Follow
R Gamble
Title
Cited by
Cited by
Year
The impact of component architectures on interoperability
L Davis, RF Gamble, J Payton
Journal of Systems and Software 61 (1), 31-45, 2002
802002
Towards a taxonomy of architecture integration strategies
R Keshav, R Gamble
Proceedings of the third international workshop on Software architecture, 89-92, 1998
771998
Practical DoS attacks on embedded networks in commercial vehicles
S Mukherjee, H Shirazi, I Ray, J Daily, R Gamble
Information Systems Security: 12th International Conference, ICISS 2016 …, 2016
742016
Secagreement: Advancing security risk calculations in cloud services
ML Hale, R Gamble
2012 IEEE Eighth World Congress on Services, 133-140, 2012
622012
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
S Jahan, I Riley, C Walter, RF Gamble, M Pasco, PK McKinley, ...
Future Generation Computer Systems 109, 197-209, 2020
542020
Methodologies for the development of knowledge-based systems, 1982–2002
R Plant, R Gamble
The Knowledge Engineering Review 18 (1), 47-81, 2003
532003
Introducing replaceability into web service composition
H Al-Helal, R Gamble
IEEE Transactions on Services Computing 7 (2), 198-209, 2014
522014
CyberPhishing: A game-based platform for phishing awareness testing
ML Hale, RF Gamble, P Gamble
2015 48th Hawaii International Conference on System Sciences, 5260-5269, 2015
472015
Developing a platform to evaluate and assess the security of wearable devices
ML Hale, K Lotfy, RF Gamble, C Walter, J Lin
Digital Communications and Networks 5 (3), 147-159, 2019
432019
Formal derivation of rule-based programs
GC Roma, RF Gamble, WE Ball
IEEE Transactions on Software Engineering 19 (3), 277-296, 1993
431993
Securing over-the-air IoT firmware updates using blockchain
X He, S Alqahtani, R Gamble, M Papa
Proceedings of the International Conference on Omni-Layer Intelligent …, 2019
422019
Assessing individual performance in Agile undergraduate software engineering teams
RF Gamble, ML Hale
2013 IEEE Frontiers in Education Conference (FIE), 1678-1684, 2013
412013
Monoliths to mashups: Increasing opportunistic assets
MT Gamble, R Gamble
IEEE software 25 (6), 2008
372008
DDoS attacks in service clouds
S Alqahtani, RF Gamble
2015 48th Hawaii International Conference on System Sciences, 5331-5340, 2015
352015
Information flow control for stream processing in clouds
X Xie, I Ray, R Adaikkalavan, R Gamble
Proceedings of the 18th ACM symposium on Access control models and …, 2013
352013
Formal verification of functional requirements for smart contract compositions in supply chain management systems
S Alqahtani, X He, R Gamble, P Mauricio
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
322020
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
ML Hale, RF Gamble
Requirements Engineering 24, 365-402, 2019
322019
Secu Wear: An open source, multi-component hardware/software platform for exploring wearable security
ML Hale, D Ellis, R Gamble, C Waler, J Lin
2015 IEEE International Conference on Mobile Services, 97-104, 2015
312015
A notation for problematic architecture interactions
L Davis, R Gamble, J Payton, G Jónsdóttir, D Underwood
ACM SIGSOFT Software Engineering Notes 26 (5), 132-141, 2001
312001
Toward privacy-assured health insurance claims
X He, S Alqahtani, R Gamble
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
302018
The system can't perform the operation now. Try again later.
Articles 1–20