The challenge of validation for autonomic and self-managing systems T Eze, RJ Anthony, C Walshaw, A Soper Proceedings of the seventh international conference on autonomic and …, 2011 | 17 | 2011 |
Autonomic computing in the first decade: trends and direction T Eze, R Anthony, C Walshaw, A Soper Proceedings of the Eighth International Conference on Autonomic and …, 2012 | 16 | 2012 |
The evolution of ransomware variants AC Wood, T Eze Proceedings Of The European Conference On Cyber Warfare & Security, 410-420, 2020 | 10 | 2020 |
A technique for measuring the level of autonomicity of self-managing systems T Eze, R Anthony, A Soper, C Walshaw International Conference on Autonomic and Autonomous Systems (ICAS), 8-13, 2012 | 10 | 2012 |
A generic approach towards measuring level of autonomicity in adaptive systems T Eze, R Anthony, A Soper, C Walshaw International Journal on Advances in Intelligent Systems 5 (3 & 4), 553-566, 2012 | 8 | 2012 |
A new architecture for trustworthy autonomic systems T Eze, R Anthony, C Walshaw, A Soper Proceedings of the Eighth International Conference on Autonomic and …, 2012 | 7 | 2012 |
Performance analysis of MANET routing protocols over different mobility models EE Igbesoko, TO Eze, M Ghassemian London Communications Symposium (LCS), University College London, 2010 | 6 | 2010 |
Policing the cyber threat: Exploring the threat from cyber crime and the ability of local law enforcement to respond M Hull, T Eze, L Speakman 2018 European Intelligence and Security Informatics Conference (EISIC), 15-22, 2018 | 5 | 2018 |
A methodology for evaluating complex interactions between multiple autonomic managers T Eze, R Anthony, C Walshaw, A Soper Proceedings of the Ninth International Conference on Autonomic and …, 2013 | 5 | 2013 |
Towards Cyber-User Awareness: Design and Evaluation T Oyinloye, T Eze, L Speakman European Conference on Cyber Warfare and Security, 577-VIII, 2020 | 2 | 2020 |
Dead-zone logic in autonomic systems T Eze, R Anthony 2014 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS), 1-8, 2014 | 2 | 2014 |
Heterogeneous mobility models scenario: performance analysis of disaster area for mobile ad hoc networks TO Eze, M Ghassemian Proceedings of London Communications Symposium (LCS), University College London, 2010 | 2 | 2010 |
Watchdog Monitoring for Detecting and Handling of Control Flow Hijack on RISC-V-based Binaries T Oyinloye, L Speakman, T Eze, L O'Mahony SAI Organization, 2022 | 1 | 2022 |
Inter-Process CFI for Peer/Reciprocal Monitoring in RISC-V-Based Binaries T Oyinloye, L Speakman, T Eze European Conference on Cyber Warfare and Security, 605-VIII, 2021 | 1 | 2021 |
Policing the cyber threat: exploring the threat from cyber crime and the ability of local law enforcement to respond T Eze, M Hull, L Speakman IEEE, 2019 | 1 | 2019 |
Stigmergic interoperability for autonomic systems: Managing complex interactions in multi-manager scenarios T Eze, R Anthony 2016 SAI Computing Conference (SAI), 513-522, 2016 | 1 | 2016 |
Trustworthy autonomic architecture (TAArch): Implementation and empirical investigation T Eze, R Anthony International Journal On Advances in Intelligent Systems 7 (1-2), 279-301, 2014 | 1 | 2014 |
Ret-gadgets in RISC-V-based Binaries Resulting in Traps for Hijackers T Oyinloye, L Speakman, T Eze Academic Conferences International, 2023 | | 2023 |
Trustworthy Autonomic Computing T Eze IET, 2022 | | 2022 |
CAP: Patching the Human Vulnerability T Eze, N Hawker International Symposium on Human Aspects of Information Security and …, 2022 | | 2022 |