John Charles Knight
#162,102
Most Influential Person Now
John Charles Knight's AcademicInfluence.com Rankings
John Charles Knightcomputer-science Degrees
Computer Science
#9411
World Rank
#9885
Historical Rank
Software Engineering
#254
World Rank
#259
Historical Rank
Database
#6377
World Rank
#6610
Historical Rank

Download Badge
Computer Science
John Charles Knight's Degrees
- PhD Computer Science Stanford University
Similar Degrees You Can Earn
Why Is John Charles Knight Influential?
(Suggest an Edit or Addition)John Charles Knight's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- An experimental evaluation of the assumption of independence in multiversion programming (1986) (864)
- Safety critical systems: challenges and directions (2002) (537)
- Data Diversity: An Approach to Software Fault Tolerance (1988) (420)
- Software Tamper Resistance: Obstructing Static Analysis of Programs (2000) (212)
- An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability (1991) (211)
- An improved inspection technique (1993) (207)
- A New Approach to creating Clear Safety Arguments (2011) (173)
- Analysis of Faults in an N-Version Software Experiment (1990) (171)
- Towards a rigorous definition of information system survivability (2003) (166)
- Protection of software-based survivability mechanisms (2001) (164)
- On computer viral infection and the effect of immunization (2000) (156)
- The Use of Self Checks and Voting in Software Error Detection: An Empirical Study (1990) (136)
- Effectiveness of Moving Target Defenses (2011) (128)
- A Framework for Software Fault Tolerance in Real-Time Systems (1983) (126)
- Secure and practical defense against code-injection attacks using software dynamic translation (2006) (120)
- A security architecture for survivability mechanisms (2001) (110)
- The consistent comparison problem in N-version software (1989) (99)
- Security through Diversity: Leveraging Virtual Machine Technology (2009) (88)
- A Taxonomy of Fallacies in System Safety Arguments (2006) (86)
- Why are Formal Methods Not Used More Widely (1997) (80)
- Security through redundant data diversity (2008) (76)
- ON THE DEFINITION OF SURVIVABILITY (2000) (74)
- The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications (2001) (73)
- A reply to the criticisms of the Knight & Leveson experiment (1990) (72)
- Assurance Based Development of Critical Systems (2007) (70)
- Information survivability control systems (1999) (64)
- The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing (1992) (57)
- Fundamentals of Dependable Computing for Software Engineers (2012) (56)
- Arguing Conformance (2012) (55)
- Experience assessing an architectural approach to large-scale systematic reuse (1996) (54)
- THE WILLOW SURVIVABILITY ARCHITECTURE (2001) (53)
- Phased inspections and their implementation (1991) (53)
- On the Implementation and Use of Ada on Fault-Tolerant Distributed Systems (1984) (52)
- Software reuse in an industrial setting: a case study (1991) (50)
- Achieving Critical System Survivability Through Software Architectures (2003) (47)
- Automating the detection of reusable parts in existing software (1992) (45)
- The essential synthesis of problem frames and assurance cases (2006) (42)
- Protection of software-based survivability mechanisms (2003) (41)
- Current Practices in Constructing and Evaluating Assurance Cases With Applications to Aviation (2015) (36)
- Failure Analysis and the Safety-Case Lifecycle (2004) (36)
- An experimental evaluation of simple methods for seeding program errors (1985) (36)
- Dependability through Assured Reconfiguration in Embedded System Software (2006) (34)
- Distributed reconfigurable avionics architectures (2004) (33)
- Assured reconfiguration of embedded real-time software (2004) (33)
- Should software engineers be licensed? (2002) (28)
- Formal Verification by Reverse Synthesis (2008) (28)
- Exploiting refactoring in formal verification (2009) (26)
- On the provision of backward error recovery in production programming languages (1989) (26)
- On the enforcement of software safety policies (1995) (26)
- An introduction to computing system dependability (2004) (24)
- Bend, Don’t Break: Using Reconfiguration to Achieve Survivability (2000) (23)
- Echo: a practical approach to formal verification (2005) (23)
- Erroneous requirements: a linguistic basis for their occurrence and an approach to their reduction (2001) (23)
- Undergraduate computer science education: a new curriculum philosophy & overview (1994) (22)
- Preliminary Experience Using Z to Specify a Safety-Critical System (1992) (22)
- Fault tolerance in critical information systems (2001) (21)
- Analysis of faults detected in a large-scale multi-version software development experiment (1990) (21)
- Empirical research in software engineering: a workshop (1999) (21)
- Error recovery in critical infrastructure systems (1998) (21)
- The Glass Cockpit (2007) (20)
- Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery (2016) (19)
- Software Test Techniques for System Fault-Tree Analysis (1997) (19)
- On the effectiveness of the metamorphic shield (2010) (18)
- A Safety Kernel Architecture (1994) (18)
- On the performance of software testing using multiple versions (1990) (18)
- A security metric based on security arguments (2014) (18)
- Tool support for production use of formal techniques (2001) (18)
- Software Challenges in Aviation Systems (2002) (18)
- Architectural Approaches to Information Survivability (1997) (18)
- A Survey of Tools for Model Checking and Model-Based Development (2006) (17)
- Efficient hierarchic management for reconfiguration of networked information systems (2004) (17)
- Moving Target Defenses in the Helix Self-Regenerative Architecture (2013) (17)
- Certification and Safety Cases (2010) (16)
- Understanding What It Means for Assurance Cases to "Work" (2017) (16)
- Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation (2012) (16)
- Using occurrence properties of defect report data to improve requirements (2005) (15)
- Publish and Subscribe with Reply (2002) (15)
- Arguing Software Compliance with ISO 26262 (2014) (15)
- Real-World Types and Their Application (2015) (14)
- Improving Communication of Critical Domain Knowledge in High-Consequence Software Development: an Em (2003) (14)
- The Importance of Security Cases: Proof Is Good, But Not Enough (2015) (14)
- TOWARDS A DEFINITION OF SURVIVABILITY (2000) (13)
- A Rigorous Definition of Cyber-Physical Systems (2016) (13)
- Software quality through domain-;driven certification (1998) (13)
- Summaries of Three Critical Infrastructure Applications (1997) (12)
- Guest Editors' Introduction: Critical Task of Writing Dependable Software (1994) (12)
- What Should Aviation Safety Incidents Teach Us ? (1999) (12)
- Applying Hypertext Structures to Software Documentation (1997) (11)
- Assured reconfiguration of fail-stop systems (2005) (11)
- Security Monitoring, Visualization, and System Survivability: A Position Paper for ISW-2001 (2001) (11)
- SCT: A Safety Case Toolkit (2014) (11)
- Strategies for Managing Computer Software Upgrades (2002) (11)
- A systematic approach to creating and maintaining software documentation (1996) (11)
- Evaluating a software engineering project course model based on studio presentations (2005) (11)
- Issues of software reliability in medical systems (1990) (11)
- Formal Verification of Large Software Systems (2010) (11)
- Critical task of writing dependable software (1994) (11)
- A Model of Secretless Security in N-Variant Systems (2009) (10)
- Focusing software education on engineering (2004) (10)
- Challenges in the Utilization of Formal Methods (1998) (10)
- Formal Verification in Model Based Development (2015) (10)
- Certification of Reusable Software Parts (1993) (10)
- Issues Influencing the Use of N-Version Programming (1989) (10)
- A language design for vector machines (1975) (10)
- System balance analysis for vector computers (1975) (9)
- An Automated Defense System to Counter Internet Worms (2003) (9)
- Assurance based development (2010) (9)
- Dependability of embedded systems (2002) (9)
- The Development of Dependable and Survivable Grids (2005) (9)
- Design fault tolerance (1991) (9)
- Safety Standards - a New Approach (2014) (9)
- Correlated Failures in Multi-Version Software 1 (1985) (9)
- Software Process Synthesis in Assurance Based Development of Dependable Systems (2010) (9)
- A new approach to fault tolerance in distributed Ada programs (1988) (9)
- Testing a safety-critical application (1994) (9)
- Reconfiguration assurance in embedded system software (2005) (9)
- Software and higher education (2006) (8)
- Towards Survivable Intrusion Detection (2000) (8)
- Tools Supporting the Communication of Critical Domain Knowledge in High-Consequence Systems Development (2003) (8)
- Access: a Toolset for Safety Case Creation and Management (8)
- The UK5000 - Successful Collaborative Development of an Integrated Design System for a 5000 Gate CMOS Array with Built-In Test (1983) (8)
- Risk-based Classification of Incidents (2003) (8)
- The design and evaluation of a defense system for Internet worms (2004) (8)
- Preliminary Evaluation of a Formal Approach to User Interface Specification (1997) (8)
- Meeting virtual organization performance goals through adaptive grid reconfiguration (2007) (8)
- Production of Reliable Flight Crucial Software: Validation Methods Research for Fault Tolerant Avionics and Control Systems Sub-Working Group Meeting (1982) (8)
- Connecting Discrete Mathematics and Software Engineering (2006) (8)
- Pandora: an approach to analyzing safety-related digital-system failures (2007) (7)
- A Framework for Creating Binary Rewriting Tools (Short Paper) (2014) (7)
- To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing (2014) (7)
- Foundations of Software Engineering (FSE-10) (2002) (7)
- Diversity in Cybersecurity (2016) (7)
- Fault tolerant distributed information systems (2001) (7)
- Clear requirements: improving validity using cognitive linguistic elicitation and representation (2006) (7)
- The Role of Natural Language in Accident Investigation and Reporting Guidelines (2002) (6)
- PEASOUP: preventing exploits against software of uncertain provenance (position paper) (2011) (6)
- 1st International workshop on assurance cases for software-intensive systems (ASSURE 2013) (2013) (6)
- Dependability of embedded systems (2002) (6)
- Success Arguments Establishing Confidence in Software Development (2012) (6)
- Survivability management architecture for very large distributed systems (2004) (6)
- ADVANCES IN SOFTWARE TECHNOLOGY SINCE 1992 AND A MODEST PROPOSAL FOR THEIR INCORPORATION INTO CERTIFICATION (2008) (6)
- The current status of super computers (1979) (6)
- Specification and Analysis of Data for Safety-Critical Systems (2001) (6)
- Proving Model Equivalence in Model Based Design (2014) (6)
- The Indispensable Role of Rationale in Safety Standards (2016) (5)
- A Linguistic Analysis of Requirements Errors and Its Application (2012) (5)
- Practical Limits on Software Dependability: A Case Study (2010) (5)
- Analysis of Critical Systems Certification (2014) (5)
- Monitoring and Visualization of Emergent Behavior in Large Scale Intrusion Tolerant Distributed Systems (5)
- An Improved Software Inspection Technique and An Empirical Evaluation (1992) (5)
- Component-Oriented Monitoring of Binaries for Security (2011) (5)
- TOWARDS DEPENDABLE GRIDS (2004) (5)
- Future trends of software technology and applications model-based development (2006) (4)
- A Safety Condition Monitoring System (2014) (4)
- Tools Supporting the Communication of Critical Application Domain Knowledge in High-Consequence Systems Development (1999) (4)
- Proving Critical Properties of Simulink Models (2016) (4)
- The CONNECT Project: bridging science education activities at schools and science centers with the support of advanced technologies (2006) (4)
- Fault tolerant distributed systems using Ada (1983) (4)
- Framing analysis of software failure with safety cases (2006) (4)
- A translator writing system for microcomputer high-level languages and assemblers (1980) (3)
- Domain Arguments in Safety Critical Software Development (2016) (3)
- Speculative Software Modification and its Use in Securing SOUP (2014) (3)
- Selective Notification: Combining Forms of Decoupled Addressing for Internet-Scale Command and Alert Dissemination (2003) (3)
- Kevlar: Transitioning Helix for Research to Practice (2016) (3)
- Diversification of Stack Layout in Binary Programs Using Dynamic Binary Translation (2013) (3)
- Analysis of Ada for a crucial distributed application (1987) (3)
- Software safety in medical applications. (1995) (3)
- On the design of a special‐purpose scientific programming language (1983) (3)
- Topics in Survivable Systems (1998) (3)
- Synthesis of Logic Interpretations (2016) (3)
- A lightweight software control system for cyber awareness and security (2009) (3)
- Achieving Dependable Systems by Synergistic Development of Architectures and Assurance Cases (2006) (3)
- N‐Version Programming (2002) (3)
- Raising Formal Methods To The Requirements Level (2006) (3)
- On the assessment of Ada performance (1990) (2)
- Analysis of Four Critical Infrastructure Applications (1998) (2)
- Engineering, communication, and safety (2007) (2)
- The Engineering Roles of Requirements and Specification (2012) (2)
- Security protection of binary programs (2015) (2)
- Is My Software Consistent with the Real World? (2017) (2)
- In Search of Best Practices for the Use of Natural Language in the Development of High-Consequence S (2002) (2)
- PyNN on SpiNNaker Software 2015.004 (2015) (2)
- A Comprehensive Safety Lifecycle (2014) (2)
- Formal Specifications: A Systematic Evaluation (2012) (2)
- Proving Properties of Simulink Models that Include Discrete Valued Functions (2016) (2)
- Assessment of an Architectural Approach to Large-Scale Systematic Reuse (2012) (2)
- Willow system demonstration (2003) (2)
- A System for the Security Protection of Embedded Binary Programs (2016) (2)
- Software Process Synthesis in Assurance Based Development (2012) (1)
- Applying data redundancy to differential equation solvers (1997) (1)
- A flexible approach to authorization of UAS software (2009) (1)
- What Should Aviation Incidents Teach Us (2012) (1)
- On the engineering of crucial software (1983) (1)
- Integrating the quantitative and qualitative aspects of safety assessment (2012) (1)
- ANDREA : Implementing Survivability in Large Distributed Systems (2003) (1)
- Input Space Partitioning to Enable Massively Parallel Proof (2017) (1)
- Comprehensive Lifecycle for Assuring System Safety (2017) (1)
- PRODUCT DEVELOPMENT WITH MASSIVE COMPONENTS (1999) (1)
- Preliminary design of the redundant software experiment (1985) (1)
- Functionality / Dependability Co-design in Real-Time Embedded Software (2002) (1)
- Achieving Software Quality Through Reuse (1995) (1)
- A Proof Infrastructure for Binary Programs (2016) (1)
- Integrating an assurance case into DO-178B compliant software development (2015) (1)
- Comprehensive tools for assembler construction (1983) (1)
- Helix: A Self-Regenerative Architecture for the Incorruptible Enterprise (2012) (1)
- 5th International workshop on Software Engineering in Health Care (SEHC 2013) (2013) (1)
- Limitations of mathematics in software engineering (1998) (1)
- Dependability of Embedded Systems (2001) (1)
- Model-Based Compositional Reasoning for Complex Systems of Systems (SoS) (2016) (1)
- Anomalies Encountered in Ada Exception Handling (1993) (1)
- Detection of faults and software reliability analysis (1987) (1)
- A Proposed Approach for Use of Assurance Cases in Certification of Airborne Software (2014) (1)
- Static analysis of physical properties in Simulink models (2015) (1)
- Desert Island Books (2002) (1)
- A Framework for Experimental Systems Research in; Distributed Survivability Architectures (2012) (0)
- A Security Architecture for Survivable Systems (2012) (0)
- SIGNUM a spectrum of mathematical software considerations—1975 (Paper Session) (1975) (0)
- Exploring the Software sing a Security Cam (1994) (0)
- Proceedings of the 8th ACM SIGSOFT international symposium on Foundations of software engineering: twenty-first century applications (2000) (0)
- Assessing an Architectural Approach to Large-scale Systematic Reuse † Assessing an Architectural Approach to Large-scale Systematic Reuse (2007) (0)
- Hypertext Structures and Software Documentation (2012) (0)
- PASCAL Users' forum (1979) (0)
- Formal Verification By Specification Extraction 1 (2003) (0)
- Development of a Software Safety Process and a Case Study of Its Use (2019) (0)
- Can Software Faults be Tolerated? (Position Statement) (1989) (0)
- Enforcing safety policies in advanced digital reactor control systems (1994) (0)
- A System for Experimental Research in Distributed Survivability Architectures (2012) (0)
- Visualizing properties of Simulink models (2016) (0)
- Analysis of some algorithms for use on paged virtual memory computers (1973) (0)
- Application Error Recovery in Critical Information Systems (2012) (0)
- Fascinating book on protection of software (1991) (0)
- Proceedings of the 5th International Workshop on Software Engineering in Health Care (2013) (0)
- The current status of microcomputer arrays (1978) (0)
- Software fault tolerance for real-time avionics systems (1983) (0)
- Scalable Command-and-control of Distributed Applications (2002) (0)
- ANDREA: Scalable Command-and-control of Distributed Applications (2002) (0)
- ANALYSIS OF FAULTS IN A MULTI-VERSION SOFTWARE EXPERIMENT (2004) (0)
- Software management tools: Lessons learned from use (1985) (0)
- Software Exploit Prevention and Remediation via Software Memory Protection (2009) (0)
- Proceedings of the 1st International Workshop on Assurance Cases for Software-Intensive Systems (2013) (0)
- Take a peek at some of the freshest projects around (2007) (0)
- 1 Project Description Results from Prior NSF Support (2001) (0)
- Advanced Tools and Techniques for Formal Techniques in Aerospace Systems (2005) (0)
- Formal Verification By Reverse Synthesis 1 (2007) (0)
- The implementation and use of Ada on distributed systems with high reliability requirements (2013) (0)
- Software development for safety-critical medical applications (1992) (0)
- Secretless Security Structures (2005) (0)
- Application of Intrusion Tolerance Technology to Joint Battlespace Infosphere (JBI) (2003) (0)
- Proportional Linguistic Analysis in Requirements Engineering (0)
- Diving safety, Where are we going? (1992) (0)
- Software fault tolerance using data diversity (1991) (0)
- An experimental evaluation of error seeding as a program validation technique (1985) (0)
- Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections (2007) (0)
- Semi-Annual Progress Report Contract No . NAG-1260 / t ”-3 / Yb 3 THE IMPLEMENTATION AND USE OF ADA ON DISTRIBUTED SYSTEMS WITH HIGH RELIABILITY REQUIREMENTS Submitted to : National Aeronautics and Space Administration (2004) (0)
- Self-checking software (1986) (0)
- The Role of Domain Analysis in Quality Assurance (2012) (0)
- Solutions for Trust of Applications on Untrustworthy Systems (2012) (0)
- The Effectiveness of Data Diversity As An Error DetectionMechanism (1991) (0)
- Assurance By Synergistic Static And Dynamic Analysis (0)
- An Experiment in Applying Linguistic Insight to Improve Requirements (2012) (0)
- Computing systems dependability (2003) (0)
- On the Effectiveness of the Metamorphic Shield The effects of continuously changing the attack surface (2010) (0)
- ANDREA : Management for the Survival of Very Large Distributed Systems (2003) (0)
- Data diversity: An approach to fault-tolerant software (1986) (0)
- Formal Verification: An Evaluation (2012) (0)
- A second generation experiment in fault-tolerant software (1986) (0)
- Session details: Tasking and runtime systems (1982) (0)
- PASCAL/48 reference manual (1984) (0)
- WHAT GOES WRONG WITH SAFETY-CRITICAL SYSTEMS ? (0)
- Expert judgment in assurance cases (2015) (0)
- Software development tools for microcontrollers (1985) (0)
- A CHIEVING S OFTWARE Q UALITY T HROUGH R EUSE † (2007) (0)
- DIVERSITY (2016) (0)
- A Graduate Seminar in Tools and Techniques (0)
- Generalized implementation of software safety policies (1994) (0)
- Subscribe with Reply (2002) (0)
- An Exploration of User-Visible Errors to Improve Fault Detection in Web-based Applications (2009) (0)
- Ada on fault-tolerant distributed systems (1987) (0)
- Development and validation of techniques for improving software dependability (1992) (0)
- Development : Identification and Repair of Weak Definitions (2001) (0)
- Echo: a new approach to formal verification based on Ada (2009) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With John Charles Knight?
John Charles Knight is affiliated with the following schools: