Follow
R Gamble
Title
Cited by
Cited by
Year
The impact of component architectures on interoperability
L Davis, RF Gamble, J Payton
Journal of Systems and Software 61 (1), 31-45, 2002
802002
Towards a taxonomy of architecture integration strategies
R Keshav, R Gamble
Proceedings of the third international workshop on Software architecture, 89-92, 1998
761998
Practical DoS attacks on embedded networks in commercial vehicles
S Mukherjee, H Shirazi, I Ray, J Daily, R Gamble
Information Systems Security: 12th International Conference, ICISS 2016 …, 2016
672016
Secagreement: Advancing security risk calculations in cloud services
ML Hale, R Gamble
2012 IEEE Eighth World Congress on Services, 133-140, 2012
622012
Methodologies for the development of knowledge-based systems, 1982–2002
R Plant, R Gamble
The Knowledge Engineering Review 18 (1), 47-81, 2003
532003
Introducing replaceability into web service composition
H Al-Helal, R Gamble
IEEE Transactions on Services Computing 7 (2), 198-209, 2014
502014
CyberPhishing: A game-based platform for phishing awareness testing
ML Hale, RF Gamble, P Gamble
2015 48th Hawaii International Conference on System Sciences, 5260-5269, 2015
462015
Formal derivation of rule-based programs
GC Roma, RF Gamble, WE Ball
IEEE Transactions on Software Engineering 19 (3), 277-296, 1993
431993
MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases
S Jahan, I Riley, C Walter, RF Gamble, M Pasco, PK McKinley, ...
Future Generation Computer Systems 109, 197-209, 2020
422020
Assessing individual performance in Agile undergraduate software engineering teams
RF Gamble, ML Hale
2013 IEEE Frontiers in Education Conference (FIE), 1678-1684, 2013
392013
Securing over-the-air IoT firmware updates using blockchain
X He, S Alqahtani, R Gamble, M Papa
Proceedings of the International Conference on Omni-Layer Intelligent …, 2019
382019
Developing a platform to evaluate and assess the security of wearable devices
ML Hale, K Lotfy, RF Gamble, C Walter, J Lin
Digital Communications and Networks 5 (3), 147-159, 2019
372019
Monoliths to mashups: Increasing opportunistic assets
MT Gamble, R Gamble
IEEE software 25 (6), 2008
372008
Information flow control for stream processing in clouds
X Xie, I Ray, R Adaikkalavan, R Gamble
Proceedings of the 18th ACM symposium on Access control models and …, 2013
352013
DDoS attacks in service clouds
S Alqahtani, RF Gamble
2015 48th Hawaii International Conference on System Sciences, 5331-5340, 2015
342015
A notation for problematic architecture interactions
L Davis, R Gamble, J Payton, G Jónsdóttir, D Underwood
ACM SIGSOFT Software Engineering Notes 26 (5), 132-141, 2001
312001
Towards Software Multioperability: Bridging Heterogeneous Software Interoperability Platforms
N Medvidovic, R Gamble, D Rosenblum
Proceedings, Fourth International Software Architecture Workshop, 2000
312000
A tiered strategy for auditing in the cloud
R Xie, R Gamble
2012 IEEE Fifth International Conference on Cloud Computing, 945-946, 2012
302012
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
ML Hale, RF Gamble
Requirements Engineering 24, 365-402, 2019
292019
Toward privacy-assured health insurance claims
X He, S Alqahtani, R Gamble
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
292018
The system can't perform the operation now. Try again later.
Articles 1–20