Cookies

We use cookies to ensure that we give you the best experience on our website. You can change your cookie settings at any time. Otherwise, we'll assume you're OK to continue.

Durham University

Email and Telephone Directory

Staff Profile

Emeritus Professor Malcolm Munro - all publications

Chapter in book

  • Alaraj, A. & Munro, M. (2009). Enforcing Honesty in Fair Exchange Protocols. In Badr, Y. Chbeir, R. Abraham, A. & Hassanien, A.-E. Springer. 451-479.

Journal Article

  • Sheikh, Abdullah, Munro, Malcolm & Budgen, David (2020). A Service Scheduling Security Model for a Cloud Environment. International Journal for Advanced Computer Science and Applications (IJACSA) 11(5): 1.
  • Sheikh, Abdullah, Munro, Malcolm & Budgen, David (2019). Evaluating a Cloud Service using Scheduling Security Model (SSM). International Journal of Advanced Computer Science and Applications 10(10): 525-532.
  • Ngah, Amir, Munro, Malcolm, Abdullah, Zailani, Jalil, Masita A. & Abdallah, Mohamad (2019). Regression test selection model: a comparison between ReTSE and pythia. TELKOMNIKA (Telecommunication Computing Electronics and Control) 17(2): 844-851.
  • Sheikh, Abdullah, Munro, Malcolm & Budgen, David (2019). Systematic Literature Review (SLR) of Resource Scheduling and Security in Cloud Computing. International Journal of Advanced Computer Science and Applications 10(4): 35-44.
  • Farsi, M. & Munro, M. (2016). A Comparative Study of Teaching the Islamic Prayer. International Journal of Information and Education Technology 6(5): 383-387.
  • Farsi, Mohammed & Munro, Malcolm (2016). Design and Implementation of an Interactive System for Teaching the Islamic Prayer. Journal of Education and Training Studies 4(5): 139-148.
  • Althobaiti, Ahmed R. & Munro, Malcolm (2015). Evaluating an Interactive Electronic Lecture System. International Journal of Information and Education Technology 5(12): 914-919.
  • Basheri, Mohammed, Munro, Malcolm, Burd, Liz & Baghaei, Nilufar (2013). Collaborative Learning Skills in Multi-touch Tables for UML Software Design. International Journal of Advanced Computer Science and Applications 4(3).
  • Liu, Ling & Munro, Malcolm (2012). Systematic analysis of centralized online reputation systems. Decision Support Systems 52(2): 438-449.
  • Du, X, Song, W & Munro, M (2011). CbSSDF: A Two-Layer Conceptual Graph Approach to Web Services Description and Composition – A Scenario Based Solution Analysis and Comparison with OWL-S. International Journal of Information System Modeling and Design 2(4): 82.
  • Alaraj, A. & Munro, M. (2009). An e-Commerce Fair Exchange Protocol that Enforces the Customer to be Honest. International Journal of Product Lifecycle Management
  • Alaraj, A. & Munro, M. (2009). An Efficient e-Commerce Fair Exchange Protocol that Encourages Customer and Merchant to be Honest. Computer Safety, Reliability, and Security, Lecture Notes in Computer Science, Springer 193-206.
  • Looker, N., Xu, J. & Munro, M. (2007). Determining the dependability of Service-Oriented Architectures. International Journal of Simulation and Process Modelling 3(1-2): 88-97.
  • Gallagher, Keith Hatch, Andrew & Munro,Malcolm (2007). Software Architecture Visualization: An Evaluation Framework and Its Application. IEEE Transactions on Software Engineering 34(2): 260-270.
  • Ibrahim, S. Munro, M. & Deraman, A. (2005). A Requirements traceability to Support Change Impact Analysis. Asian Journal of Information Technology 4(4): 329-338.
  • Looker,N., Munro, M. & Xu, J. (2004). Simulating Errors in Web Services. International Journal of Simulation: Systems, Science & Technology 5(5): 29-37.
  • Harman, M. Hu, L. Munro, M. , Zhang, X. Binkley, D. Danicic, S. Daoudi, M. & Ouarbya, L. (2004). Syntax-directed amorphous slicing. Automated software engineering 11(1): 27-61.
  • Gold, N. E. Knight, C. , Mohan, A. & Munro, M. (2004). Understanding service-oriented software. IEEE software 21(2): 71-77.
  • Shaw, S.C., Goldstein, M., Munro, M. & Burd, E. (2003). Moral dominance relations for program comprehension. IEEE Transactions on Software Engineering 29(9): 851-863.
  • Jang, Y.K. Munro, M. & Kwon, Y.R. (2001). An improved method of selecting regression tests for C++ programs. Journal of Software Maintenance and Evolution 13(5): 331-350.
  • Coolen, F. P. A., Goldstein M. & Munro, M. (2001). Generalized partition testing via Bayes linear methods. Information and software technology 43(13): 783-793.
  • Burd, E.L. & Munro, M. (2000). Supporting program comprehension using dominance trees. Annals of Software Engineering 9(1-2): 193-213.
  • Munro, M, Canfora, G & De Lucia, A (1998). An integrated environment for reuse reengineering C code. Journal of Systems and Software 42( 2): 153-164.
  • Munro, M., Cimitile, A. & De Lucia, A. (1996). A Specification Driven Slicing Process for Identifying Reusable Functions. Journal of Software Maintenance: Research and Practice 3: 145-178.

Conference Paper

  • Du, X., Song, W. & Munro, M. (2009), CbSSDF and OWL-S, A Scenario based Solution Analysis and Comparison, in Song, W.W., Xu, S., Wan, C., Zhong, Y., Wojtkowski, W., Wojtkowski, G. & Linger, H. eds, 18th International Conference on Information System development (ISD2009). Nanchang, China, Springer, New York, NY, 3-14.
  • Looker, N., Burd, L., Drummond, S., Xu, J. & Munro, M. (2005), Pedagogic data as a basis for Web service fault models, IEEE International Workshop on Service-Oriented System Engineering (SOSE'05). Beijing, PRC, IEEE Computer Society, 117-125.
  • Zhang, X. , Munro, M. , Harman, M. & Hu, L. (2002), Weakest precondition for general recursive programs formalized in coq, Lecture notes in computer science 2410: 15th International Conference on Theorem Proving in Higher Order Logics TPHOLs. Hampton, VA., Springer, Hampton VA, 332-347.

Conference Proceeding

  • Alnajim, A. & Munro, M. (2008). An Evaluation of Users' Tips Effectiveness for Phishing Websites Detection and Prevention. International Conference on Digital Information Management (ICDIM 2008).
  • Looker, N. , Munro, M. & Xu, J. (2005). A Comparison of Network Level Fault Injection with Code Insertion. International Computer Software and Applications Conference, (COMPSAC, Edinburgh, UK.
  • Gallagher, K., Hatch, A. & Munro, M. (2005). A Framework for Software Architecture Visualization Assessment. Proceedings of the 3rd IEEE Workshop on Visualizing Software (VISSOFT 2005, Budapest, Hungary, IEEE Press.
  • Smith, M.P. & Munro, M. (2005). Identifying Structural Features of Java Programs by Analysing the Interaction of Classes at Runtime. International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT), Budapest, IEEE.
  • Burd, E.L. & Munro, M (1998). Investigating Component-Based Maintenance and the Effect of Software Evolution: a reengineering approach using data clustering. IEEE.