


default search action
Bojan Cukic
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Cristina Improta
, Pietro Liguori
, Roberto Natella
, Bojan Cukic
, Domenico Cotroneo
:
Enhancing robustness of AI offensive code generators via data augmentation. Empir. Softw. Eng. 30(1): 7 (2025) - 2024
- [j28]Roberto Natella
, Pietro Liguori
, Cristina Improta
, Bojan Cukic
, Domenico Cotroneo
:
AI Code Generators for Security: Friend or Foe? IEEE Secur. Priv. 22(5): 73-81 (2024) - [c118]Pietro Liguori, Cristina Improta, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Enhancing AI-based Generation of Software Exploits with Contextual Information. ISSRE 2024: 180-191 - [i9]Roberto Natella, Pietro Liguori, Cristina Improta, Bojan Cukic, Domenico Cotroneo:
AI Code Generators for Security: Friend or Foe? CoRR abs/2402.01219 (2024) - [i8]Pietro Liguori, Cristina Improta, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Enhancing AI-based Generation of Software Exploits with Contextual Information. CoRR abs/2408.02402 (2024) - 2023
- [j27]Pietro Liguori
, Cristina Improta
, Roberto Natella
, Bojan Cukic
, Domenico Cotroneo
:
Who evaluates the evaluators? On automatic metrics for assessing AI-based offensive code generators. Expert Syst. Appl. 225: 120073 (2023) - [i7]Cristina Improta, Pietro Liguori, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Enhancing Robustness of AI Offensive Code Generators via Data Augmentation. CoRR abs/2306.05079 (2023) - 2022
- [j26]Pietro Liguori
, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh:
Can we generate shellcodes via natural language? An empirical study. Autom. Softw. Eng. 29(1): 30 (2022) - [c117]Katerina Goseva-Popstojanova, Bojan Cukic:
Message from the General Co-Chairs: ISSRE 2022. ISSRE 2022: xiii - [c116]Katerina Goseva-Popstojanova, Bojan Cukic:
Message from the ISSRE 2022 General Co-Chairs. ISSRE Workshops 2022: xiv - [c115]Pietro Liguori
, Cristina Improta
, Simona De Vivo, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Can NMT Understand Me? Towards Perturbation-based Evaluation of NMT Models for Code Generation. NLBSE 2022: 59-66 - [i6]Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh:
Can We Generate Shellcodes via Natural Language? An Empirical Study. CoRR abs/2202.03755 (2022) - [i5]Pietro Liguori, Cristina Improta, Simona De Vivo, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Can NMT Understand Me? Towards Perturbation-based Evaluation of NMT Models for Code Generation. CoRR abs/2203.15319 (2022) - [i4]Cristina Improta, Pietro Liguori, Roberto Natella, Bojan Cukic, Domenico Cotroneo:
Who Evaluates the Evaluators? On Automatic Metrics for Assessing AI-based Offensive Code Generators. CoRR abs/2212.06008 (2022) - 2021
- [c114]Pietro Liguori
, Erfan Al-Hossami, Vittorio Orbinato
, Roberto Natella, Samira Shaikh, Domenico Cotroneo, Bojan Cukic:
EVIL: Exploiting Software via Natural Language. ISSRE 2021: 321-332 - [i3]Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh:
Shellcode_IA32: A Dataset for Automatic Shellcode Generation. CoRR abs/2104.13100 (2021) - [i2]Pietro Liguori, Erfan Al-Hossami, Vittorio Orbinato, Roberto Natella, Samira Shaikh, Domenico Cotroneo, Bojan Cukic:
EVIL: Exploiting Software via Natural Language. CoRR abs/2109.00279 (2021) - 2020
- [c113]Bojan Cukic, Douglas Hague, Mary Lou Maher:
An Innovative Interdisciplinary Undergraduate Data Science Program: Pathways and Experience. FIE 2020: 1-5
2010 – 2019
- 2019
- [j25]Zahid A. Syed
, Jordan Helmick, Sean Banerjee, Bojan Cukic:
Touch gesture-based authentication on mobile devices: The effects of user posture, device size, configuration, and inter-session variability. J. Syst. Softw. 149: 158-173 (2019) - 2018
- [c112]Tonya K. Frevert
, Audrey Rorrer
, Daniel J. Davis
, Celine Latulipe
, Mary Lou Maher, Bojan Cukic, Lawrence Mays, Steven Rogelberg:
Sustainable Educational Innovation Through Engaged Pedagogy and Organizational Change. FIE 2018: 1-5 - [e5]Sudipto Ghosh, Roberto Natella, Bojan Cukic, Robin S. Poston, Nuno Laranjeiro:
29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018, Memphis, TN, USA, October 15-18, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-8321-7 [contents] - [e4]Sudipto Ghosh, Roberto Natella, Bojan Cukic, Robin S. Poston, Nuno Laranjeiro:
2018 IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Memphis, TN, USA, October 15-18, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9443-5 [contents] - 2017
- [j24]Sean Banerjee, Zahid A. Syed
, Jordan Helmick, Mark Vere Culp, Kenneth Joseph Ryan, Bojan Cukic
:
Automated triaging of very large bug repositories. Inf. Softw. Technol. 89: 1-13 (2017) - 2016
- [j23]Zahid A. Syed
, Sean Banerjee, Bojan Cukic
:
Normalizing variations in feature vector structure in keystroke dynamics authentication systems. Softw. Qual. J. 24(1): 137-157 (2016) - [c111]Mohsen Dorodchi, Maryam Abedi, Bojan Cukic
:
Trust-Based Development Framework for Distributed Systems and IoT. COMPSAC Workshops 2016: 437-442 - [c110]Mary Lou Maher, Bojan Cukic
, Lawrence Mays, Steven Rogelberg, Celine Latulipe
, Jamie Payton, Audrey Rorrer
, Tonya K. Frevert
:
The Connected Learner: Engaging faculty to connect computing students to peers, profession and purpose. FIE 2016: 1-8 - [c109]Emanuela Marasco, Mohamed Shehab
, Bojan Cukic
:
A Methodology for Prevention of Biometric Presentation Attacks. LADC 2016: 9-14 - [e3]Radu F. Babiceanu, Hélène Waeselynck, Raymond A. Paul, Bojan Cukic, Jie Xu:
17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016, Orlando, FL, USA, January 7-9, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-9913-5 [contents] - 2015
- [j22]Emanuela Marasco, Ayman Abaza, Bojan Cukic:
Why rank-level fusion? And what is the impact of image quality? Int. J. Big Data Intell. 2(2): 106-116 (2015) - [c108]Nathan D. Kalka, Nick Bartlow, Bojan Cukic
, Arun Ross:
A preliminary study on identifying sensors from iris images. CVPR Workshops 2015: 50-56 - [c107]Zahid A. Syed
, Jordan Helmick, Sean Banerjee, Bojan Cukic
:
Effect of User Posture and Device Size on the Performance of Touch-Based Authentication Systems. HASE 2015: 10-17 - [c106]Sean Banerjee, Jordan Helmick, Zahid A. Syed
, Bojan Cukic
:
Eclipse vs. Mozilla: A Comparison of Two Large-Scale Open Source Problem Report Repositories. HASE 2015: 263-270 - [c105]Sean Banerjee, Bojan Cukic
:
On the Cost of Mining Very Large Open Source Repositories. BIGDSE@ICSE 2015: 37-43 - [r4]Nick Bartlow, Nathan D. Kalka, Bojan Cukic, Arun Ross:
Iris Digital Watermarking. Encyclopedia of Biometrics 2015: 964-973 - [r3]Sean Banerjee, Zahid A. Syed
, Nick Bartlow, Bojan Cukic:
Keystroke Recognition. Encyclopedia of Biometrics 2015: 1067-1073 - [r2]Zahid A. Syed
, Sean Banerjee, Bojan Cukic:
Pointer-Based Recognition. Encyclopedia of Biometrics 2015: 1261-1268 - 2014
- [c104]Huihua Lu, Bojan Cukic
, Mark Vere Culp:
A Semi-supervised Approach to Software Defect Prediction. COMPSAC 2014: 416-425 - [c103]Stephen Mason, Ilir Gashi
, Luca Lugini, Emanuela Marasco, Bojan Cukic
:
Interoperability between Fingerprint Biometric Systems: An Empirical Study. DSN 2014: 586-597 - [c102]Zahid A. Syed
, Sean Banerjee, Bojan Cukic
:
Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems. HASE 2014: 9-16 - [c101]Jesse Musgrove, Bojan Cukic
, Vittorio Cortellessa:
Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System. HASE 2014: 211-215 - [c100]Carsten Gottschlich
, Emanuela Marasco, Allen Y. Yang, Bojan Cukic
:
Fingerprint liveness detection based on histograms of invariant gradients. IJCB 2014: 1-7 - [c99]Jesse Musgrove, Bojan Cukic
, Vittorio Cortellessa:
On the Adequacy of Performance Models in an Adaptive Border Inspection Management System. JISIC 2014: 200-207 - [c98]Huihua Lu, Ekrem Kocaguneli, Bojan Cukic
:
Defect Prediction between Software Versions with Active Learning and Dimensionality Reduction. ISSRE 2014: 312-322 - [c97]Cagatay Turkay
, Stephen Mason, Ilir Gashi
, Bojan Cukic
:
Supporting Decision-Making for Biometric System Deployment through Visual Analysis. ISSRE Workshops 2014: 347-352 - [c96]Luca Lugini, Emanuela Marasco, Bojan Cukic
, Jeremy M. Dawson:
Removing gender signature from fingerprints. MIPRO 2014: 1283-1287 - 2013
- [j21]Victor L. Winter, Bojan Cukic, Taghi M. Khoshgoftaar, Kinji Mori, Raymond A. Paul, Carlos Pérez Leguízamo, Sahra Sedigh Sarvestani
, John C. Sloan, Mladen A. Vouk, I-Ling Yen:
High Consequence Systems and Semantic Computing. Int. J. Semantic Comput. 7(3): 291-324 (2013) - [j20]Yue Jiang, Bojan Cukic
, Tim Menzies, Jie Lin:
Incremental Development of Fault Prediction Models. Int. J. Softw. Eng. Knowl. Eng. 23(10): 1399-1426 (2013) - [c95]Emanuela Marasco, Luca Lugini, Bojan Cukic
, Thirimachos Bourlai
:
Minimizing the impact of low interoperability between optical fingerprints sensors. BTAS 2013: 1-8 - [c94]Luca Lugini, Emanuela Marasco, Bojan Cukic
, Ilir Gashi
:
Interoperability in fingerprint recognition: A large-scale empirical study. DSN Workshops 2013: 1-6 - [c93]Emanuela Marasco, Ayman Abaza, Luca Lugini, Bojan Cukic
:
Impact of Biometric Data Quality on Rank-Level Fusion Schemes. ICA3PP (2) 2013: 209-216 - [c92]Ekrem Kocaguneli, Bojan Cukic
, Huihua Lu:
Predicting more from less: Synergies of learning. RAISE@ICSE 2013: 42-48 - [c91]Sean Banerjee, Zahid A. Syed
, Jordan Helmick, Bojan Cukic
:
A fusion approach for classifying duplicate problem reports. ISSRE 2013: 208-217 - [c90]Ekrem Kocaguneli, Bojan Cukic, Tim Menzies, Huihua Lu:
Building a second opinion: learning cross-company data. PROMISE 2013: 12:1-12:10 - 2012
- [j19]Goran Martinovic, Josip Balen, Bojan Cukic:
Performance Evaluation of Recent Windows Operating Systems. J. Univers. Comput. Sci. 18(2): 218-263 (2012) - [c89]Mayra Sacanamboy, Bojan Cukic
, Vittorio Cortellessa:
Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and a Perspective View. EISIC 2012: 350-352 - [c88]Sean Banerjee, Bojan Cukic
, Donald A. Adjeroh:
Automated Duplicate Bug Report Classification Using Subsequence Matching. HASE 2012: 74-81 - [c87]Thirimachos Bourlai
, Bojan Cukic
:
Multi-spectral face recognition: Identification of people in difficult environments. ISI 2012: 196-201 - [c86]Sean Banerjee, Jesse Musgrove, Bojan Cukic
:
Handling Language Variations in Open Source Bug Reporting Systems. ISSRE Workshops 2012: 325-330 - [c85]Huihua Lu, Bojan Cukic
, Mark Vere Culp:
Software defect prediction using semi-supervised learning with dimension reduction. ASE 2012: 314-317 - [c84]Huihua Lu, Bojan Cukic
:
An adaptive approach with active learning in software fault prediction. PROMISE 2012: 79-88 - [e2]Daniel Zeng, Lina Zhou, Bojan Cukic, G. Alan Wang, Christopher C. Yang:
2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, USA, June 11-14, 2012. IEEE 2012, ISBN 978-1-4673-2105-1 [contents] - 2011
- [c83]Zahid A. Syed
, Sean Banerjee, Qi Cheng, Bojan Cukic
:
Effects of User Habituation in Keystroke Dynamics on Password Security Policy. HASE 2011: 352-359 - [c82]Nathan D. Kalka, Thirimachos Bourlai
, Bojan Cukic
, Lawrence A. Hornak:
Cross-spectral face recognition in heterogeneous environments: A case study on matching visible to short-wave infrared imagery. IJCB 2011: 1-8 - [c81]Sean Banerjee, Hema Srikanth, Bojan Cukic
:
Challenges for Creating Highly Dependable Service Based Systems. ISORC Workshops 2011: 264-273 - [c80]Tomi Prifti, Sean Banerjee, Bojan Cukic
:
Detecting bug duplicate reports through local references. PROMISE 2011: 8 - [c79]Huihua Lu, Bojan Cukic
, Mark Vere Culp:
An iterative semi-supervised approach to software fault prediction. PROMISE 2011: 15 - [e1]Tadashi Dohi, Bojan Cukic:
IEEE 22nd International Symposium on Software Reliability Engineering, ISSRE 2011, Hiroshima, Japan, November 29 - December 2, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-2060-4 [contents] - 2010
- [j18]Tim Menzies
, Zach Milton, Burak Turhan
, Bojan Cukic
, Yue Jiang, Ayse Basar Bener
:
Defect prediction from static code features: current results, limitations, new approaches. Autom. Softw. Eng. 17(4): 375-407 (2010) - [j17]Nathan D. Kalka, Jinyu Zuo, Natalia A. Schmid
, Bojan Cukic
:
Estimating and Fusing Quality Factors for Iris Biometric Images. IEEE Trans. Syst. Man Cybern. Part A 40(3): 509-524 (2010) - [c78]Rogério de Lemos
, Holger Giese, Hausi A. Müller
, Mary Shaw, Jesper Andersson, Marin Litoiu
, Bradley R. Schmerl, Gabriel Tamura
, Norha M. Villegas
, Thomas Vogel
, Danny Weyns
, Luciano Baresi
, Basil Becker, Nelly Bencomo, Yuriy Brun
, Bojan Cukic
, Ronald J. Desmarais, Schahram Dustdar
, Gregor Engels, Kurt Geihs
, Karl M. Göschka
, Alessandra Gorla, Vincenzo Grassi, Paola Inverardi, Gabor Karsai
, Jeff Kramer, Antónia Lopes
, Jeff Magee, Sam Malek, Serge Mankovski, Raffaela Mirandola
, John Mylopoulos, Oscar Nierstrasz
, Mauro Pezzè, Christian Prehofer, Wilhelm Schäfer, Richard D. Schlichting, Dennis B. Smith, João Pedro Sousa, Ladan Tahvildari, Kenny Wong, Jochen Wuttke:
Software Engineering for Self-Adaptive Systems: A Second Research Roadmap. Software Engineering for Self-Adaptive Systems 2010: 1-32 - [c77]Mayra Sacanamboy, Bojan Cukic
:
Combined performance and risk analysis for border management applications. DSN 2010: 403-412 - [c76]Thirimachos Bourlai
, Nathan D. Kalka, Arun Ross, Bojan Cukic
, Lawrence A. Hornak:
Cross-Spectral Face Verification in the Short Wave Infrared (SWIR) Band. ICPR 2010: 1343-1347 - [c75]Sampath Yerramalla, Edgar Fuller
, Bojan Cukic
:
Optimal method for growth in dynamic self organizing learning systems. IJCNN 2010: 1-7 - [c74]Sean Banerjee, Hema Srikanth, Bojan Cukic
:
Log-Based Reliability Analysis of Software as a Service (SaaS). ISSRE 2010: 239-248 - [p3]Sampath Yerramalla, Edgar Fuller
, Bojan Cukic
:
Dynamic Allocation in Neural Networks for Adaptive Controllers. Applications of Neural Networks in High Assurance Systems 2010: 111-139 - [i1]Rogério de Lemos, Holger Giese, Hausi A. Müller, Mary Shaw, Jesper Andersson, Luciano Baresi, Basil Becker, Nelly Bencomo, Yuriy Brun, Bojan Cukic, Ronald J. Desmarais, Schahram Dustdar, Gregor Engels, Kurt Geihs, Karl M. Göschka, Alessandra Gorla, Vincenzo Grassi, Paola Inverardi, Gabor Karsai, Jeff Kramer, Marin Litoiu, Antónia Lopes, Jeff Magee, Sam Malek, Serge Mankovskii, Raffaela Mirandola, John Mylopoulos, Oscar Nierstrasz, Mauro Pezzè
, Christian Prehofer, Wilhelm Schäfer, Richard D. Schlichting, Bradley R. Schmerl, Dennis B. Smith, João Pedro Sousa, Gabriel Tamura, Ladan Tahvildari, Norha M. Villegas, Thomas Vogel, Danny Weyns, Kenny Wong, Jochen Wuttke:
Software Engineering for Self-Adaptive Systems: A second Research Roadmap. Software Engineering for Self-Adaptive Systems 2010
2000 – 2009
- 2009
- [c73]Nathan D. Kalka, Nick Bartlow, Bojan Cukic
:
Decision dependability and its application to identity management. CSIIRW 2009: 68 - [c72]Nick Bartlow, Nathan D. Kalka, Bojan Cukic, Arun Ross:
Identifying sensors from fingerprint images. CVPR Workshops 2009: 78-84 - [c71]Betty H. C. Cheng
, Rogério de Lemos
, Holger Giese, Paola Inverardi, Jeff Magee, Jesper Andersson, Basil Becker, Nelly Bencomo, Yuriy Brun
, Bojan Cukic
, Giovanna Di Marzo Serugendo
, Schahram Dustdar
, Anthony Finkelstein, Cristina Gacek, Kurt Geihs
, Vincenzo Grassi, Gabor Karsai
, Holger M. Kienle, Jeff Kramer, Marin Litoiu
, Sam Malek, Raffaela Mirandola, Hausi A. Müller
, Sooyong Park, Mary Shaw, Matthias Tichy, Massimo Tivoli
, Danny Weyns
, Jon Whittle:
Software Engineering for Self-Adaptive Systems: A Research Roadmap. Software Engineering for Self-Adaptive Systems 2009: 1-26 - [c70]Yue Jiang, Jie Lin, Bojan Cukic
, Tim Menzies:
Variance Analysis in Software Fault Prediction Models. ISSRE 2009: 99-108 - [c69]Gregory Gay, Tim Menzies, Bojan Cukic
, Burak Turhan
:
How to build repeatable experiments. PROMISE 2009: 15 - [c68]Yue Jiang, Bojan Cukic
:
Misclassification cost-sensitive fault prediction models. PROMISE 2009: 20 - [p2]Nick Bartlow, Bojan Cukic:
Keystroke Dynamics-Based Credential Hardening Systems. Handbook of Remote Biometrics 2009: 329-347 - [r1]Nick Bartlow, Nathan D. Kalka, Bojan Cukic, Arun Ross:
Iris Digital Watermarking. Encyclopedia of Biometrics 2009: 778-787 - 2008
- [j16]Yue Jiang, Bojan Cukic
, Yan Ma:
Techniques for evaluating fault prediction models. Empir. Softw. Eng. 13(5): 561-595 (2008) - [c67]Yue Jiang, Bojan Cukic
, Tim Menzies:
Cost Curve Evaluation of Fault Prediction Models. ISSRE 2008: 197-206 - [c66]Yue Jiang, Bojan Cukic
, Tim Menzies:
Can data transformation help in the detection of fault-prone modules? DEFECTS 2008: 16-20 - [c65]Yue Jiang, Bojan Cukic
, Tim Menzies, Nick Bartlow:
Comparing design and code metrics for software quality prediction. PROMISE@ICSE 2008: 11-18 - [c64]Tim Menzies, Burak Turhan
, Ayse Bener
, Gregory Gay
, Bojan Cukic
, Yue Jiang:
Implications of ceiling effects in defect predictors. PROMISE@ICSE 2008: 47-54 - 2007
- [j15]Yan Liu, Bojan Cukic
, Srikanth Gururajan
:
Validating neural network-based online adaptive systems: a case study. Softw. Qual. J. 15(3): 309-326 (2007) - [c63]Nick Bartlow, Nathan D. Kalka, Bojan Cukic
, Arun Ross:
Protecting Iris Images through Asymmetric Digital Watermarking. AutoID 2007: 192-197 - [c62]Yue Jiang, Bojan Cukic, Tim Menzies:
Fault Prediction using Early Lifecycle Data. ISSRE 2007: 237-246 - [c61]Yan Ma, Bojan Cukic
:
Adequate and Precise Evaluation of Quality Models in Software Engineering Studies. PROMISE@ICSE 2007: 1 - [p1]Yan Liu, Bojan Cukic
, Johann Schumann, Michael Jiang:
Performance Analysis of Dynamic Cell Structures. Trends in Neural Computation 2007: 367-389 - 2006
- [j14]Ing-Ray Chen, Bojan Cukic
:
High Assurance Software Systems. Comput. J. 49(5): 507-508 (2006) - [j13]Dejan Desovski, Vijai Gandikota, Yan Liu, Yue Jiang, Bojan Cukic
:
Verification and Validation of a Fingerprint Image Registration Software. EURASIP J. Adv. Signal Process. 2006 (2006) - [j12]Yan Liu, Bojan Cukic
, Edgar Fuller
, Sampath Yerramalla, Srikanth Gururajan
:
Monitoring techniques for an online neuro-adaptive controller. J. Syst. Softw. 79(11): 1527-1540 (2006) - [j11]Sampath Yerramalla, Edgar Fuller
, Bojan Cukic
:
A validation approach for neural network-based online adaptive systems. Softw. Pract. Exp. 36(11-12): 1209-1225 (2006) - [j10]Natalia A. Schmid, Manasi V. Ketkar, Harshinder Singh, Bojan Cukic
:
Performance analysis of iris-based identification system at the matching score level. IEEE Trans. Inf. Forensics Secur. 1(2): 154-168 (2006) - [c60]Dejan Desovski, Bojan Cukic:
A Component-Based Approach to Verification and Validation of Formal Software Models. WADS 2006: 89-114 - [c59]Nick Bartlow, Bojan Cukic
:
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. ISSRE 2006: 117-126 - [c58]Paola Bracchi, Bojan Cukic
, Vittorio Cortellessa:
Modeling the Performance of Border Inspections with Electronic Travel Documents. ISSRE 2006: 237-246 - [c57]David Owen, Dejan Desovski, Bojan Cukic
:
Effectively Combining Software Verification Strategies: Understanding Different Assumptions. ISSRE 2006: 321-330 - [c56]David Owen, Dejan Desovski, Bojan Cukic
:
Random testing of formal software models and induced coverage. Random Testing 2006: 20-27 - [c55]Dejan Desovski, Bojan Cukic
:
A Strategy for Verification of Decomposable SCR Models. PRDC 2006: 11-18 - 2005
- [j9]Bojan Cukic
:
The Virtues of Assessing Software Reliability Early. IEEE Softw. 22(3): 50-53 (2005) - [j8]Bojan Cukic
:
Guest Editor's Introduction: The Promise of Public Software Engineering Data Repositories. IEEE Softw. 22(6): 20-22 (2005) - [c54]Yan Ma, Michael E. Schuckers, Bojan Cukic
:
Guidelines for Appropriate Use of Simulated Data for Bio-Authentication Research. AutoID 2005: 251-256 - [c53]Yan Ma, Bojan Cukic, Harshinder Singh:
A Classification Approach to Multi-biometric Score Fusion. AVBPA 2005: 484-493 - [c52]Yan Liu, Bojan Cukic
, Edgar Fuller
, Srikanth Gururajan
, Sampath Yerramalla:
Novelty Detection for a Neural Network-Based Online Adaptive System. COMPSAC (2) 2005: 117-122 - [c51]Sampath Yerramalla, Bojan Cukic
, Martin Mladenovski, Edgar Fuller
:
Stability Monitoring and Analysis of Learning in an Adaptive System. DSN 2005: 70-79 - [c50]Dejan Desovski, Yan Liu, Bojan Cukic
:
Linear Randomized Voting Algorithm for Fault Tolerant Sensor Fusion and the Corresponding Reliability Model. HASE 2005: 153-162 - [c49]Natalia A. Schmid, Bojan Cukic
, Manasi V. Ketkar, Harshinder Singh:
Performance analysis of Iris Based identification system at the matching score level. ICASSP (2) 2005: 93-96 - [c48]Yan Liu, Bojan Cukic, Michael Jiang, Zhiwei Xu
:
Predicting with Confidence - An Improved Dynamic Cell Structure. ICNC (1) 2005: 750-759 - [c47]Edgar Fuller, Sampath Yerramalla, Bojan Cukic, Srikanth Gururajan:
An approach to predicting non-deterministic neural network behavior. IJCNN 2005: 2921-2926 - [c46]Yan Liu, Bojan Cukic, Sampath Yerramalla, Srikanth Gururajan:
Validity index in dynamic cell structures. IJCNN 2005: 2931-2936 - [c45]Petar Popic, Dejan Desovski, Walid Abdelmoez, Bojan Cukic
:
Error Propagation in the Reliability Analysis of Component Based Systems. ISSRE 2005: 53-62 - [c44]Bojan Cukic
, Martin Mladenovski, Dejan Desovski, Sampath Yerramalla:
Real-Time Data Fusion Technique for Validation of an Autonomous System. WORDS 2005: 121-128 - 2004
- [j7]Sherif M. Yacoub, Bojan Cukic
, Hany H. Ammar:
A scenario-based reliability analysis approach for component-based software. IEEE Trans. Reliab. 53(4): 465-480 (2004) - [c43]Yan Liu, Sampath Yerramalla, Edgar Fuller
, Bojan Cukic, Srikanth Gururajan:
Adaptive Control Software: Can We Guarantee Safety? COMPSAC Workshops 2004: 100-103 - [c42]Lan Guo, Supratik Mukhopadhyay, Bojan Cukic:
Does Your Result Checker Really Check? DSN 2004: 399-404 - [c41]Sampath Yerramalla, Yan Liu, Edgar Fuller
, Bojan Cukic, Srikanth Gururajan
:
An Approach to V&V of Embedded Adaptive Systems. FAABS 2004: 173-188 - [c40]Ali Mili, GuangJie Jiang, Bojan Cukic, Yan Liu, Rahma Ben Ayed:
Towards the Verification and Validation of Online Learning Systems: General Framework and Applications. HICSS 2004 - [c39]Ming Li, Y. Wei, Dejan Desovski, Hamed Nejad, Sushmita Ghose, Bojan Cukic, Carol S. Smidts:
Validation of a Methodology for Assessing Software Reliability. ISSRE 2004: 66-76 - [c38]Paola Bracchi, Bojan Cukic
, Vittorio Cortellessa:
Performability Modeling of Mobile Software Systems. ISSRE 2004: 77-88 - [c37]Dejan Desovski, Vijai Gandikota, Yan Liu, Yue Jiang, Bojan Cukic:
Validation and Reliability Estimation of a Fingerprint Image Registration Software. ISSRE 2004: 306-313 - [c36]Lan Guo, Yan Ma, Bojan Cukic
, Harshinder Singh:
Robust Prediction of Fault-Proneness by Random Forests. ISSRE 2004: 417-428 - [c35]Ravishankar Boddu, Lan Guo, Supratik Mukhopadhyay, Bojan Cukic:
RETNA: From Requirements to Testing in a Natural Way. RE 2004: 262-271 - 2003
- [j6]Philip J. Boland, Harshinder Singh, Bojan Cukic
:
Comparing Partition and Random Testing via Majorization and Schur Functions. IEEE Trans. Software Eng. 29(1): 88-94 (2003) - [c34]Mark Shereshevsky, Jonathan Crowell, Bojan Cukic
, Vijai Gandikota, Yan Liu:
Software Aging and Multifractality of Memory Resources. DSN 2003: 721-730 - [c33]Yan Liu, Srikanth Gururajan, Bojan Cukic, Tim Menzies, Marcello R. Napolitano:
Validating an Online Adaptive System Using SVDD. ICTAI 2003: 384- - [c32]Sampath Yerramalla, Bojan Cukic, Edgar Fuller:
Lyapunov stability analysis of the quantization error for DCS neural networks. IJCNN 2003: 2412-2417 - [c31]Lan Guo, Bojan Cukic, Harshinder Singh:
Predicting Fault Prone Modules by the Dempster-Shafer Belief Networks. ASE 2003: 249-252 - [c30]Sampath Yerramalla, Edgar Fuller
, Martin Mladenovski, Bojan Cukic:
Lyapunov Analysis of Neural Network Stability in an Adaptive Flight Control System. Self-Stabilizing Systems 2003: 77-91 - 2002
- [j5]Bojan Cukic
, Brian J. Taylor, Harshinder Singh:
Automated Generation of Test Trajectories for Embedded Flight Control Systems. Int. J. Softw. Eng. Knowl. Eng. 12(2): 175-200 (2002) - [j4]Taghi M. Khoshgoftaar, Bojan Cukic
, Naeem Seliya:
Predicting Fault-Prone Modules in Embedded Systems Using Analogy-Based Classification Models. Int. J. Softw. Eng. Knowl. Eng. 12(2): 201-221 (2002) - [c29]Tim Menzies, David Owen, Bojan Cukic:
You Seem Friendly, But Can I Trust You? FAABS 2002: 208-219 - [c28]David Owen, Bojan Cukic
, Tim Menzies:
An Alternative to Model Checking: Verification by Random Search of AND-OR Graphs Representing Finite-State Models. HASE 2002: 119-128 - [c27]Yan Liu, Tim Menzies, Bojan Cukic:
Data Sniffing - Monitoring of Machine Learning for Online Adaptive Systems. ICTAI 2002: 16-21 - [c26]Tim Menzies, David Owen, Bojan Cukic
:
Saturation Effects in Testing of Formal Models. ISSRE 2002: 15-26 - [c25]David Owen, Tim Menzies, Bojan Cukic
:
What Makes Finite-State Models More (or Less) Testable? ASE 2002: 237-240 - [c24]Vittorio Cortellessa, Harshinder Singh, Bojan Cukic:
Early reliability assessment of UML based software models. Workshop on Software and Performance 2002: 302-309 - 2001
- [c23]M. S. Fisher, Bojan Cukic
:
Automating Techniques for Inspecting High Assurance Systems. HASE 2001: 117-126 - [c22]Bojan Cukic
:
The Need for Verification and Validation Techniques for Adaptive Control System. ISADS 2001: 297-298 - [c21]Harshinder Singh, Vittorio Cortellessa, Bojan Cukic, Erdogan Gunel, Vijayanand Bharadwaj:
A Bayesian Approach to Reliability Prediction and Assessment of Component Based Systems. ISSRE 2001: 12-21 - [c20]Victor L. Winter, Dejan Desovski, Bojan Cukic:
Virtual Environment Modeling for Requirements Validation of High Consequence Systems. RE 2001: 23-30 - 2000
- [j3]Hany H. Ammar, Bojan Cukic, Ali Mili, Christopher P. Fuhrman
:
A comparative analysis of hardware and software fault tolerance: Impact on software reliability engineering. Ann. Softw. Eng. 10: 103-150 (2000) - [j2]Tim Menzies, Bojan Cukic:
Adequacy of Limited Testing for Knowledge Based Systems. Int. J. Artif. Intell. Tools 9(1): 153-172 (2000) - [j1]Tim Menzies, Bojan Cukic
:
When to Test Less. IEEE Softw. 17(5): 107-112 (2000) - [c19]Tim Menzies, Bojan Cukic, Harshinder Singh:
Agents Talking Faster. FAABS 2000: 194-208 - [c18]Bojan Cukic
, Diwakar Chakravarthy:
Bayesian framework for reliability assurance of a deployed safety critical system. HASE 2000: 321-329 - [c17]Brian J. Taylor, Bojan Cukic
:
Evaluation of Regressive Methods for Automated Generation of Test Trajectories. ISSRE 2000: 97-109 - [c16]Tim Menzies, Bojan Cukic
, Harshinder Singh, John D. Powell:
Testing Nondeterminate Systems. ISSRE 2000: 222-233
1990 – 1999
- 1999
- [c15]Goran Trajkovski, Bojan Cukic:
On Two Types of LM Fuzzy Lattices. Fuzzy Days 1999: 272-281 - [c14]Diego Del Gobbo, Bojan Cukic, Marcello R. Napolitano, Steve M. Easterbrook:
Fault Detectability Analysis for Requirements Validation of Fault Tolerant Systems. HASE 1999: 231-238 - [c13]Tim Menzies, Bojan Cukic:
On the Sufficiency of Limited Testing for Knowledge Based Systems. ICTAI 1999: 431-440 - [c12]Sherif M. Yacoub, Bojan Cukic, Hany H. Ammar:
Scenario-based reliability analysis of component-based software. ISSRE 1999: 22-31 - [c11]Ali Mili, Bojan Cukic, T. Xia, Rahma Ben Ayed:
Combining Fault Avoidance, Fault Removal and Fault Tolerance: An Integrated Model. ASE 1999: 137- - [c10]Sherif M. Yacoub, Bojan Cukic, Hany H. Ammar:
A Component-based Approach to Reliability Analysis of Distributed Systems. SRDS 1999: 158-167 - 1998
- [c9]Diego Del Gobbo, Marcello R. Napolitano, John Callahan, Bojan Cukic
:
Experience in Developing System Requirements Specification for a Sensor Failure Detection and Identification Scheme. HASE 1998: 209-213 - [c8]Bojan Cukic, Hany H. Ammar, Khalid Lateef:
Identifying high-risk scenarios of complex systems using input domain partitioning. ISSRE 1998: 164-173 - 1997
- [c7]Victoria Hilford, Farokh B. Bastani, Bojan Cukic:
EH* - Extendible Hashing in a Distributed Environment. COMPSAC 1997: 217-222 - [c6]Bojan Cukic:
Combining Testing and Correctness Verification in Software Reliability Assessment. HASE 1997: 182-187 - [c5]Victoria Hilford, Michael R. Lyu, Bojan Cukic, Anouar Jamoussi, Farokh B. Bastani:
Diversity in the software development process. WORDS 1997: 129-136 - 1996
- [c4]Farokh B. Bastani, Bojan Cukic:
Impact of program transformation on software reliability assessment. HASE 1996: 214-221 - [c3]Bojan Cukic, Farokh B. Bastani:
On reducing the sensitivity of software reliability to variations in the operational profile. ISSRE 1996: 45-54 - [c2]Farokh B. Bastani, Bojan Cukic, Victoria Hilford, Anouar Jamoussi:
Toward dependable safety-critical software. WORDS 1996: 86-92 - 1994
- [c1]Bojan Cukic, Farokh B. Bastani:
Automatic Array Alignment as a Step in Hierarchical Program Transformation. IPPS 1994: 578-582
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint