Home > Research > Browse

Results for Verification

Publications & Outputs

  1. MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. Quick verification of concurrent programs by iteratively relaxed scheduling

    Metzler, P., Saissi, H., Bokor, P., Suri, N., T.N., N. (ed.), G., R. (ed.) & M., D. P. (ed.), 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 776-781 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (ed.), Peled, D. (ed.) & Legay, A. (ed.), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. A survey of approaches for verifying model transformations

    Ab. Rahim, L. & Whittle, J., 05/2015, In : Software and Systems Modeling. 14, 2, p. 1003-1028 26 p.

    Research output: Contribution to journalJournal article

  6. Security policy verification for multi-domains in cloud systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 1/04/2014, In : International Journal of Information Security. 13, 2, p. 97-111 15 p.

    Research output: Contribution to journalJournal article

  7. How reliable are citizen‐derived scientific data? assessing the quality of contrail observations made by the general public

    Fowler, A., Whyatt, D., Davies, G. & Ellis, R., 08/2013, In : Transactions in GIS. 17, 4, p. 488-506 19 p.

    Research output: Contribution to journalJournal article

  8. A methodology for the development and verification of access control systems in cloud computing

    Gouglidis, A. & Mavridis, I., 2013, Collaborative, Trusted and Privacy-Aware e/m-Services. Douligeris, C., Polemi, N., Karantjias, A. & Lamersdorf, W. (eds.). Berlin: Springer Verlag, p. 88-99 12 p. (IFIP Advances in Information and Communication Technology ; vol. 399).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  9. SuperIdentity: fusion of identity across real and cyber domains

    Black, S., Creese, S. (ed.), Guest, R., Pike, B. (ed.), Saxby, S. (ed.), Stanton Fraser, D. (ed.), Stevenage, S. V. & Whitty, M. T. (ed.), 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper