J
John H R May
Researcher at University of Bristol
Publications - 63
Citations - 1760
John H R May is an academic researcher from University of Bristol. The author has contributed to research in topics: Software quality & Software reliability testing. The author has an hindex of 10, co-authored 63 publications receiving 1653 citations. Previous affiliations of John H R May include Nuclear Electric & Open University.
Papers
More filters
Journal ArticleDOI
Software unit test coverage and adequacy
TL;DR: The notion of adequacy criteria is examined together with its role in software dynamic testing and the methods for comparison and assessment of criteria are reviewed.
Journal ArticleDOI
Reliability estimation from appropriate testing of plant protection software
TL;DR: The process of testing to estimate a software reliability is illustrated, and a new statistical model is presented which has been developed within a program of Nuclear Electric research into software reliability testing.
Journal ArticleDOI
Estimating bounds on the reliability of diverse systems
TL;DR: This work addresses the difficult problem of estimating the reliability of multiple-version software with new understanding of various alternative imprecise estimates of system reliability and some results of practical use, especially with diverse systems assembled from pre-existing (e.g., "off-the-shelf") subsystems.
Journal Article
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Ioannis G. Askoxylakis,Konstantinos Markantonakis,Theo Tryfonas,John H R May,Apostolos Traganitis +4 more
TL;DR: The LNICST series publishes ICST's conferences, symposia and workshops, and reports state-of-the-art results in areas related to the scope of the Institute.
Proceedings ArticleDOI
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems
TL;DR: The logging capabilities of a typical SCADA architecture and the analytical techniques and investigative tools that may help develop forensic readiness to the level of the current threat environment requirements are looked at.