Jeffrey M. Voas
#141,054
Most Influential Person Now
Jeffrey M. Voas's AcademicInfluence.com Rankings
Jeffrey M. Voascomputer-science Degrees
Computer Science
#6763
World Rank
#7128
Historical Rank
Database
#3849
World Rank
#4005
Historical Rank

Download Badge
Computer Science
Why Is Jeffrey M. Voas Influential?
(Suggest an Edit or Addition)Jeffrey M. Voas's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- DDoS in the IoT: Mirai and Other Botnets (2017) (1203)
- Software Testability: The New Verification (1995) (383)
- Software fault injection: inoculating programs against errors (1997) (317)
- Blockchain-Enabled E-Voting (2018) (244)
- BYOD: Security and Privacy Considerations (2012) (244)
- Certifying Off-the-Shelf Software Components (1998) (235)
- Cloud Computing: New Wine or Just a New Bottle? (2009) (223)
- “Alexa, Can I Trust You?” (2017) (177)
- What's in a Name? Distinguishing between SaaS and SOA (2008) (140)
- PARALLEL AND DISTRIBUTED SYSTEMS (2010) (129)
- Learning Internet-of-Things Security "Hands-On" (2016) (127)
- Blockchain in Developing Countries (2018) (122)
- Predicting How Badly "Good" Software Can Behave (1997) (116)
- Software Assessment: Reliability, Safety, Testability (1995) (110)
- The Challenges Of Using COTS Software In Component-Based Development (1998) (98)
- COTS Software: The Economical Choice? (1998) (97)
- Semantic metrics for software testability (1993) (97)
- Mobile Application and Device Power Usage Measurements (2012) (89)
- Building Caring Healthcare Systems in the Internet of Things (2018) (82)
- Toward a More Reliable Theory of Software Reliability (2000) (74)
- Maintaining Component-Based Systems (1998) (73)
- Improving the software development process using testability research (1992) (73)
- Imagineering an Internet of Anything (2014) (73)
- Certifying Software for High-Assurance Environments (1999) (72)
- Networks of 'Things' (2016) (72)
- Dependability certification of software components (2000) (71)
- Mutation Operators for Ada (1996) (71)
- Metamorphic Testing for Cybersecurity (2016) (69)
- Hacking Power Grids: A Current Problem (2017) (69)
- The Economics of “Fake News” (2017) (63)
- Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software? (2000) (61)
- Free and Open Source Software (2010) (61)
- Putting assertions in their place (1994) (59)
- Developing a Usage-Based Software Certification Process (2000) (57)
- Error propagation analysis for COTS systems (1997) (56)
- 50 years of software: key principles for quality (2002) (53)
- Fault Injection for the Masses (1997) (50)
- The revealing power of a test case (1992) (50)
- A 'Crystal Ball' for Software Liability (1997) (44)
- Vetting the security of mobile applications (2015) (42)
- Quality Time: How Assertions Can Increase Test Effectiveness (1997) (40)
- Software's Secret Sauce: The "-ilities" (2004) (39)
- Inoculating software for survivability (1999) (38)
- Do Crypto-Currencies Fuel Ransomware? (2017) (34)
- Demystifying the Internet of Things (2016) (34)
- Certification: reducing the hidden costs of poor quality (1999) (32)
- Software Quality's Eight Greatest Myths (1999) (32)
- Software Fault Injection (1998) (32)
- Curriculum Considerations for the Internet of Things (2017) (31)
- Trusted Software's Holy Grail (2003) (31)
- Can clean pipes produce dirty water (1997) (29)
- Internet of Things (IoT) Trust Concerns (2018) (28)
- Improving the predictable assembly of service-oriented architectures (2006) (26)
- Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them? (1996) (26)
- Limited software warranties (2000) (25)
- Cloud Computing (2013) (25)
- Software Quality from a Behavioral Perspective (2004) (24)
- Using Assertions to Make Untestable Software More Testable (1999) (23)
- Rethinking Distributed Ledger Technology (2019) (22)
- Confidently Assessing a Zero Probability of Software Failure (1993) (21)
- Vetting Mobile Apps (2011) (21)
- An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008 (2009) (21)
- Stakeholder Identification and Use Case Representation for Internet-of-Things Applications in Healthcare (2018) (20)
- Building Blocks of the Internet of Things (2016) (20)
- Composing Software Component "ilities" (2001) (19)
- Reducing uncertainty about common-mode failures (1997) (19)
- Will the Real Operational Profile Please Stand Up (2000) (19)
- Software Testability Measurement for Assertion Placement and Fault Localization (1995) (19)
- Verified Time (2017) (18)
- The Mobile Software App Takeover (2012) (18)
- Quality Time - Faster, Better, and Cheaper (2001) (18)
- Object-Oriented Software Testability (1996) (17)
- User Participation-based Software Certification (1999) (17)
- The pros and cons of Unix and Windows security policies (2000) (17)
- An Approach to Certifying Off-the-Shelf Software Components (1998) (17)
- Predicting software's minimum-time-to-hazard and mean-time-to-hazard for rare input events (1995) (17)
- Software fault injection: growing 'safer' systems (1997) (16)
- The Internet of Things: A Reality Check (2012) (16)
- Storytelling: From Cave Art to Digital Media (2011) (16)
- Designing programs that are less likely to hide faults (1993) (16)
- Supply Chain Trust (2019) (15)
- Standards for the Internet of Things: A Case Study in Disaster Response (2016) (15)
- Ethics and the Cloud (2010) (15)
- Smarter Education (2018) (15)
- Validation, verification and certification of embedded systems (2004) (14)
- Cyberthreats under the Bed (2018) (14)
- Cyberpandemics: History, Inevitability, Response (2009) (14)
- Agent Trustworthiness (1998) (14)
- An empirical comparison of a dynamic software testability metric to static cyclomatic complexity (1993) (14)
- Online Advertising Fraud (2019) (14)
- A Defensive Approach to Certifying COTS Software (1998) (13)
- Trusting the Internet of Things (2017) (13)
- Software testability: an experiment in measuring simulation reusability (1995) (13)
- Distinguishing between Software Oriented Architecture and Software as a Service: What's in a Name? (2008) (12)
- What Happened to Software Metrics? (2017) (12)
- Software testability measurement for intelligent assertion placement (1997) (11)
- Certifying Off-the- Shelf Software (1998) (11)
- Building Security into Off-the-Shelf Smartphones (2012) (11)
- Scarcity and Global Insecurity: The Semiconductor Shortage (2021) (11)
- Insights on Formal Methods in Cybersecurity (2016) (11)
- Quality Time - Protecting Against What? The Achilles Heel of Information Assurance (1999) (11)
- In Trust We Trust (2010) (11)
- Exposing software security and availability risks for commercial mobile devices (2013) (11)
- Testing Software For Characteristics Other Than Correctness: Safety, Failure Tolerance, And Securi (1996) (11)
- IoT’s Certification Quagmire (2018) (11)
- Programming with Assertions: A Prospectus (2004) (10)
- A Closer Look at IoTs Things (2018) (10)
- Securely Making "Things" Right (2015) (10)
- Cybertrust in the IoT Age (2018) (10)
- Why is it so hard to predict software system trustworthiness from software component trustworthiness? (2001) (10)
- Testing IoT Systems (2018) (10)
- The Impact of Diversity on Online Ensemble Learning in the Presence of Concept Drift (2010) (9)
- A uniform meta-model for mediating formal electronic conferences (2004) (9)
- Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem (2015) (9)
- Investigating rare-event failure tolerance: reductions in future uncertainty (1996) (9)
- What Happened to Formal Methods for Security? (2016) (9)
- Primitives and Elements of Internet of Things (IoT) Trustworthiness (2016) (9)
- Disposable information systems: the future of software maintenance? (1999) (9)
- Human Tagging (2017) (9)
- Standards Confusion and Harmonization (2007) (9)
- Using Dynamic Sensitivity Analysis to Assess Testability (1990) (9)
- Can generic software be assured? (1999) (8)
- Mobile-App Addiction: Threat to Security? (2011) (8)
- Caring: An Undiscovered "Super -ility" of Smart Healthcare (2016) (8)
- Persistent Software Attributes (2004) (8)
- Building software recovery assertions from a fault injection-based propagation analysis (1997) (8)
- An ethical can of worms for software certifiers (1999) (8)
- Fault Tolerance (2001) (8)
- COTS and high assurance: an oxymoron? (1999) (8)
- Disposable information systems: the future software maintenance? (1999) (7)
- Who Owns What? The Social Media Quagmire (2012) (7)
- Software Certification Services: Encouraging Trust and Reasonable Expectations (2006) (7)
- The IoT Blame Game (2017) (7)
- Interface robustness for COTS-based systems (1997) (7)
- A joint publication of the (2008) (7)
- Toward a More Reliable Theory of Software (2000) (7)
- A Nonlinear Perspective on Higher Education (2010) (7)
- The ability of directed tests to predict software quality (1997) (6)
- A model for detecting the existence of software corruption in real time (1993) (6)
- Certifying high assurance software (1998) (6)
- The Metaphysics of Software Trust (2009) (6)
- The avalanche paradigm: an experimental software programming technique for improving fault-tolerance (1996) (6)
- Standards interoperability: Applying software safety assurance standards to the evolution of legacy software (2009) (6)
- How Do You Create an Internet of Things Workforce? (2018) (6)
- Outlook 2021 (2021) (6)
- Information Integrity and IT Professionals' Integrity, Intertwined (2008) (6)
- Distinguishing between SaaS and SOA (2008) (6)
- Whatever Happened to Formal Methods for Security? (2016) (6)
- Reducing uncertainty about survivability (1997) (6)
- Quality in Conference Publishing (2009) (6)
- Software test cases: is one ever enough? (2006) (6)
- Big Data, Networked Worlds (2014) (6)
- Applying a dynamic testability technique to debugging certain classes of software faults (1993) (5)
- Deriving Accurate Operational Profiles for Mass-Marketed Software (2000) (5)
- Privacy and/or Security: Take Your Pick (2009) (5)
- Can Chaotic Methods Improve Software Quality Predictions? (2000) (5)
- Thoughts on Higher Education and Scientific Research (2011) (5)
- Automating test case generation for coverages required by FAA standard DO-178B (1993) (5)
- Defective software: An overview of legal remedies and technical measures available to consumers (2000) (5)
- Quality Time - Can Chaotic Methods Improve Software Quality Predictions? (2000) (5)
- Defensive Approaches to Testing Systems that Contain COTS and Third-Party Functionality (2004) (5)
- Banking on Availability (2017) (5)
- IT as a Profession: Is Competent Creation the Primary Goal? (2008) (5)
- Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations (2008) (5)
- An Automated Code-Based Fault-Tree Mitigation Technique (1995) (5)
- The Evolution of Ubiquitously Intelligent Computing (2011) (4)
- Considerations for Digital Twin Technology and Emerging Standards (2021) (4)
- Cryptojacking (2022) (4)
- Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are? (2008) (4)
- A Baker's Dozen: 13 Software Engineering Challenges (2007) (4)
- A Comparison Of A Dynamic SoftwareTestability Metric To Static CyclomaticComplexity (1970) (4)
- Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems (2010) (4)
- Could the Internet of Things Be Used to Enhance Student Nurses' Experiences in a Disaster Simulation? (2018) (4)
- Thoughts on Cyberbullying (2019) (4)
- Quality Time - A New Generation of Software Quality Conferences (2000) (4)
- Towards Fault-Tolerant Mobile Agents (1998) (4)
- Software testability and its application to avionic software (1993) (4)
- Computer Science Education in 2018 (2018) (4)
- Internet of Things (IoT) Trust Concerns (Draft) (2018) (4)
- Analyzing Software Sensitivity to Human Error (1998) (4)
- Thoughts on General Data Protection Regulation and Online Human Surveillance (2020) (3)
- COMPSAC Panel Session on Trustworthy Computing (2006) (3)
- Third-Party Software's Trust Quagmire (2015) (3)
- Corporate rumors and conspiracy theories (2002) (3)
- Rearchitecting the Malls: The Shifting U.S. Retail Landscape (2021) (3)
- Software Testing: What Goes Around Comes Around (2012) (3)
- The role of policy in balancing outsourcing and homeland security (2005) (3)
- A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time (1992) (3)
- Mobile Applications: The Fifth Cycle (2010) (3)
- IoT Metrology (2018) (3)
- Mitigating the Potential for Damage Caused by COTS and Third - Party Software Failures (1998) (3)
- A software analysis technique for quantifying reliability in high-risk medical devices (1993) (3)
- The cold realities of software insurance (1999) (3)
- Marrying Software Fault Injection Technology Results with Software Reliability Growth Models (2003) (2)
- Ransomware as a Business (RaaB) (2022) (2)
- Combinatorial methods for testing Internet of Things smart home systems (2021) (2)
- Advice for those bitten by the startup bug [IT business] (1999) (2)
- A Statistical and Automated Code-Based Fault-Tree Mitigation Framework for C++ (1997) (2)
- Zero-Trust Artificial Intelligence? (2022) (2)
- Disposable COTS-Intensive Software Systems (2000) (2)
- Proceedings of the Center for National Software Studies Workshop on Trustworthy Software (2004) (2)
- A US Government-Regulated Software Industry (1999) (2)
- Blockchain's Carbon and Environmental Footprints (2022) (2)
- Carbon "Footprinting" IT (2022) (2)
- A comparison of a dynamic software testability metric to static cyclomatic complexity (2004) (2)
- 5G, Security, and You (2020) (2)
- Outlook 2023 (2023) (2)
- Inspecting and ASSERTing Intelligently (1996) (2)
- Communications and Privacy under Surveillance (2016) (2)
- Quality Time - Will the Real Operational Profile Please Stand Up? (2000) (2)
- The Internet of Anything and Sustainability (2015) (2)
- Software Engineering's Role in Business (2004) (2)
- Effectively Defining "Shall Not" Requirements (2010) (2)
- Ransomware as a Business (RaaB) (2022) (2)
- Algorithms: Society's Invisible Puppeteers (2022) (1)
- Does Security Trump Reliability? (2013) (1)
- Why testing software under expected operational profiles is not sufficient (2001) (1)
- Cybersecurity or Privacy [Guest editors' introduction] (2016) (1)
- Vetting Mobile App Vendors (2015) (1)
- How to select a technology lawyer (1999) (1)
- RegTech's Rise (2022) (1)
- Taking Score on the Success of Blockchain, So Far (2019) (1)
- Demystifying the Internet of Things | NIST (2016) (1)
- Beyond the Cloud: Cyberphysical Systems (2013) (1)
- Does software reliability engineering (SRE) offer any benefits to mobile code's security woes? (1998) (1)
- Piracy's Impact on “the Silver Screen” (2021) (1)
- A Tutorial on Software Fault Injection (2000) (1)
- STEM's Grand Challenge: Reviving Applied Mathematics (2013) (1)
- Security or Privacy: Can You Have Both? (2020) (1)
- Software is Driving Software Engineering? (2016) (1)
- Thoughts on Complexity, Trust, and Truth (2020) (1)
- No Preconceptions (2019) (1)
- This Decade's Eight Greatest Myths about Software Quality Reliable Software Technologies, Sterling Va Usa (1)
- Trustworthiness in Software Environments (2009) (1)
- In IoT We Trust? (2018) (1)
- Algorithms, Algorithms, Algorithms (2020) (1)
- Problems of Accuracy in the Prediction of Software Quality from Directed Tests (2004) (1)
- Rethinking Home, Office, School (2020) (1)
- Are COTS Products and Component Packaging Killing Software Malleability? (1998) (1)
- Untested software threatens infrastructures (1999) (1)
- Lost and Never Found (2021) (1)
- Developing a Usage-Based Certification (2000) (1)
- The pitfalls of managing a superstar (2001) (1)
- The Services Paradigm: Who Can You Trust? (2007) (1)
- Software Product Certification (2007) (1)
- Where's the Silicon? (2021) (1)
- Disposable COTS-Intensive Software Systems (A Position Statement) (2000) (1)
- Major Computing Technologies of the Past 75 Years (2021) (1)
- One in a baker's dozen: debugging debugging (2007) (1)
- Can Critical Information Infrastructure Protection be Achieved With Untested Software (1999) (1)
- Educating Next-Gen Computer Scientists (2018) (1)
- Guest Editor's Introduction: Software Fault Tolerance-Making Software Behave (2001) (1)
- Aggregating Atomic Clocks for Time-Stamping (2020) (1)
- Ransomware: Pay to Play? (2022) (1)
- Views on Software Testability (1994) (0)
- UCITA: take the deal and run (2000) (0)
- HAPTICS A joint publication of the IEEE Computer Society (2008) (0)
- The Mobile Software Takeover (2012) (0)
- Reliability and Fault Tolerance in Trust (2006) (0)
- Vetting Mobile Apps | NIST (2011) (0)
- In this issue (2013) (0)
- Revisiting Software Metrology (2022) (0)
- Innovations Using Blockchain-Part 2 (2019) (0)
- Educating Next-Gen Computer Scientists | NIST (2018) (0)
- "Dumbing Down" (2022) (0)
- A Matter of Policy (2012) (0)
- Views on software testability (panel) (1994) (0)
- knowledge and data engineering A publication of the IEEE Computer Society (2005) (0)
- Rethinking Home, Office, and School (2020) (0)
- Trusting Pirated Software (2019) (0)
- Thirteen rules for trust (2008) (0)
- IEEE Transactions on Computer Call For Papers (2020) (0)
- An Ethical Analysis of Automation,and the Financial Crises (2009) (0)
- Citations and Letters (2020) (0)
- Guest Editors Introduction: Cybersecurity or Privacy | NIST (2016) (0)
- Certainty through Uncertainty? (2011) (0)
- W Will the Real Operational Profile Please Stand Up? Tolerating Component and Subsystem Failures Software Component Interoperability (0)
- A Checklist for Going Straight Through (2001) (0)
- Maintaining COTS-Based Systems: Is it Possible? (Panel) (1998) (0)
- Cyber Olympics: Game On! (2022) (0)
- NASA Contributions to IT (2012) (0)
- Nations Play Their Chips (2023) (0)
- The Evolution of Ubiquitously Computing (2011) (0)
- Sustainable Blockchain? (2023) (0)
- Warming Your Chicken (2022) (0)
- IEEE Computer Graphics and Applications (2020) (0)
- Good Enough (2023) (0)
- In This Issue (2020) (0)
- Guest Editor's Introduction: Malicious IT (2000) (0)
- Perfect Strangers (2020) (0)
- So Where Are We? A Guest Opinion Editorial (2015) (0)
- Predictions on Predictions (2019) (0)
- Online Eats "Food Courts" (2021) (0)
- Innovations Using Blockchain-Part 1 (2019) (0)
- In This Issue (2020) (0)
- Crying "Cybersecurity!" (2022) (0)
- Why Testing under Expected Operational Scenarios is Not Sufficient (2001) (0)
- Computing New Medicines (2023) (0)
- Improving the Predictable Assembly of Service (2006) (0)
- Simulating Specification Errors and Ambiguities in Systems Employing Design Diversity (1997) (0)
- Proceedings of the fifth workshop on software assessment (2006) (0)
- Computing and Socioeconomic Transformations (2021) (0)
- Challenges and Recent Advances in Developing Trustworthy Software-Based Systems (2003) (0)
- Internet of Things (IoT) Metrology (2018) (0)
- Assessing Survivability Using Software Fault Injection (2001) (0)
- Considerations About Algorithmic Literacy (2022) (0)
- HPCC 2011/FTDCS 2011 Keynotes (2011) (0)
- An Experiment in Applying a Fault Injection-Based Hazard Mitigation Technique to a Software Automobile Control System (1995) (0)
- Hackings Brand-Equity Nexus (2018) (0)
- IEEE TRANSACTIONS O N KNOWLEDGE AND (2008) (0)
- Certification: the Hidden Costs of Poor Quality (1999) (0)
- Plenary Panel Session at QRS 2015: Security of IoT (Internet of Things) (2015) (0)
- What's at stake in DOJ versus Microsoft (1999) (0)
- Homework [EIC'S Message] (2021) (0)
- Timing Matters: Tackling Intractable Problems (2011) (0)
- Cyberthreats in 2025 (2020) (0)
- Keynote Speech: Foundations of the Internet of Things, by Jeffrey Voas (2015) (0)
- Discovering Unanticipated Software Output Modes (2001) (0)
- An Automated Framework for Accelerating Numerical Algorithms on Reconfigurable Platforms Using Algorithmic/Architectural Optimization (2009) (0)
- Thoughts on Automotive IoT (2023) (0)
- Software Dependability in Distributed and Mobile Computing Environments (2001) (0)
- In this issue (2013) (0)
- Reproducibility, Fabrication, and Falsification (2021) (0)
- Inoculating software for SURVIVABILITY An old adage holds true for software : you can build a stronger system by first breaking it (1999) (0)
- Determining software trustworthiness in an environmental context (2011) (0)
- Qualifying The Reliability Of COTS Software Components (1997) (0)
- A Value-Added Gem (2020) (0)
- (Draft) Considerations for Digital Twins Standards (0)
- Outlook: Forward Thinking for 2022 (2022) (0)
- Keynote Talk #1 (2018) (0)
- Quality Time - A US Government-Regulated Software Industry (1999) (0)
- Cryptocurrencies: Transparency Versus Privacy [Cybertrust] (2019) (0)
- In this issue (2022) (0)
- Decoding the Mystery of the Internet of Things (2016) (0)
- Mitigating Disinformation and Building Trust in Social Media (2021) (0)
- Views on Software Testability (Panel Abstract). (1994) (0)
- An Experimental Study on Reliability Estimation of GNU Compiler Components – A Review (2017) (0)
- Author Index (2012) (0)
- Evolving a Mobile App Society [published as: Mobile-App Addiction: Threat to Security?] (2010) (0)
- "Frameworking" Carbon-Aware Computing Research (2023) (0)
- About This Issue (2021) (0)
- Energy Considerations (2022) (0)
- Computer Science in Education 2018 (2018) (0)
- Outlooks on Diverse Technologies (2020) (0)
- (Draft) Cybersecurity Considerations for Open Banking Technology and Emerging Standards (2022) (0)
- The Future of Computer Assurance [Technical Activities Forum] (1999) (0)
- Demystifiying the Internet of Things (2016) (0)
- Is Anybody Listening? (2021) (0)
- Quality Time - Does Untested Software Threaten Infrastructures? (1999) (0)
- Timing Matters: Tackling Intractable (2011) (0)
- Quality Time: Can Clean Pipes Produce Dirty Water? (1997) (0)
- "Smarter" Seeking "Wiser" (2022) (0)
- Malicious IT - Guest Editors' Introduction (2000) (0)
- Cyberpandemics (2020) (0)
- Information and IT Professionals' Integrity, (2008) (0)
- Tough times, tough money: understanding investor speak (2003) (0)
- Invited Talk: Information assurance considerations for software supply chains and 3rd parties (2013) (0)
- HAPTICS A joint publication of the (2008) (0)
- DEPENDABLE AND SECURE COMPUTING A publication of the IEEE Computer Society (2011) (0)
- ITL Bulletin: Demystifying the Internet of Things (September 2016) (2016) (0)
- Scarcity (2021) (0)
- The "Patching" Mentality (2020) (0)
- Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet? (2020) (0)
- Reinventing Wheels (2020) (0)
- NIST: Building a Solid Foundation (2014) (0)
- Machining a Sixth Sense: Intuition (2023) (0)
- Qualifying the Reliability of COTS Software Components Panelists (1997) (0)
- A World Without Risks: Let Me Out! (1999) (0)
- Monetizing You (2021) (0)
- In IoT We Trust? | NIST (2018) (0)
- Whatever Happened to Formal Methods for Security? | NIST (2016) (0)
- 4. 13 Grand Challenges in Software Engineering( Frontier of Reliability) (2006) (0)
- PISCES : A Tool for Predicting Software (1992) (0)
- Software's "inoperable" interoperability problem (2004) (0)
- SPECIAL ISSUE ON AMBIENT HAPTIC SYSTEMS (2009) (0)
- Adaptive Software Quality (2003) (0)
- Confronting Your Digital Accuser (2021) (0)
- Tell Me a Story (2021) (0)
- Trust Considerations in Open Banking (2022) (0)
- Trusted Computing: An Elusive Goal (2015) (0)
- "Opening" Banking (2021) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Jeffrey M. Voas?
Jeffrey M. Voas is affiliated with the following schools: