Follow
R Gamble
Title
Cited by
Cited by
Year
The impact of component architectures on interoperability
L Davis, RF Gamble, J Payton
Journal of Systems and Software 61 (1), 31-45, 2002
802002
Towards a taxonomy of architecture integration strategies
R Keshav, R Gamble
Proceedings of the third international workshop on Software architecture, 89-92, 1998
761998
Practical DoS attacks on embedded networks in commercial vehicles
S Mukherjee, H Shirazi, I Ray, J Daily, R Gamble
Information Systems Security: 12th International Conference, ICISS 2016 …, 2016
712016
Secagreement: Advancing security risk calculations in cloud services
ML Hale, R Gamble
2012 IEEE Eighth World Congress on Services, 133-140, 2012
632012
Methodologies for the development of knowledge-based systems, 1982–2002
R Plant, R Gamble
The Knowledge Engineering Review 18 (1), 47-81, 2003
532003
Introducing replaceability into web service composition
H Al-Helal, R Gamble
IEEE Transactions on Services Computing 7 (2), 198-209, 2014
502014
CyberPhishing: A game-based platform for phishing awareness testing
ML Hale, RF Gamble, P Gamble
2015 48th Hawaii International Conference on System Sciences, 5260-5269, 2015
462015
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
S Jahan, I Riley, C Walter, RF Gamble, M Pasco, PK McKinley, ...
Future Generation Computer Systems 109, 197-209, 2020
452020
Formal derivation of rule-based programs
GC Roma, RF Gamble, WE Ball
IEEE Transactions on Software Engineering 19 (3), 277-296, 1993
431993
Securing over-the-air IoT firmware updates using blockchain
X He, S Alqahtani, R Gamble, M Papa
Proceedings of the International Conference on Omni-Layer Intelligent …, 2019
402019
Developing a platform to evaluate and assess the security of wearable devices
ML Hale, K Lotfy, RF Gamble, C Walter, J Lin
Digital Communications and Networks 5 (3), 147-159, 2019
392019
Assessing individual performance in Agile undergraduate software engineering teams
RF Gamble, ML Hale
2013 IEEE Frontiers in Education Conference (FIE), 1678-1684, 2013
392013
Monoliths to mashups: Increasing opportunistic assets
MT Gamble, R Gamble
IEEE software 25 (6), 2008
372008
Information flow control for stream processing in clouds
X Xie, I Ray, R Adaikkalavan, R Gamble
Proceedings of the 18th ACM symposium on Access control models and …, 2013
352013
DDoS attacks in service clouds
S Alqahtani, RF Gamble
2015 48th Hawaii International Conference on System Sciences, 5331-5340, 2015
342015
A notation for problematic architecture interactions
L Davis, R Gamble, J Payton, G Jónsdóttir, D Underwood
ACM SIGSOFT Software Engineering Notes 26 (5), 132-141, 2001
312001
Towards Software Multioperability: Bridging Heterogeneous Software Interoperability Platforms
N Medvidovic, R Gamble, D Rosenblum
Proceedings, Fourth International Software Architecture Workshop, 2000
312000
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
ML Hale, RF Gamble
Requirements Engineering 24, 365-402, 2019
302019
A tiered strategy for auditing in the cloud
R Xie, R Gamble
2012 IEEE Fifth International Conference on Cloud Computing, 945-946, 2012
302012
Toward privacy-assured health insurance claims
X He, S Alqahtani, R Gamble
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
292018
The system can't perform the operation now. Try again later.
Articles 1–20