Malcolm Munro

Affiliations:
  • Durham University, UK


According to our database1, Malcolm Munro authored at least 145 papers between 1977 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Cost and Effect of Using Scheduling Security Model in a Cloud Environment.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
Test case generation for semantic-based user input validation of web applications.
Int. J. Web Eng. Technol., 2018

SSM: Scheduling Security Model for a Cloud Environment.
Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing, 2018

2014
Enhancing the quality of software design through multi-touch interfaces.
Proceedings of the IEEE Frontiers in Education Conference, 2014

2013
Enhancing Engagement and Collaborative Learning Skills in Multi-touch Software for UML Diagramming.
Proceedings of the 10th International Conference on Computer-Supported Collaborative Learning, 2013

2012
Systematic analysis of centralized online reputation systems.
Decis. Support Syst., 2012

2011
In memory of Manny Lehman, 'Father of Software Evolution'.
J. Softw. Maintenance Res. Pract., 2011

CbSSDF: A Two-Layer Conceptual Graph Approach to Web Services Description and Composition - A Scenario Based Solution Analysis and Comparison with OWL-S.
Int. J. Inf. Syst. Model. Des., 2011

Towards an Axiomatic Verification System for JavaScript.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

2010
A conceptual graph approach to semantic similarity computation method for e-service discovery.
Int. J. Knowl. Eng. Data Min., 2010

Evaluation of Collecting Reviews in Centralized Online Reputation Systems.
Proceedings of the WEBIST 2010, 2010

An Analytic Model of Atomic Service for Services Descriptions.
Proceedings of the International Conference on Service Sciences, 2010

Certifying software robustness using program slicing.
Proceedings of the 26th IEEE International Conference on Software Maintenance (ICSM 2010), 2010

2009
Detecting Phishing Websites: On the Effectiveness of Users' Tips.
J. Digit. Inf. Manag., 2009

An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

CbSSDF and OWL-S: A Scenario-Based Solution Analysis and Comparison.
Proceedings of the Information Systems Development, 2009

An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

2008
Software Architecture Visualization: An Evaluation Framework and Its Application.
IEEE Trans. Software Eng., 2008

An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest.
Proceedings of the Computer Safety, 2008

Fault-Based Web Services Testing.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A Method for Transforming Existing Web Service Descriptions into an Enhanced Semantic Web Service Framework.
Proceedings of the Information Systems Development, 2008

An evaluation of users' tips effectiveness for Phishing websites detection.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

2007
Determining the dependability of Service-Oriented Architectures.
Int. J. Simul. Process. Model., 2007

An Approach for WSDL-Based Automated Robustness Testing of Web Services.
Proceedings of the Information Systems Development, 2007

Semantic Service Description Framework for Address.
Proceedings of the Information Systems Development, 2007

An e-Commerce fair exchange protocol for exchanging digital products and payments.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

An efficient fair exchange protocol that enforces the merchant to be honest.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

An Approach for Specification-based Test Case Generation for Web Services.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
Information Technology and the Board of Directors: Is There an IT Attention Deficit?
MIS Q. Executive, 2006

A Software Traceability Validation For Change Impact Analysis of Object Oriented Software.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Semantics Recognition in Service Composition Using Conceptual Graph.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

2005
Integrating Software Traceability for Change Impact Analysis.
Int. Arab J. Inf. Technol., 2005

An Ontology-Based Approach for Determining the Dependability of Service-Oriented Architectures.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

Identifying Structural Features of Java Programs by Analysing the Interaction of Classes at Runtime.
Proceedings of the 3rd International Workshop on Visualizing Software for Understanding and Analysis, 2005

A Framework for Software Architecture Visualization Assessment.
Proceedings of the 3rd International Workshop on Visualizing Software for Understanding and Analysis, 2005

Pedagogic data as a basis for Web service fault models.
Proceedings of the 2005 IEEE International Workshop on Service-Oriented System Engineering (SOSE 2005), 2005

Implementing a Document-based Requirements Traceability: A Case Study.
Proceedings of the IASTED International Conference on Software Engineering, 2005

Increasing Web Service Dependability Through Consensus Voting.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

A Comparison of Network Level Fault Injection with Code Insertion.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Understanding Service-Oriented Software.
IEEE Softw., 2004

Introduction to the AIS Code of Research Conduct.
Commun. Assoc. Inf. Syst., 2004

Syntax-Directed Amorphous Slicing.
Autom. Softw. Eng., 2004

WS-FIT: A Tool for Dependability Analysis of Web Services.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
Moral Dominance Relations for Program Comprehension.
IEEE Trans. Software Eng., 2003

Report of the Ad Hoc Committee on Member Misconduct to the AIS Council.
Commun. Assoc. Inf. Syst., 2003

The end of the line for Software Visualisation?
Proceedings of the 2nd International Workshop on Visualizing Software for Understanding and Analysis, 2003

2002
Source code analysis and manipulation.
Inf. Softw. Technol., 2002

Revision Towers.
Proceedings of the 1st International Workshop on Visualizing Software for Understanding and Analysis, 2002

Runtime Visualisation of Object Oriented Software.
Proceedings of the 1st International Workshop on Visualizing Software for Understanding and Analysis, 2002

Weakest Precondition for General Recursive Programs Formalized in Coq.
Proceedings of the Theorem Proving in Higher Order Logics, 15th International Conference, 2002

Visualisation for informed decision making; from code to components.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

Mechanized Operational Semantics of WSL.
Proceedings of the 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 2002

An Interprocedural Amorphous Slicer for WSL.
Proceedings of the 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 2002

Program Comprehension Experiences with GXL; Comprehension for Comprehension.
Proceedings of the 10th International Workshop on Program Comprehension (IWPC 2002), 2002

Building Embedded Fault-Tolerant Systems for Critical Applications: An Experimental Study.
Proceedings of the Design and Analysis of Distributed Embedded Systems, IFIP 17<sup>th</sup> World Computer Congress, 2002

A Post-Placement Side-Effect Removal Algorithm.
Proceedings of the 18th International Conference on Software Maintenance (ICSM 2002), 2002

Prototype Implementations of an Architectural Model for Service-Based Flexible Software.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
An improved method of selecting regression tests for C++ programs.
J. Softw. Maintenance Res. Pract., 2001

Generalized partition testing via Bayes linear methods.
Inf. Softw. Technol., 2001

Building Dependable Software for Critical Applications: Multi-Version Software versus One Good Version.
Proceedings of the 6th Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2001), 2001

GUSTT: An Amorphous Slicing System which Combines Slicing and Transformation.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001

Organisational Trails through Software Systems.
Proceedings of the 4th International Workshop on Principles of Software Evolution, 2001

Mediating Diverse Visualisations for Comprehension.
Proceedings of the 9th International Workshop on Program Comprehension (IWPC 2001), 2001

Side-Effect Removal Transformation.
Proceedings of the 9th International Workshop on Program Comprehension (IWPC 2001), 2001

An Architectural Model for Service-Based Software with Ultra Rapid Evolution.
Proceedings of the 2001 International Conference on Software Maintenance, 2001

Visualisations; Functionality and Interaction.
Proceedings of the Computational Science - ICCS 2001, 2001

Towards automatic adaptation of data interfaces.
Proceedings of the Universal Access In HCI: Towards an Information Society for All, 2001

An Architectural Model for Service-Based Flexible Software.
Proceedings of the 25th International Computer Software and Applications Conference (COMPSAC 2001), 2001

2000
Using evolution to evaluate reverse engineering technologies: mapping the process of software change.
J. Syst. Softw., 2000

Assessing User Competence: Conceptualization and Measurement.
Inf. Syst. Res., 2000

Supporting program comprehension using dominance trees.
Ann. Softw. Eng., 2000

Visual representation of stochastic process algebra models.
Proceedings of the Second International Workshop on Software and Performance, 2000

Should Users Inhabit Visualizations?
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Virtual but Visible Software.
Proceedings of the International Conference on Information Visualisation, 2000

Service-based software: the future for flexible software.
Proceedings of the 7th Asia-Pacific Software Engineering Conference (APSEC 2000), 2000

1999
Test-Case Development During OO Lifecycle and Evolution.
J. Object Oriented Program., 1999

Decision model for legacy systems.
IEE Proc. Softw., 1999

The Future of Software.
Commun. ACM, 1999

An Initial Approach towards Measuring and Characterizing Software Evolution.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999

The Evolution of Websites.
Proceedings of the 7th International Workshop on Program Comprehension (IWPC '99), May 5-7, 1999, 1999

Comprehension with[in] Virtual Environment Visualisations.
Proceedings of the 7th International Workshop on Program Comprehension (IWPC '99), May 5-7, 1999, 1999

Evaluating the Use of Dominance Trees for C and COBOL.
Proceedings of the 1999 International Conference on Software Maintenance, 1999

Maintenance with Reuse: An Integrated Approach Based on Software Configuration Management.
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999

3D Software Visualisation.
Proceedings of the Visual Representations and Interpretations, 1999

1998
Survey Instruments in Information Systems.
MIS Q., 1998

An integrated environment for reuse reengineering C code.
J. Syst. Softw., 1998

A method for the identification of reusable units through the reengineering of legacy code.
J. Syst. Softw., 1998

Software Configuration Management for a Reusable Software Library within a Software Maintenance Environment.
Int. J. Softw. Eng. Knowl. Eng., 1998

Assisting Human Understanding to Aid the Targeting of Necessary Reengineering Work.
Proceedings of the 5th Working Conference on Reverse Engineering, 1998

Visualizing Software in Virtual Reality.
Proceedings of the 6th International Workshop on Program Comprehension (IWPC '98), 1998

Investigating Component-Based Maintenance and the Effect of Software Evolution: A Reengineering Approach Using Data Clustering.
Proceedings of the 1998 International Conference on Software Maintenance, 1998

Applying a Domain Specific Language Approach to Component Oriented Programming.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Reengineering Support for Software Evolution: An Evaluation through Case Study.
Proceedings of the COMPSAC '98, 1998

1997
Understanding and measuring user competence.
Inf. Manag., 1997

The Implications of Non-Functional Requirements for the Reengineering of Legacy Code.
Proceedings of the 4th Working Conference on Reverse Engineering, 1997

PUI: A Tool to Support Program Understanding.
Proceedings of the 5th International Workshop on Program Comprehension (WPC '97), May 28-30, 1997, 1997

Enriching Program Comprehension for Software Reuse.
Proceedings of the 5th International Workshop on Program Comprehension (WPC '97), May 28-30, 1997, 1997

Investigating the Maintenance Implications of the Replication of Code.
Proceedings of the 1997 International Conference on Software Maintenance (ICSM '97), 1997

1996
An Improved Algorithm for Identifying Objects in Code.
Softw. Pract. Exp., 1996

A Specification Driven Slicing Process for Identifying Reusable Functions.
J. Softw. Maintenance Res. Pract., 1996

Extracting Reusable Modules from Legacy Code: Considering the Issues of Module Granularity.
Proceedings of the 3rd Working Conference on Reverse Engineering, 1996

Understanding Function Behaviors through Program Slicing.
Proceedings of the 4th International Workshop on Program Comprehension (WPC '96), 1996

Greater Understanding Through Maintainer Driven Traceability.
Proceedings of the 4th International Workshop on Program Comprehension (WPC '96), 1996

Software Maintenance for 2005.
Proceedings of the 1996 International Conference on Software Maintenance (ICSM '96), 1996

Analysing Large COBOL Programs: the extraction of reusable modules.
Proceedings of the 1996 International Conference on Software Maintenance (ICSM '96), 1996

Applying Conventional Testing Techniques for Class Testing.
Proceedings of the COMPSAC '96, 1996

1995
Deriving a Logical Data Model for a System Using the RECAST Method.
Proceedings of the 2nd Working Conference on Reverse Engineering, 1995

Qualifying Reusable Functions Using Symbolic Execution.
Proceedings of the 2nd Working Conference on Reverse Engineering, 1995

Identifying reusable functions using specification driven program slicing: a case study.
Proceedings of the International Conference on Software Maintenance, 1995

The AMES approach to application understanding: a case study.
Proceedings of the International Conference on Software Maintenance, 1995

1994
An early impact analysis technique for software maintenance.
J. Softw. Maintenance Res. Pract., 1994

Software configuration management issues in the maintenance of existing systems.
J. Softw. Maintenance Res. Pract., 1994

RE<sup>2</sup>: Reverse-engineering and reuse re-engineering.
J. Softw. Maintenance Res. Pract., 1994

Program comprehension through the identification of abstract data types.
Proceedings of the Proceedings 1994 IEEE 3rd Workshop on Program Comprehension, 1994

The Impact Analysis Task in Software Maintenance: A Model and a Case Study.
Proceedings of the International Conference on Software Maintenance, 1994

Understanding C Programs Using the Combined C Graph Representation.
Proceedings of the International Conference on Software Maintenance, 1994

A Precise Method for Identifying Reusable Abstract Data Types in Code.
Proceedings of the International Conference on Software Maintenance, 1994

1993
RECAST: Reverse Engineering from COBOL to SSADM Specifications.
Proceedings of Working Conference on Reverse Engineering, 1993

A Reverse Engineering Method for Identifying Reusable Abstract Data Types.
Proceedings of Working Conference on Reverse Engineering, 1993

A combined representation for the maintenance of C programs.
Proceedings of the IEEE Second Workshop on Program Comprehension, 1993

Experiments in identifying reusable abstract data types in program code.
Proceedings of the IEEE Second Workshop on Program Comprehension, 1993

Abstracting the Logical Processing Life Cycle for Entities Using the RECAST Method.
Proceedings of the Conference on Software Maintenance, 1993

Extracting Abstract Data Types from C Programs: A Case Study.
Proceedings of the Conference on Software Maintenance, 1993

RECAST: Reverse Engineering from COBOL to SSADM Specification.
Proceedings of the 15th International Conference on Software Engineering, 1993

1992
Modelling and measuring end user sophistication.
Proceedings of the 1992 ACM SIGCPR Conference on Computer Personnel Research, 1992

COMFORM-a software maintenance method based on the software configuration management discipline.
Proceedings of the Conference on Software Maintenance, 1992

Redocumentation for the maintenance of software.
Proceedings of the 30th Annual Southeast Regional Conference, 1992

1991
Report on the fourth European software maintenance workshop.
J. Softw. Maintenance Res. Pract., 1991

Approaches to program comprehension.
J. Syst. Softw., 1991

1990
Understanding the configurations of operational systems.
Proceedings of the Conference on Software Maintenance, 1990

1989
Report on 2nd UK software maintenance workshop.
ACM SIGSOFT Softw. Eng. Notes, 1989

An approach to software maintenance education.
Softw. Eng. J., 1989

The Maintainer's Assistant [software tool].
Proceedings of the Conference on Software Maintenance, 1989

Software change information for maintenance management.
Proceedings of the Conference on Software Maintenance, 1989

Project Work in Software Maintenance Education.
Proceedings of the Software Engineering Education, 1989

1988
The first UK software maintenance workshop.
ACM SIGSOFT Softw. Eng. Notes, 1988

Expansion and Control of End-User Computing.
J. Manag. Inf. Syst., 1988

Growth Stages of End User Computing.
Commun. ACM, 1988

Redocumenting software systems using hypertext technology.
Proceedings of the Conference on Software Maintenance, 1988

A knowledge-based system for software maintenance.
Proceedings of the Conference on Software Maintenance, 1988

1985
Information Technology Assessment and Adoption: A Field Study.
MIS Q., 1985

Information technology assessment and adoption: understanding the information centre role.
Proceedings of the twenty-first annual conference on Computer personnel research, 1985

1981
The value of information in information analysis.
Inf. Manag., 1981

1980
Planning, Critical Success Factors, and Management's Information Requirements.
MIS Q., 1980

1977
Determining Management Information Needs: A Comparison of Methods.
MIS Q., 1977


  Loading...