Capacity analysis of traffic flow over a single-lane automated highway system JB Michael, DN Godbole, J Lygeros, R Sengupta Journal of Intelligent Transportation System 4 (1-2), 49-80, 1998 | 119 | 1998 |
Quality management metrics for software development JS Osmundson, JB Michael, MJ Machniak, MA Grossman Information & Management 40 (8), 799-812, 2003 | 95 | 2003 |
Perspectives on the solarwinds incident S Peisert, B Schneier, H Okhravi, F Massacci, T Benzel, C Landwehr, ... IEEE Security & Privacy 19 (2), 7-13, 2021 | 85 | 2021 |
Cloud to cloud interoperability S Dowell, A Barreto, JB Michael, MT Shing 2011 6th International Conference on System of Systems Engineering, 258-263, 2011 | 66 | 2011 |
Software decoys: Intrusion detection and countermeasures JB Michael, M Auguston, NC Rowe, R Riehle Proc. Workshop on Inf. Assurance, 130-138, 2002 | 54 | 2002 |
Black, and Timo Bolkart Y Feng, H Feng, J Michael Learning an animatable detailed 3D face model from in-the-wild images 40, 2, 2021 | 52 | 2021 |
Natural-language processing support for developing policy-governed software systems JB Michael, VL Ong, NC Rowe Proceedings 39th International Conference and Exhibition on Technology of …, 2001 | 51 | 2001 |
Environment behavior models for scenario generation and testing automation M Auguston, JB Michael, MT Shing ACM SIGSOFT Software Engineering Notes 30 (4), 1-6, 2005 | 46 | 2005 |
Measured responses to cyber attacks using Schmitt analysis: a case study of attack scenarios for a software-intensive system JB Michael, TC Wingfield, D Wijesekera Proceedings 27th Annual International Computer Software and Applications …, 2003 | 45 | 2003 |
Environment behavior models for automation of testing and assessment of system safety M Auguston, JB Michael, MT Shing Information and Software Technology 48 (10), 971-980, 2006 | 43 | 2006 |
Verification and validation for trustworthy software systems JB Michael, D Drusinsky, TW Otani, MT Shing IEEE software 28 (6), 86-92, 2011 | 37 | 2011 |
A visual tradeoff space for formal verification and validation techniques D Drusinsky, JB Michael, MT Shing IEEE Systems Journal 2 (4), 513-519, 2008 | 37 | 2008 |
Metrics for measuring the effectiveness of software-testing tools JB Michael, BJ Bossuyt, BB Snyder 13th International Symposium on Software Reliability Engineering, 2002 …, 2002 | 35 | 2002 |
The verification and validation of software architecture for systems of systems JB Michael, R Riehle, MT Shing 2009 IEEE International Conference on System of Systems Engineering (SoSE), 1-6, 2009 | 32 | 2009 |
Benefit evaluation of crash avoidance systems DN Godbole, R Sengupta, J Misener, N Kourjanskaia, JB Michael Transportation research record 1621 (1), 1-9, 1998 | 31 | 1998 |
A validation metrics framework for safety-critical software-intensive systems KJ Cruickshank, JB Michael, MT Shing 2009 IEEE International Conference on System of Systems Engineering (SoSE), 1-8, 2009 | 30 | 2009 |
Intelligent software decoys JB Michael, R Riehle Engineering Automation for Reliable Software-Interim Progress Report (10/01 …, 2001 | 30 | 2001 |
Use of an experimental policy workbench: Description and preliminary results EH Sibley, JB Michael, RL Wexelblat Results of the IFIP WG 11.3 Workshop on Database Security V: Status and …, 1991 | 30 | 1991 |
Validating UML statechart-based assertions libraries for improved reliability and assurance D Drusinsky, JB Michael, TW Otani, MT Shing 2008 Second International Conference on Secure System Integration and …, 2008 | 29 | 2008 |
The mobile software app takeover J Voas, JB Michael, M van Genuchten IEEE software 29 (4), 25-27, 2012 | 27 | 2012 |