DDoS in the IoT: Mirai and other botnets C Kolias, G Kambourakis, A Stavrou, J Voas Computer 50 (7), 80-84, 2017 | 2323 | 2017 |
Cloud computing synopsis and recommendations ML Badger, T Grance, R Patt-Corner, JM Voas National Institute of Standards & Technology, 2012 | 716 | 2012 |
Attribute-based access control VC Hu, DR Kuhn, DF Ferraiolo, J Voas Computer 48 (2), 85-88, 2015 | 667 | 2015 |
PIE: A dynamic failure-based technique JM Voas IEEE Transactions on software Engineering 18 (8), 717, 1992 | 595 | 1992 |
Blockchain-enabled e-voting N Kshetri, J Voas Ieee Software 35 (4), 95-99, 2018 | 551 | 2018 |
Software testability: The new verification JM Voas, KW Miller IEEE software 12 (3), 17-28, 1995 | 504 | 1995 |
Software fault injection: inoculating programs against errors JM Voas, G McGraw John Wiley & Sons, Inc., 1997 | 477 | 1997 |
Estimating the probability of failure when testing reveals no failures KW Miller, LJ Morell, RE Noonan, SK Park, DM Nicol, BW Murrill, M Voas IEEE transactions on Software Engineering 18 (1), 33, 1992 | 422 | 1992 |
BYOD: Security and privacy considerations KW Miller, J Voas, GF Hurlburt It Professional 14 (5), 53-55, 2012 | 421 | 2012 |
Alexa, can I trust you? H Chung, M Iorga, J Voas, S Lee Computer 50 (9), 100-104, 2017 | 375 | 2017 |
Cloud computing: New wine or just a new bottle? J Voas, J Zhang IT professional 11 (2), 15-17, 2009 | 335 | 2009 |
Certifying off-the-shelf software components JM Voas Computer 31 (6), 53-59, 1998 | 302 | 1998 |
Blockchain in developing countries N Kshetri, J Voas It Professional 20 (2), 11-14, 2018 | 264 | 2018 |
Procedures for reducing the size of coverage-based test sets J Pan, LT Center Proceedings of International Conference on Testing Computer Software, 111-123, 1995 | 262 | 1995 |
What's in a Name? Distinguishing between SaaS and SOA PA Laplante, J Zhang, J Voas It Professional 10 (3), 46-50, 2008 | 223 | 2008 |
Software assessment: reliability, safety, testability MA Friedman, JM Voas John Wiley & Sons, Inc., 1995 | 207 | 1995 |
Predicting where faults can hide from testing J Voas, L Morell, K Miller IEEE Software 8 (2), 41-48, 1991 | 194 | 1991 |
Networks of ‘things’ J Voas NIST Special publication 800 (183), 800-183, 2016 | 179 | 2016 |
The economics of “fake news” N Kshetri, J Voas IT Professional 19 (6), 8-12, 2017 | 172 | 2017 |
Learning Internet-of-Things security" hands-on" C Kolias, A Stavrou, J Voas, I Bojanova, R Kuhn IEEE Security & Privacy 14 (1), 37-46, 2016 | 169 | 2016 |