Sarah Brocklehurst

Learn More
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of 'the ability of the system to resist attack'. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current(More)
OBJECTIVES This study is the first to use magnetisation transfer imaging (MTI), a technique sensitive to myelin and axonal abnormalities, to investigate the white matter in vivo in patients with schizophrenia. METHODS MTI was performed in 25 schizophrenic patients and 30 healthy controls. A region of interest (ROI) approach was used to obtain(More)
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of 'the ability of the system to resist attack'. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current(More)
In spite of much research effort, there is no universally applicable software reliability growth model which can be trusted to give accurate predictions of reliability in all circumstances. Worse, we are not even in a position to be able to decide a priori which of the many models is most suitable in a particular context. Our own recent work has tried to(More)
Rats normally eat about 85% of their food at night. Lactation increases food intake 3- to 4-fold, but the diurnal pattern of food intake persists. The mechanisms responsible for the diurnal and lactation-induced changes in food intake are still unresolved, hence we have further investigated the possible roles of serum leptin and hypothalamic expression of(More)
In the development of software reliability measurement and prediction, many software reliability growth models have been proposed. Application of these models to real data sources has shown that there is commonly great disagreement in predictions, while none of them has been shown to be more trustworthy than others in terms of predictive quality in all(More)
In most contexts, it is not feasible to guarantee that a system is 100% secure. Measures and predictions of operational security of computer systems are therefore obviously of interest to any owner of a system which is a candidate for potential intruders. Such measures would allow assessment of current and future expected loss to the system owner due to(More)
In this paper we present and analyse a new set of software failure data which shows the failure behaviour, over a period of four years, of a single-user work station which was installed at the City University in March 1985. The details recorded in this data collection exercise allow us to subdivide the data into various subsets of inter-failure times. A(More)