Improving the accuracy of scheduling analysis applied to distributed systems computing minimal response times and reducing jitter W Henderson, D Kendall, A Robson Real-Time Systems 20, 5-25, 2001 | 47 | 2001 |
A flexible laboratory environment supporting honeypot deployment for teaching real-world cybersecurity skills N Eliot, D Kendall, M Brockway IEEE Access 6, 34884-34895, 2018 | 35 | 2018 |
Formal modelling of a robust wireless sensor network routing protocol K Saghar, W Henderson, D Kendall, A Bouridane 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 281-288, 2010 | 35 | 2010 |
Applying formal modelling to detect DoS attacks in wireless medium K Saghar, W Henderson, D Kendall, A Bouridane 2010 7th International Symposium on Communication Systems, Networks …, 2010 | 25 | 2010 |
Formal modelling and analysis of routing protocol security in wireless sensor networks K Saghar, W Henderson, D Kendall | 25 | 2009 |
Validation, verification and implementation of timed protocols using AORTA S Bradley, WD Henderson, D Kendall, AP Robson International Conference on Protocol Specification, Testing and Verification …, 1995 | 23 | 1995 |
A formally based hard real-time kernel S Bradley, W Henderson, D Kendall, A Robson Microprocessors and Microsystems 18 (9), 513-521, 1994 | 23 | 1994 |
Using timed automata for response time analysis of distributed real-time systems S Bradley, W Henderson, D Kendall IFAC Proceedings Volumes 32 (1), 209-214, 1999 | 22 | 1999 |
Application-oriented real-time algebra S Bradley, W Henderson, D Kendall, A Robson Software Engineering Journal 9 (5), 201-212, 1994 | 21 | 1994 |
RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network K Saghar, M Tariq, D Kendall, A Bouridane 2016 13th International Bhurban Conference on Applied Sciences and …, 2016 | 17 | 2016 |
Raeed: A solution for hello flood attack K Saghar, D Kendall, A Bouridane 2015 12th International Bhurban Conference on Applied Sciences and …, 2015 | 17 | 2015 |
Designing and implementing correct real-time systems S Bradley, W Henderson, D Kendall, A Robson International Symposium on Formal Techniques in Real-Time and Fault-Tolerant …, 1994 | 17 | 1994 |
Vulnerability of INSENS to denial of service attacks K Saghar, D Kendall, A Bouridane 2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011 | 14 | 2011 |
Application of formal modeling to detect black hole attacks in wireless sensor network routing protocols K Saghar, D Kendall, A Bouridane Proceedings of 2014 11th International Bhurban Conference on Applied …, 2014 | 12 | 2014 |
Please slow down! The impact on Tor performance from mobility S Doswell, N Aslam, D Kendall, G Sexton Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013 | 11 | 2013 |
Automatic detection of black hole attack in wireless network routing protocols K Saghar, D Kendall, A Bouridane IEEE, International Bhurban Conference on Applied Sciences Technology …, 2014 | 9 | 2014 |
Practical formal development of real-time systems SP Bradley, WD Henderson, D Kendall, AP Robson Proceedings of 11th IEEE Workshop on Real-Time Operating Systems and …, 1994 | 9 | 1994 |
Accounting for clock frequency variation in the analysis of distributed factory control systems W Henderson, D Kendall, A Robson 2000 IEEE International Workshop on Factory Communication Systems …, 2000 | 8 | 2000 |
bCANDLE: Formal modelling and analysis of CAN control systems D Kendall, SP Bradley, WD Henderson, AP Robson Proceedings. Fourth IEEE Real-Time Technology and Applications Symposium …, 1998 | 8 | 1998 |
A new metric for the analysis of swarms using potential fields N Eliot, D Kendall, M Brockway IEEE Access 6, 63258-63267, 2018 | 6 | 2018 |