Items where Author is "Kendall, David"

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 23.

Article

Eliot, Neil, Kendall, David and Brockway, Michael (2018) A New Metric for the Analysis of Swarms using Potential Fields. IEEE Access, 6. pp. 63258-63267. ISSN 2169-3536

Eliot, Neil, Kendall, David and Brockway, Michael (2018) A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills. IEEE Access, 6. pp. 34884-34895. ISSN 2169-3536

Bradley, Steven, Henderson, William, Kendall, David and Robson, Adrian (2001) Formal design language for real-time systems with data. Science of Computer Programming, 40 (1). pp. 3-29. ISSN 0167-6423

Henderson, William, Kendall, David and Robson, Adrian (2001) Improving the accuracy of scheduling analysis applied to distributed systems. Real-Time Systems, 20 (1). pp. 5-25. ISSN 0922 6443

Bradley, Steven, Henderson, William and Kendall, David (1999) Reducing conservatism in response time analysis of distributed systems. IEE Colloquium (Digest) (6). pp. 25-28. ISSN 0963 3308

Kendall, David, Henderson, William and Robson, Adrian (1999) Using sharing trees in the automated analysis of real-time systems with data. IEE Colloquium (Digest) (6). pp. 21-24. ISSN 0963-3308

Bradley, Steven, Henderson, William, Kendall, David and Robson, Adrian (1994) A formally based hard real-time kernel. Microprocessors and Microsystems, 18 (9). pp. 513-521. ISSN 0141-9331

Book Section

Eliot, Neil, Kendall, David, Brockway, Michael, Moon, Alun and Amos, Martyn (2019) Void Reduction in Self-Healing Swarms. In: ALIFE 2019: The 2019 Conference on Artificial Life. The MIT Press, London, pp. 87-94.

Saghar, Kashif, Farid, Hunaina, Kendall, David and Bouridane, Ahmed (2016) Formal specifications of Denial of Service attacks in Wireless Sensor Networks. In: 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, Piscataway, NJ, pp. 324-333. ISBN 978-1-4673-9126-9

Saghar, Kashif, Tariq, Mamoona, Kendall, David and Bouridane, Ahmed (2016) RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network. In: 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, Piscataway, NJ, pp. 334-345. ISBN 978-1-4673-9126-9

Doswell, Stephen, Aslam, Nauman, Kendall, David and Sexton, Graham (2015) A longitudinal approach to measuring the impact of mobility on low-latency anonymity networks. In: Proceedings of the 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, Piscataway, NJ, pp. 108-113. ISBN 9781479953431

Saghar, Kashif, Kendall, David and Bouridane, Ahmed (2014) Application of Formal Modeling to Detect Black Hole Attacks in Wireless Sensor Network Routing Protocols. In: Proceedings of 2014 11th International Bhurban Conference on Applied Sciences and Technology. International Bhurban Conference on Applied Sciences and Technology . IEEE, Piscataway, NJ, pp. 191-194. ISBN 978-1-4799-2319-9

Saghar, Kashif, Kendall, David and Bouridane, Ahmed (2011) Vulnerability of INSENS to denial of service attacks. In: Proceedings of the 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Piscataway, NJ, pp. 1896-1899. ISBN 978-1457705380

Saghar, Kashif, Henderson, William, Kendall, David and Bouridane, Ahmed (2010) Formal modelling of a robust wireless sensor network routing protocol. In: 2010 NASA/ESA Conference on Adaptive Hardware and Systems (AHS). IEEE, Piscataway, NJ, pp. 281-288. ISBN 978-1-4244-5887-5

Conference or Workshop Item

Saghar, Kashif, Kendall, David and Bouridane, Ahmed (2015) RAEED: A solution for hello flood attack. In: Applied Sciences and Technology (IBCAST), 2015 12th International Bhurban Conference on, 13 - 17 January 2015, Islamabad.

Doswell, Stephen, Aslam, Nauman, Kendall, David and Sexton, Graham (2013) Please Slow Down! The Impact on Tor Performance from Mobility. In: 3rd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 8th November 2013, Berlin, Germany.

Doswell, Stephen, Aslam, Nauman, Kendall, David and Sexton, Graham (2013) The novel use of Bridge Relays to provide persistent Tor connections for mobile devices. In: 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications: Mobile and Wireless Networks (PIMRC'13 - Mobile and Wireless Networks), 8-11 September, 2013, London.

Saghar, Kashif, Henderson, William, Kendall, David and Bouridane, Ahmed (2010) Applying formal modelling to detect DoS attacks in wireless medium. In: 7th International Symposium on Communication Systems Networks and Digital Signal processing (CSNDSP), 21-23 July 2010, Northumbria University, Newcastle upon Tyne.

Saghar, Kashif, Henderson, William and Kendall, David (2009) Formal modelling and analysis of routing protocol security in wireless sensor networks. In: 10th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNET 09).

Henderson, William, Kendall, David and Robson, Adrian (2000) Accounting for clock frequency variation in the analysis of distributed factory control systems. In: 2000 IEEE International Workshop on Factory Communication Systems, 6-8 Spetember 2000, Torino.

Kendall, David, Henderson, William and Robson, Adrian (1998) Modelling and analysis of broadcasting embedded control systems. In: IEE Colloquium on Real-Time Systems (Digest No. 1998/306), 21 April 1998, York.

Kendall, David, Bradley, Steven, Henderson, William and Robson, Adrian (1998) bCANDLE: Formal modelling and analysis of CAN control systems. In: Fourth IEEE Real-Time Technology and Applications Symposium, 3-5 June 1998, Denver, CO.

Bradley, Steven, Henderson, William, Kendall, David and Robson, Adrian (1994) Practical formal development of real time systems. In: RTOSS '94: 11th IEEE Workshop on Real-Time Operating Systems and Software, 18-19 May 1994, Seattle.

This list was generated on Thu Dec 26 10:50:38 2024 UTC.