2008 |
23 | EE | David Stirling,
Ian Welch,
Peter Komisarczuk:
Designing Workflows for Grid Enabled Internet Instruments.
CCGRID 2008: 218-225 |
22 | EE | Christian Seifert,
Barbara Endicott-Popovsky,
Deborah A. Frincke,
Peter Komisarczuk,
Radu Muschevici,
Ian Welch:
Identifying and Analyzing Web Server Attacks.
IFIP Int. Conf. Digital Forensics 2008: 151-161 |
21 | EE | Christian Seifert,
Ian Welch,
Peter Komisarczuk,
Chiraag Uday Aval,
Barbara Endicott-Popovsky:
Identification of malicious web pages through analysis of underlying DNS and web server relationships.
LCN 2008: 935-941 |
20 | EE | Christian Seifert,
Ian Welch,
Peter Komisarczuk:
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots.
SAC 2008: 1426-1432 |
19 | EE | Yvonne Coady,
Corrado Santoro,
Emiliano Tramontana,
Ian Welch:
Special track on Programming for Separation of Concerns: editorial message.
SAC 2008: 251-252 |
2006 |
18 | EE | Kris Bubendorfer,
Ian Welch,
Blayne Chard:
Trustworthy Auctions for Grid-Style Economies.
CCGRID 2006: 386-390 |
17 | EE | Ian Welch,
Fan Lu:
Policy-driven reflective enforcement of security policies.
SAC 2006: 1580-1584 |
2004 |
16 | EE | Emiliano Tramontana,
Ian Welch:
Reflections on Programming with Grid Toolkits.
RAM-SE 2004: 3-8 |
2002 |
15 | EE | Cliff B. Jones,
Alexander B. Romanovsky,
Ian Welch:
A Structured Approach to Handling On-Line Interface Upgrades.
COMPSAC 2002: 1000-1005 |
14 | EE | Cliff B. Jones,
Panayiotis Periorellis,
Alexander B. Romanovsky,
Ian Welch:
Structured Handling of Online Interface Upgrades in Integrating Dependable Systems of Systems.
FIDJI 2002: 73-86 |
13 | | Ian Welch,
Robert J. Stroud:
Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code.
Journal of Computer Security 10(4): 399-432 (2002) |
2001 |
12 | EE | Ian Welch,
Robert J. Stroud:
Kava - Using Byte code Rewriting to add Behavioural Reflection to Java.
COOTS 2001: 119-130 |
11 | EE | Eric Jul,
Andrew P. Black,
Doug Lea,
Robert E. Filman,
Ian Welch:
Panel: The Next 700 Distributed Object Systems.
ECOOP Workshops 2001: 208-212 |
10 | EE | Ian Welch,
Robert J. Stroud,
Alexander B. Romanovsky:
Aspects of Exceptions at the Meta-level.
Reflection 2001: 280-281 |
2000 |
9 | EE | Ian Welch,
Robert J. Stroud:
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code.
ESORICS 2000: 309-323 |
1999 |
8 | | Ian Welch,
Robert J. Stroud:
Runtime Implementation of Aspects Using Kava.
ECOOP Workshops 1999: 303-304 |
7 | EE | Ian Welch,
Robert J. Stroud:
Supporting Real World Security Models in Java.
FTDCS 1999: 155-162 |
6 | EE | Ian Welch,
Robert J. Stroud:
From Dalang to Kava - The Evolution of a Reflective Java Extension.
Reflection 1999: 2-21 |
5 | EE | Ian Welch,
Robert J. Stroud:
Kava - A Reflective Java Based on Bytecode Rewriting.
Reflection and Software Engineering 1999: 155-167 |
4 | | Avelino F. Zorzo,
Alexander B. Romanovsky,
Jie Xu,
Brian Randell,
Robert J. Stroud,
Ian Welch:
Using Coordinated Atomic Actions to Design Safety-Critical Systems: a Production Cell Case Study.
Softw., Pract. Exper. 29(8): 677-697 (1999) |
1998 |
3 | EE | Ian Welch,
Robert J. Stroud:
Adaptation of Connectors in Software Architectures.
ECOOP Workshops 1998: 145-146 |
2 | EE | Ian Welch,
Robert J. Stroud:
Dynamic Adaptation of the Security Properties of Applications and Components.
ECOOP Workshops 1998: 282 |
1 | EE | Ian Welch,
Robert J. Stroud:
A Reflective Java Class Loader.
ECOOP Workshops 1998: 374-375 |