Journal cover image

Browse issues

Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Critical Computer-Based Systems

2010 Vol. 1 No. 1/2/3

Special Issue on Modelling and Performance Analysis for System Dependability

Guest Editors: Professor Wojciech Zamojski and Dr. Jarosław Sugier


PagesTitle and authors
5-23A hardware-in-the-loop simulation environment for real-time systems development and architecture evaluation
Vasily V. Balashov, Anatoly G. Bakhmurov, Maxim V. Chistolinov, Ruslan L. Smeliansky, Dmitry Y. Volkanov, Nikita V. Youshchenko
DOI: 10.1504/IJCCBS.2010.031706

24-40Scalable diversity-oriented decisions and technologies for dependable SoPC-based safety-critical computer systems and infrastructures
Vyacheslav Kharchenko, Volodymyr Sklyar
DOI: 10.1504/IJCCBS.2010.031890

41-58Safety scheduling strategies in distributed computing
Victor V. Toporkov, Alexey Tselishchev
DOI: 10.1504/IJCCBS.2010.031899

59-85Semi-Markov performance modelling of a redundant system with partial, full and failed rejuvenation
V.P. Koutras, A.N. Platis
DOI: 10.1504/IJCCBS.2010.031909

86-103SeReCon: a secure reconfiguration controller for self-reconfigurable systems
Krzysztof Kepa, Fearghal Morgan, Krzysztof Kosciuszkiewicz, Tomasz Surmacz
DOI: 10.1504/IJCCBS.2010.031707

104-116Designing AES cryptographic unit for automatic implementation in low-cost FPGA devices
Lukasz Krukowski, Jaroslaw Sugier
DOI: 10.1504/IJCCBS.2010.031708

117-127Fast fault-tolerant adders
Janusz Biernat
DOI: 10.1504/IJCCBS.2010.031709

128-147Capture and reuse of composable failure patterns
Ian Wolforth, Martin Walker, Yiannis Papadopoulos, Lars Grunske
DOI: 10.1504/IJCCBS.2010.031710

148-160Protection system against overload and distributed denial of service attacks
Ervin Toth, Zoltan Hornak, Gergely Toth
DOI: 10.1504/IJCCBS.2010.031711

161-177Model for evaluation of SOA security metrics using attack graphs
Jan Magott, Marek Woda
DOI: 10.1504/IJCCBS.2010.031712

178-190Misuse-based intrusion detection using Bayesian networks
Wojciech Tylman
DOI: 10.1504/IJCCBS.2010.031713

191-207Modelling and performance analysis of component-based systems
W.M. Zuberek, I. Bluemke, D.C. Craig
DOI: 10.1504/IJCCBS.2010.031714

208-219Using UML(VR) for the support of the test data generation
Leszek Kotulski, Dariusz Dymek
DOI: 10.1504/IJCCBS.2010.031715

220-237XML schema based fault set definition to improve fault injection tools interoperability
Antonio Da Silva, Jose F. Martinez, Alberto Gonzalez-Calero, Lourdes Lopez, Ana B. Garcia, Vicente Hernandez
DOI: 10.1504/IJCCBS.2010.031716

238-254Verification and implementation of software for dependable controllers
Krzysztof Sacha
DOI: 10.1504/IJCCBS.2010.031717

255-266Functional availability analysis of discrete transport system simulated by SSF tool
Tomasz Walkowiak, Jacek Mazurkiewicz
DOI: 10.1504/IJCCBS.2010.031718

267-279A meta-level true random number generator
Bernhard Fechner, Andre Osterloh
DOI: 10.1504/IJCCBS.2010.031719