of the 1st International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98), 1998

Optimal Discrimination between Transient and Permanent Faults.
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998

A New Heuristic to Discriminate between Transient and Intermittent Faults.
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998

1997
Value-driven resource assignment in object-oriented real-time dependable systems.
Proceedings of the 3rd Workshop on Object-Oriented Real-Time Dependable Systems (WORDS '97), 1997

Analytical Modelling and Evaluation of Phased-Mission Systems for Space Applications.
Proceedings of the 2nd High-Assurance Systems Engineering Workshop (HASE '97), 1997

A Scheduling Algorithm for Aperiodic Groups of Tasks in Distributed Real-Time Systems and its Holistic Analysis.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

Discriminating Fault Rate and Persistency to Improve Fault Treatment.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Adaptive software fault tolerance policies with dynamic real-time guarantees.
Proceedings of WORDS'96. The Second Workshop on Object-Oriented Real-Time Dependable Systems, 1996

Reachability and Timing Analysis in Data Flow Networks: A Case Study.
Proceedings of the 22rd EUROMICRO Conference '96, 1996

Dependability Modeling and Analysis of Complex Control Systems: An Application to Railway Interlocking.
Proceedings of the Dependable Computing, 1996

Planning the Execution of Task Groups in Real-Time Systems.
Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996

1995
Using Process Algebras for the Semantic Analysis of Data Flow Networks.
IEICE Trans. Inf. Syst., 1995

Dependability of Iterative Software: A Model for Evaluating the Effects of Input Correlation.
Proceedings of the 14th International Conference on Computer Safety, 1995

Adaptable Fault Tolerance for Real-Time Systems.
Proceedings of the Responsive Computer Systems: Steps Toward Fault-Tolerant Real-Time Systems, 1995

1994
Efficient Fault Tolerance: An Approach to Deal with Transient Faults in Multiprocessor Architectures.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994

On Performability Modeling and Evaluation of Software Fault Tolerant Structures.
Proceedings of the Dependable Computing, 1994

1993
Data Flow Control Systems: an Example of Safety Validation.
Proceedings of the 12th International Conference on Computer Safety, 1993

From Data Flow Networks to Process Algebras.
Proceedings of the PARLE '93, 1993

Functional paradigm for designing dependable large-scale parallel computing systems.
Proceedings of the International Symposium on Autonomous Decentralized Systems, 1993

1992
Destination Stripping Dual Ring: A New Protocol for MANs.
Comput. Networks ISDN Syst., 1992

Dataflow-Like Languages for Real-Time Systems: Issues of Computational Models and Notations.
Proceedings of the 11th Symposium on Reliable Distributed Systems, 1992

The Design of Distributed, Dependable Real-Time Systems Using a Functional Paradigm.
Proceedings of the Real Time Computing, 1992

1991
DSDR: A Fair and Efficient Access Protocol for Ring-Topology MANs.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

A Performable BSM Architecture.
Proceedings of the Fault-Tolerant Computing Systems, Tests, Diagnosis, 1991

1989
MAC Protocols for High-Speed MANs: Performance Comparisons for a Family of Fasnet-Based Protocols.
Comput. Networks ISDN Syst., 1989

Shared Abstract Data Types: An Algebraic Methodology for Their Specification.
Proceedings of the MFDBS 89, 1989


  Loading...