Follow
Dr. Thaddeus Eze
Title
Cited by
Cited by
Year
The challenge of validation for autonomic and self-managing systems
T Eze, RJ Anthony, C Walshaw, A Soper
Proceedings of the seventh international conference on autonomic and …, 2011
172011
Autonomic computing in the first decade: trends and direction
T Eze, R Anthony, C Walshaw, A Soper
Proceedings of the Eighth International Conference on Autonomic and …, 2012
162012
The evolution of ransomware variants
AC Wood, T Eze
Proceedings Of The European Conference On Cyber Warfare & Security, 410-420, 2020
102020
A technique for measuring the level of autonomicity of self-managing systems
T Eze, R Anthony, A Soper, C Walshaw
International Conference on Autonomic and Autonomous Systems (ICAS), 8-13, 2012
102012
A generic approach towards measuring level of autonomicity in adaptive systems
T Eze, R Anthony, A Soper, C Walshaw
International Journal on Advances in Intelligent Systems 5 (3 & 4), 553-566, 2012
82012
A new architecture for trustworthy autonomic systems
T Eze, R Anthony, C Walshaw, A Soper
Proceedings of the Eighth International Conference on Autonomic and …, 2012
72012
Performance analysis of MANET routing protocols over different mobility models
EE Igbesoko, TO Eze, M Ghassemian
London Communications Symposium (LCS), University College London, 2010
62010
Policing the cyber threat: Exploring the threat from cyber crime and the ability of local law enforcement to respond
M Hull, T Eze, L Speakman
2018 European Intelligence and Security Informatics Conference (EISIC), 15-22, 2018
52018
A methodology for evaluating complex interactions between multiple autonomic managers
T Eze, R Anthony, C Walshaw, A Soper
Proceedings of the Ninth International Conference on Autonomic and …, 2013
52013
Towards Cyber-User Awareness: Design and Evaluation
T Oyinloye, T Eze, L Speakman
European Conference on Cyber Warfare and Security, 577-VIII, 2020
22020
Dead-zone logic in autonomic systems
T Eze, R Anthony
2014 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS), 1-8, 2014
22014
Heterogeneous mobility models scenario: performance analysis of disaster area for mobile ad hoc networks
TO Eze, M Ghassemian
Proceedings of London Communications Symposium (LCS), University College London, 2010
22010
Watchdog Monitoring for Detecting and Handling of Control Flow Hijack on RISC-V-based Binaries
T Oyinloye, L Speakman, T Eze, L O'Mahony
SAI Organization, 2022
12022
Inter-Process CFI for Peer/Reciprocal Monitoring in RISC-V-Based Binaries
T Oyinloye, L Speakman, T Eze
European Conference on Cyber Warfare and Security, 605-VIII, 2021
12021
Policing the cyber threat: exploring the threat from cyber crime and the ability of local law enforcement to respond
T Eze, M Hull, L Speakman
IEEE, 2019
12019
Stigmergic interoperability for autonomic systems: Managing complex interactions in multi-manager scenarios
T Eze, R Anthony
2016 SAI Computing Conference (SAI), 513-522, 2016
12016
Trustworthy autonomic architecture (TAArch): Implementation and empirical investigation
T Eze, R Anthony
International Journal On Advances in Intelligent Systems 7 (1-2), 279-301, 2014
12014
Ret-gadgets in RISC-V-based Binaries Resulting in Traps for Hijackers
T Oyinloye, L Speakman, T Eze
Academic Conferences International, 2023
2023
Trustworthy Autonomic Computing
T Eze
IET, 2022
2022
CAP: Patching the Human Vulnerability
T Eze, N Hawker
International Symposium on Human Aspects of Information Security and …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20