Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: John A. Clark
@article{DBLP:journals/ton/DasPGCPS24, author = {Soumadeep Das and Aryan Mohammadi Pasikhani and Prosanta Gope and John A. Clark and Chintan Patel and Biplab Sikdar}, title = {{AIDPS:} Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {32}, number = {2}, pages = {1080--1095}, year = {2024}, url = {https://doi.org/10.1109/TNET.2023.3313156}, doi = {10.1109/TNET.2023.3313156}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/DasPGCPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PasikhaniCG23, author = {Aryan Mohammadi Pasikhani and John A. Clark and Prosanta Gope}, title = {Incremental hybrid intrusion detection for 6LoWPAN}, journal = {Comput. Secur.}, volume = {135}, pages = {103447}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103447}, doi = {10.1016/J.COSE.2023.103447}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PasikhaniCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/AlbatatiCA23, author = {Hebah A. Albatati and John A. Clark and Maysoon F. Abulkhair}, editor = {Abbas Moallem}, title = {Privacy Awareness Among Users of Digital Healthcare Services in Saudi Arabia}, booktitle = {{HCI} for Cybersecurity, Privacy and Trust - 5th International Conference, {HCI-CPT} 2023, Held as Part of the 25th {HCI} International Conference, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14045}, pages = {247--261}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35822-7\_17}, doi = {10.1007/978-3-031-35822-7\_17}, timestamp = {Thu, 13 Jul 2023 13:58:21 +0200}, biburl = {https://dblp.org/rec/conf/hci/AlbatatiCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-13204, author = {Arwa Alromih and John A. Clark and Prosanta Gope}, title = {A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids}, journal = {CoRR}, volume = {abs/2303.13204}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.13204}, doi = {10.48550/ARXIV.2303.13204}, eprinttype = {arXiv}, eprint = {2303.13204}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-13204.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-07730, author = {Soumadeep Das and Aryan Mohammadi Pasikhani and Prosanta Gope and John A. Clark and Chintan Patel and Biplab Sikdar}, title = {{AIDPS:} Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks}, journal = {CoRR}, volume = {abs/2309.07730}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.07730}, doi = {10.48550/ARXIV.2309.07730}, eprinttype = {arXiv}, eprint = {2309.07730}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-07730.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PasikhaniCG22, author = {Aryan Mohammadi Pasikhani and John A. Clark and Prosanta Gope}, title = {Adversarial RL-Based {IDS} for Evolving Data Environment in 6LoWPAN}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3831--3846}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3214099}, doi = {10.1109/TIFS.2022.3214099}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PasikhaniCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccci/AlshahraniC22, author = {Abdulmonem Alshahrani and John A. Clark}, editor = {Mohammad S. Obaidat and Qiang Zhang and Guowei Wu and Kuei{-}Fang Hsiao and Petros Nicopolitidis and Yu Guo}, title = {Transfer Learning Approach to Discover {IDS} Configurations Using Deep Neural Networks}, booktitle = {International Conference on Communications, Computing, Cybersecurity, and Informatics, {CCCI} 2022, Dalian, China, October 17-19, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCCI55352.2022.9926695}, doi = {10.1109/CCCI55352.2022.9926695}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccci/AlshahraniC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/AlshahraniC22, author = {Abdulmonem Alshahrani and John A. Clark}, title = {Neural Network Approximation of Simulation-based {IDS} Fitness Evaluation}, booktitle = {25th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2022, Wuhan, China, December 9-11, 2022}, pages = {81--89}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSE57773.2022.00021}, doi = {10.1109/CSE57773.2022.00021}, timestamp = {Wed, 29 Mar 2023 11:07:46 +0200}, biburl = {https://dblp.org/rec/conf/cse/AlshahraniC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftc/AlshahraniC22, author = {Abdulmonem Alshahrani and John A. Clark}, editor = {Kohei Arai}, title = {On Optimal Configuration of {IDS} for {RPL} Resource-Constrained Networks Using Evolutionary Algorithm}, booktitle = {Proceedings of the Future Technologies Conference, {FTC} 2022, Virtual Event, 20-21 October 2022, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {560}, pages = {514--535}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18458-1\_35}, doi = {10.1007/978-3-031-18458-1\_35}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ftc/AlshahraniC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AlromihCG22, author = {Arwa Alromih and John A. Clark and Prosanta Gope}, editor = {Cristina Alcaraz and Liqun Chen and Shujun Li and Pierangela Samarati}, title = {Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids}, booktitle = {Information and Communications Security - 24th International Conference, {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13407}, pages = {281--300}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15777-6\_16}, doi = {10.1007/978-3-031-15777-6\_16}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/AlromihCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/AlqahtaniC22, author = {Abdullah H. Alqahtani and John A. Clark}, title = {Enhanced Scanning in {SDN} Networks and its Detection using Machine Learning}, booktitle = {4th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, {TPS-ISA} 2022, Atlanta, GA, USA, December 14-17, 2022}, pages = {188--197}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TPS-ISA56441.2022.00032}, doi = {10.1109/TPS-ISA56441.2022.00032}, timestamp = {Mon, 27 Mar 2023 16:44:41 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/AlqahtaniC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-09170, author = {Aryan Mohammadi Pasikhani and John A. Clark and Prosanta Gope}, title = {Adaptive Hybrid Heterogeneous {IDS} for 6LoWPAN}, journal = {CoRR}, volume = {abs/2205.09170}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.09170}, doi = {10.48550/ARXIV.2205.09170}, eprinttype = {arXiv}, eprint = {2205.09170}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-09170.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/CzeksterMCSPD21, author = {Ricardo M. Czekster and Charles Morisset and John A. Clark and Sadegh Soudjani and Charalampos Patsios and Peter Davison}, title = {Systematic review of features for co-simulating security incidents in Cyber-Physical Systems}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.150}, doi = {10.1002/SPY2.150}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/CzeksterMCSPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AlmohamadeCL21, author = {Shurook S. Almohamade and John A. Clark and James Law}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Continuous User Authentication for Human-Robot Collaboration}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {115:1--115:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3470025}, doi = {10.1145/3465481.3470025}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlmohamadeCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etaa/AlmohamadeCL21, author = {Shurook S. Almohamade and John A. Clark and James Law}, editor = {Andrea Saracino and Paolo Mori}, title = {Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction}, booktitle = {Emerging Technologies for Authorization and Authentication - 4th International Workshop, {ETAA} 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13136}, pages = {111--126}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93747-8\_8}, doi = {10.1007/978-3-030-93747-8\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/etaa/AlmohamadeCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi-ws/OBrienC21, author = {George O. O'Brien and John A. Clark}, title = {Using Genetic Improvement to Retarget quantum Software on Differing Hardware}, booktitle = {10th {IEEE/ACM} International Workshop on Genetic Improvement, GI@ICSE 2021, Madrid, Spain, May 30, 2021}, pages = {31--38}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/GI52543.2021.00015}, doi = {10.1109/GI52543.2021.00015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi-ws/OBrienC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/AlyasiriCMF21, author = {Hasanen Alyasiri and John A. Clark and Ali Malik and Ruair{\'{\i}} de Fr{\'{e}}in}, title = {Grammatical Evolution for Detecting Cyberattacks in Internet of Things Environments}, booktitle = {30th International Conference on Computer Communications and Networks, {ICCCN} 2021, Athens, Greece, July 19-22, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCN52240.2021.9522283}, doi = {10.1109/ICCCN52240.2021.9522283}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/AlyasiriCMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgai/AlGorainC21, author = {Fahad T. AlGorain and John A. Clark}, editor = {Sadiq Sani and Harsha K. Kalutarage}, title = {Bayesian Hyper-Parameter Optimization for Malware Detection}, booktitle = {Proceedings of the Workshop on {AI} and Cybersecurity (AI-Cybersec 2021) co-located with 41st {SGAI} International Conference on Artificial Intelligence {(SGAI} 2021), Cambridge, United Kingdom, December 14th, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3125}, pages = {69--84}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3125/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:48 +0100}, biburl = {https://dblp.org/rec/conf/sgai/AlGorainC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AlromihCG21, author = {Arwa Alromih and John A. Clark and Prosanta Gope}, title = {Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based Multi-feature Detection Model}, booktitle = {{IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021, Aachen, Germany, October 25-28, 2021}, pages = {339--345}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SmartGridComm51999.2021.9632322}, doi = {10.1109/SMARTGRIDCOMM51999.2021.9632322}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AlromihCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PasikhaniCG21, author = {Aryan Mohammadi Pasikhani and John A. Clark and Prosanta Gope}, title = {Reinforcement-Learning-based {IDS} for 6LoWPAN}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {1049--1060}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00144}, doi = {10.1109/TRUSTCOM53373.2021.00144}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PasikhaniCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AlmohamadeCL20, author = {Shurook S. Almohamade and John A. Clark and James Law}, editor = {Diana Maimut and Andrei{-}George Oprina and Damien Sauveron}, title = {Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 13th International Conference, SecITC 2020, Bucharest, Romania, November 19-20, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12596}, pages = {185--197}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69255-1\_12}, doi = {10.1007/978-3-030-69255-1\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/AlmohamadeCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-11099, author = {Mario Gleirscher and Nikita Johnson and Panayiotis Karachristou and Radu Calinescu and James Law and John A. Clark}, title = {Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots}, journal = {CoRR}, volume = {abs/2007.11099}, year = {2020}, url = {https://arxiv.org/abs/2007.11099}, eprinttype = {arXiv}, eprint = {2007.11099}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-11099.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/JonesWOCC19, author = {Benjamin D. M. Jones and David Robert White and George O. O'Brien and John A. Clark and Earl T. Campbell}, editor = {Anne Auger and Thomas St{\"{u}}tzle}, title = {Optimising trotter-suzuki decompositions for quantum simulation using evolutionary strategies}, booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference, {GECCO} 2019, Prague, Czech Republic, July 13-17, 2019}, pages = {1223--1231}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321707.3321835}, doi = {10.1145/3321707.3321835}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/JonesWOCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/HatasSC19, author = {Veysel Hatas and Sevil Sen and John A. Clark}, title = {Efficient Evolutionary Fuzzing for Android Application Installation Process}, booktitle = {19th {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2019, Sofia, Bulgaria, July 22-26, 2019}, pages = {62--68}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/QRS.2019.00021}, doi = {10.1109/QRS.2019.00021}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/HatasSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-01336, author = {Benjamin D. M. Jones and George O. O'Brien and David Robert White and Earl T. Campbell and John A. Clark}, title = {Optimising Trotter-Suzuki Decompositions for Quantum Simulation Using Evolutionary Strategies}, journal = {CoRR}, volume = {abs/1904.01336}, year = {2019}, url = {http://arxiv.org/abs/1904.01336}, eprinttype = {arXiv}, eprint = {1904.01336}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-01336.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/Delgado-PerezHG18, author = {Pedro Delgado{-}P{\'{e}}rez and Ibrahim Habli and Steve Gregory and Rob Alexander and John A. Clark and Inmaculada Medina{-}Bulo}, title = {Evaluation of Mutation Testing in a Nuclear Industry Case Study}, journal = {{IEEE} Trans. Reliab.}, volume = {67}, number = {4}, pages = {1406--1419}, year = {2018}, url = {https://doi.org/10.1109/TR.2018.2864678}, doi = {10.1109/TR.2018.2864678}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/Delgado-PerezHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/SrivisutCP18, author = {Komsan Srivisut and John A. Clark and Richard F. Paige}, editor = {Kevin Sim and Paul Kaufmann}, title = {Search-Based Temporal Testing in an Embedded Multicore Platform}, booktitle = {Applications of Evolutionary Computation - 21st International Conference, EvoApplications 2018, Parma, Italy, April 4-6, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10784}, pages = {794--809}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-77538-8\_53}, doi = {10.1007/978-3-319-77538-8\_53}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/evoW/SrivisutCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/SrivisutCP18, author = {Komsan Srivisut and John A. Clark and Richard F. Paige}, editor = {Hern{\'{a}}n E. Aguirre and Keiki Takadama}, title = {Dependent input sampling strategies: using metaheuristics for generating parameterised random sampling regimes}, booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference, {GECCO} 2018, Kyoto, Japan, July 15-19, 2018}, pages = {1451--1458}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205455.3205495}, doi = {10.1145/3205455.3205495}, timestamp = {Wed, 21 Nov 2018 12:43:54 +0100}, biburl = {https://dblp.org/rec/conf/gecco/SrivisutCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcci/AlyasiriCK18, author = {Hasanen Alyasiri and John A. Clark and Daniel Kudenko}, editor = {Christophe Sabourin and Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and Alejandro Linares{-}Barranco and Kurosh Madani and Kevin Warwick}, title = {Applying Cartesian Genetic Programming to Evolve Rules for Intrusion Detection System}, booktitle = {Proceedings of the 10th International Joint Conference on Computational Intelligence, {IJCCI} 2018, Seville, Spain, September 18-20, 2018}, pages = {176--183}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006925901760183}, doi = {10.5220/0006925901760183}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcci/AlyasiriCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/AlyasiriCK18, author = {Hasanen Alyasiri and John A. Clark and Daniel Kudenko}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {170--184}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_14}, doi = {10.1007/978-3-030-12942-2\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/AlyasiriCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SenAC17, author = {Sevil Sen and Ahmet Ilhan Aysan and John A. Clark}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {SAFEDroid: Using Structural Features for Detecting Android Malwares}, booktitle = {Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {239}, pages = {255--270}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78816-6\_18}, doi = {10.1007/978-3-319-78816-6\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/SenAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/shonan-reports/WagnerMHC17, author = {Markus Wagner and Leandro L. Minku and Ahmed E. Hassan and John A. Clark}, title = {Data-Driven Search-Based Software Engineering {(NII} Shonan Meeting 2017-19)}, journal = {{NII} Shonan Meet. Rep.}, volume = {2017}, year = {2017}, url = {https://shonan.nii.ac.jp/seminars/105/}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/shonan-reports/WagnerMHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/PouldingACH15, author = {Simon M. Poulding and Robert Alexander and John A. Clark and Mark J. Hadley}, title = {The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing}, journal = {J. Syst. Softw.}, volume = {103}, pages = {296--310}, year = {2015}, url = {https://doi.org/10.1016/j.jss.2014.11.042}, doi = {10.1016/J.JSS.2014.11.042}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/PouldingACH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/PatrickAOC15, author = {Matthew Patrick and Robert Alexander and Manuel Oriol and John A. Clark}, title = {Subdomain-based test data generation}, journal = {J. Syst. Softw.}, volume = {103}, pages = {328--342}, year = {2015}, url = {https://doi.org/10.1016/j.jss.2014.11.033}, doi = {10.1016/J.JSS.2014.11.033}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/PatrickAOC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PerezTCPG14, author = {Manuel Gil P{\'{e}}rez and Juan E. Tapiador and John A. Clark and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {Trustworthy placements: Improving quality and resilience in collaborative attack detection}, journal = {Comput. Networks}, volume = {58}, pages = {70--86}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2013.08.026}, doi = {10.1016/J.COMNET.2013.08.026}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PerezTCPG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dalt/HuangAC14, author = {Zhan Huang and Rob Alexander and John A. Clark}, editor = {Fabiano Dalpiaz and J{\"{u}}rgen Dix and M. Birna van Riemsdijk}, title = {Mutation Testing for Jason Agents}, booktitle = {Engineering Multi-Agent Systems - Second International Workshop, {EMAS} 2014, Paris, France, May 5-6, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8758}, pages = {309--327}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14484-9\_16}, doi = {10.1007/978-3-319-14484-9\_16}, timestamp = {Mon, 03 Jan 2022 22:22:03 +0100}, biburl = {https://dblp.org/rec/conf/dalt/HuangAC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/NeumannSHC14, author = {Geoffrey Neumann and Jerry Swan and Mark Harman and John A. Clark}, editor = {Dirk V. Arnold and Enrique Alba}, title = {The executable experimental template pattern for the systematic comparison of metaheuristics: Extended Abstract}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} '14, Vancouver, BC, Canada, July 12-16, 2014, Companion Material Proceedings}, pages = {1427--1430}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2598394.2609850}, doi = {10.1145/2598394.2609850}, timestamp = {Wed, 13 Jul 2022 16:15:15 +0200}, biburl = {https://dblp.org/rec/conf/gecco/NeumannSHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/PatrickAOC14, author = {Matthew Patrick and Robert Alexander and Manuel Oriol and John A. Clark}, title = {Probability-Based Semantic Interpretation of Mutants}, booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April 4, 2014, Cleveland, Ohio, {USA}}, pages = {186--195}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICSTW.2014.18}, doi = {10.1109/ICSTW.2014.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/PatrickAOC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/TapiadorC13, author = {Juan E. Tapiador and John A. Clark}, title = {The placement-configuration problem for intrusion detection nodes in wireless sensor networks}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {7}, pages = {2306--2317}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2013.02.012}, doi = {10.1016/J.COMPELECENG.2013.02.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/TapiadorC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/BriandC13, author = {Lionel C. Briand and John A. Clark}, title = {Guest Editorial: Special section of the best papers from the 2nd International Symposium on Search Based Software Engineering 2010}, journal = {Inf. Softw. Technol.}, volume = {55}, number = {1}, pages = {111}, year = {2013}, url = {https://doi.org/10.1016/j.infsof.2012.07.012}, doi = {10.1016/J.INFSOF.2012.07.012}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/BriandC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ChiversCNSC13, author = {Howard Chivers and John A. Clark and Philip Nobles and Siraj A. Shaikh and Hao Chen}, title = {Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise}, journal = {Inf. Syst. Frontiers}, volume = {15}, number = {1}, pages = {17--34}, year = {2013}, url = {https://doi.org/10.1007/s10796-010-9268-7}, doi = {10.1007/S10796-010-9268-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ChiversCNSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/AnandBCCCGHHMOE13, author = {Saswat Anand and Edmund K. Burke and Tsong Yueh Chen and John A. Clark and Myra B. Cohen and Wolfgang Grieskamp and Mark Harman and Mary Jean Harrold and Phil McMinn}, title = {An orchestrated survey of methodologies for automated software test case generation}, journal = {J. Syst. Softw.}, volume = {86}, number = {8}, pages = {1978--2001}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2013.02.061}, doi = {10.1016/J.JSS.2013.02.061}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/AnandBCCCGHHMOE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/ClarkDH13, author = {John A. Clark and Haitao Dan and Robert M. Hierons}, title = {Semantic mutation testing}, journal = {Sci. Comput. Program.}, volume = {78}, number = {4}, pages = {345--363}, year = {2013}, url = {https://doi.org/10.1016/j.scico.2011.03.011}, doi = {10.1016/J.SCICO.2011.03.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/ClarkDH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/PatrickAOC13, author = {Matthew Patrick and Robert Alexander and Manuel Oriol and John A. Clark}, editor = {Pornsiri Muenchaisri and Gregg Rothermel}, title = {Selecting Highly Efficient Sets of Subdomains for Mutation Adequacy}, booktitle = {20th Asia-Pacific Software Engineering Conference, {APSEC} 2013, Ratchathewi, Bangkok, Thailand, December 2-5, 2013 - Volume 1}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/APSEC.2013.23}, doi = {10.1109/APSEC.2013.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsec/PatrickAOC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/PouldingACH13, author = {Simon M. Poulding and Robert Alexander and John A. Clark and Mark J. Hadley}, editor = {Christian Blum and Enrique Alba}, title = {The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} '13, Amsterdam, The Netherlands, July 6-10, 2013}, pages = {1477--1484}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2463372.2463550}, doi = {10.1145/2463372.2463550}, timestamp = {Wed, 13 Jul 2022 16:15:15 +0200}, biburl = {https://dblp.org/rec/conf/gecco/PouldingACH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Clark13, author = {John A. Clark}, title = {{SE} and {AI:} {A} two-way street}, booktitle = {2nd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, {RAISE} 2013, San Francisco, CA, USA, May 25-26, 2013}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RAISE.2013.6615196}, doi = {10.1109/RAISE.2013.6615196}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Clark13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/HarmanCC13, author = {Mark Harman and John A. Clark and Mel {\'{O}} Cinn{\'{e}}ide}, title = {Dynamic adaptive Search Based Software Engineering needs fast approximate metrics (keynote)}, booktitle = {4th International Workshop on Emerging Trends in Software Metrics, WETSoM 2013, San Francisco, CA, USA, May 21, 2013}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WETSoM.2013.6619329}, doi = {10.1109/WETSOM.2013.6619329}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/HarmanCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/PatrickAOC13, author = {Matthew Patrick and Robert Alexander and Manuel Oriol and John A. Clark}, title = {Using Mutation Analysis to Evolve Subdomains for Random Testing}, booktitle = {Sixth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013}, pages = {53--62}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICSTW.2013.14}, doi = {10.1109/ICSTW.2013.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/PatrickAOC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/McLaughlinC13, author = {James McLaughlin and John A. Clark}, editor = {Martijn Stam}, title = {Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis}, booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC} 2013, Oxford, UK, December 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8308}, pages = {120--140}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45239-0\_8}, doi = {10.1007/978-3-642-45239-0\_8}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/McLaughlinC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssbse/PatrickAOC13, author = {Matthew Patrick and Robert Alexander and Manuel Oriol and John A. Clark}, editor = {G{\"{u}}nther Ruhe and Yuanyuan Zhang}, title = {Efficient Subdomains for Random Testing}, booktitle = {Search Based Software Engineering - 5th International Symposium, {SSBSE} 2013, St. Petersburg, Russia, August 24-26, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8084}, pages = {251--256}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39742-4\_20}, doi = {10.1007/978-3-642-39742-4\_20}, timestamp = {Thu, 22 Aug 2019 08:46:38 +0200}, biburl = {https://dblp.org/rec/conf/ssbse/PatrickAOC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-6972, author = {James McLaughlin and John A. Clark}, title = {Using evolutionary computation to create vectorial Boolean functions with low differential uniformity and high nonlinearity}, journal = {CoRR}, volume = {abs/1301.6972}, year = {2013}, url = {http://arxiv.org/abs/1301.6972}, eprinttype = {arXiv}, eprint = {1301.6972}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-6972.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BechmannCS13, author = {Matthias Bechmann and John A. Clark and Angelika Sebald}, title = {Genetic algorithms and solid state {NMR} pulse sequences}, journal = {CoRR}, volume = {abs/1306.0194}, year = {2013}, url = {http://arxiv.org/abs/1306.0194}, eprinttype = {arXiv}, eprint = {1306.0194}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/BechmannCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McLaughlinC13, author = {James McLaughlin and John A. Clark}, title = {Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2013}, url = {http://eprint.iacr.org/2013/011}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McLaughlinC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McLaughlinC13a, author = {James McLaughlin and John A. Clark}, title = {Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2013}, url = {http://eprint.iacr.org/2013/022}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McLaughlinC13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McLaughlinC13b, author = {James McLaughlin and John A. Clark}, title = {Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2013}, url = {http://eprint.iacr.org/2013/089}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McLaughlinC13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/CastroEPCT12, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Pedro Peris{-}Lopez and John A. Clark and El{-}Ghazali Talbi}, title = {Metaheuristic Traceability Attack against SLMAP, an {RFID} Lightweight Authentication Protocol}, journal = {Int. J. Found. Comput. Sci.}, volume = {23}, number = {2}, pages = {543--553}, year = {2012}, url = {https://doi.org/10.1142/S0129054112400278}, doi = {10.1142/S0129054112400278}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/CastroEPCT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/HarmanBCY12, author = {Mark Harman and Edmund K. Burke and John A. Clark and Xin Yao}, editor = {Per Runeson and Martin H{\"{o}}st and Emilia Mendes and Anneliese Amschler Andrews and Rachel Harrison}, title = {Dynamic adaptive search based software engineering}, booktitle = {2012 {ACM-IEEE} International Symposium on Empirical Software Engineering and Measurement, {ESEM} '12, Lund, Sweden - September 19 - 20, 2012}, pages = {1--8}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2372251.2372253}, doi = {10.1145/2372251.2372253}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/esem/HarmanBCY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/PatrickOC12, author = {Matthew Patrick and Manuel Oriol and John A. Clark}, editor = {Giuliano Antoniol and Antonia Bertolino and Yvan Labiche}, title = {{MESSI:} Mutant Evaluation by Static Semantic Interpretation}, booktitle = {Fifth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2012, Montreal, QC, Canada, April 17-21, 2012}, pages = {711--719}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICST.2012.161}, doi = {10.1109/ICST.2012.161}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/PatrickOC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/HarmanLJWAC12, author = {Mark Harman and William B. Langdon and Yue Jia and David Robert White and Andrea Arcuri and John A. Clark}, editor = {Michael Goedicke and Tim Menzies and Motoshi Saeki}, title = {The {GISMOE} challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper)}, booktitle = {{IEEE/ACM} International Conference on Automated Software Engineering, ASE'12, Essen, Germany, September 3-7, 2012}, pages = {1--14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2351676.2351678}, doi = {10.1145/2351676.2351678}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/HarmanLJWAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssbse/MillardWC12, author = {Alan G. Millard and David Robert White and John A. Clark}, editor = {Gordon Fraser and Jerffeson Teixeira de Souza}, title = {Searching for Pareto-optimal Randomised Algorithms}, booktitle = {Search Based Software Engineering - 4th International Symposium, {SSBSE} 2012, Riva del Garda, Italy, September 28-30, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7515}, pages = {183--197}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33119-0\_14}, doi = {10.1007/978-3-642-33119-0\_14}, timestamp = {Mon, 23 Nov 2020 12:33:05 +0100}, biburl = {https://dblp.org/rec/conf/ssbse/MillardWC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SenC11, author = {Sevil Sen and John A. Clark}, title = {Evolutionary computation techniques for intrusion detection in mobile ad hoc networks}, journal = {Comput. Networks}, volume = {55}, number = {15}, pages = {3441--3457}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2011.07.001}, doi = {10.1016/J.COMNET.2011.07.001}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SenC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TapiadorC11, author = {Juan E. Tapiador and John A. Clark}, title = {Masquerade mimicry attack detection: {A} randomised approach}, journal = {Comput. Secur.}, volume = {30}, number = {5}, pages = {297--310}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.05.004}, doi = {10.1016/J.COSE.2011.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TapiadorC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tec/WhiteAC11, author = {David Robert White and Andrea Arcuri and John A. Clark}, title = {Evolutionary Improvement of Programs}, journal = {{IEEE} Trans. Evol. Comput.}, volume = {15}, number = {4}, pages = {515--538}, year = {2011}, url = {https://doi.org/10.1109/TEVC.2010.2083669}, doi = {10.1109/TEVC.2010.2083669}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tec/WhiteAC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BlythePC11, author = {Mark Blythe and Helen Petrie and John A. Clark}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {F for fake: four studies on how we fall for phish}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {3469--3478}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979459}, doi = {10.1145/1978942.1979459}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/BlythePC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/RatcliffWC11, author = {Sam Ratcliff and David Robert White and John A. Clark}, editor = {Natalio Krasnogor and Pier Luca Lanzi}, title = {Searching for invariants using genetic programming and mutation testing}, booktitle = {13th Annual Genetic and Evolutionary Computation Conference, {GECCO} 2011, Proceedings, Dublin, Ireland, July 12-16, 2011}, pages = {1907--1914}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2001576.2001832}, doi = {10.1145/2001576.2001832}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/RatcliffWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/StauntonC11, author = {Jan Staunton and John A. Clark}, editor = {Natalio Krasnogor and Pier Luca Lanzi}, title = {Finding short counterexamples in promela models using estimation of distribution algorithms}, booktitle = {13th Annual Genetic and Evolutionary Computation Conference, {GECCO} 2011, Proceedings, Dublin, Ireland, July 12-16, 2011}, pages = {1923--1930}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2001576.2001834}, doi = {10.1145/2001576.2001834}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/StauntonC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdar/GilliamWC11, author = {Tara Gilliam and Richard C. Wilson and John A. Clark}, title = {Segmentation and Normalisation in Grapheme Codebooks}, booktitle = {2011 International Conference on Document Analysis and Recognition, {ICDAR} 2011, Beijing, China, September 18-21, 2011}, pages = {613--617}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDAR.2011.129}, doi = {10.1109/ICDAR.2011.129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdar/GilliamWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/PouldingCW11, author = {Simon M. Poulding and John A. Clark and H{\'{e}}l{\`{e}}ne Waeselynck}, title = {A Principled Evaluation of the Effect of Directed Mutation on Search-Based Statistical Testing}, booktitle = {Fourth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2012, Berlin, Germany, 21-25 March, 2011, Workshop Proceedings}, pages = {184--193}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICSTW.2011.36}, doi = {10.1109/ICSTW.2011.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/PouldingCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/TapiadorSCM11, author = {Juan E. Tapiador and Mudhakar Srivatsa and John A. Clark and John A. McDermid}, editor = {Vicente Casares Giner and Pietro Manzoni and Ana Pont}, title = {Decorrelating {WSN} Traffic Patterns with Maximally Uninformative Constrained Routing}, booktitle = {{NETWORKING} 2011 Workshops - International {IFIP} {TC} 6 Workshops, PE-CRN, NC-Pro, WCNS, and {SUNSET} 2011, Held at {NETWORKING} 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6827}, pages = {207--218}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23041-7\_20}, doi = {10.1007/978-3-642-23041-7\_20}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/networking/TapiadorSCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssbse/StauntonC11, author = {Jan Staunton and John A. Clark}, editor = {Myra B. Cohen and Mel {\'{O}} Cinn{\'{e}}ide}, title = {Applications of Model Reuse When Using Estimation of Distribution Algorithms to Test Concurrent Software}, booktitle = {Search Based Software Engineering - Third International Symposium, {SSBSE} 2011, Szeged, Hungary, September 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6956}, pages = {97--111}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23716-4\_12}, doi = {10.1007/978-3-642-23716-4\_12}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/ssbse/StauntonC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-2744, author = {Juan E. Tapiador and Julio C. Hernandez{-}Castro and Pedro Peris{-}Lopez and John A. Clark}, title = {Cryptanalysis of Song's advanced smart card based password authentication protocol}, journal = {CoRR}, volume = {abs/1111.2744}, year = {2011}, url = {http://arxiv.org/abs/1111.2744}, eprinttype = {arXiv}, eprint = {1111.2744}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-2744.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/DongCJ10, author = {Xun Dong and John A. Clark and Jeremy L. Jacob}, title = {Defending the weakest link: phishing websites detection by analysing user behaviours}, journal = {Telecommun. Syst.}, volume = {45}, number = {2-3}, pages = {215--226}, year = {2010}, url = {https://doi.org/10.1007/s11235-009-9247-9}, doi = {10.1007/S11235-009-9247-9}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/DongCJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/PouldingC10, author = {Simon M. Poulding and John A. Clark}, title = {Efficient Software Verification: Statistical Testing Using Automated Search}, journal = {{IEEE} Trans. Software Eng.}, volume = {36}, number = {6}, pages = {763--777}, year = {2010}, url = {https://doi.org/10.1109/TSE.2010.24}, doi = {10.1109/TSE.2010.24}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/PouldingC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChenCSCN10, author = {Hao Chen and John A. Clark and Siraj A. Shaikh and Howard Chivers and Philip Nobles}, title = {Optimising {IDS} Sensor Placement}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {315--320}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.92}, doi = {10.1109/ARES.2010.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ChenCSCN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/TapiadorC10, author = {Juan E. Tapiador and John A. Clark}, title = {Learning Autonomic Security Reconfiguration Policies}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {902--909}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.168}, doi = {10.1109/CIT.2010.168}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/TapiadorC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurogp/WhiteTCC10, author = {David Robert White and Juan E. Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and John A. Clark}, editor = {Anna Isabel Esparcia{-}Alc{\'{a}}zar and Anik{\'{o}} Ek{\'{a}}rt and Sara Silva and Stephen Dignum and A. Sima Etaner{-}Uyar}, title = {Fine-Grained Timing Using Genetic Programming}, booktitle = {Genetic Programming, 13th European Conference, EuroGP 2010, Istanbul, Turkey, April 7-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6021}, pages = {325--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12148-7\_28}, doi = {10.1007/978-3-642-12148-7\_28}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/eurogp/WhiteTCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ClarkTMCAIS10, author = {John A. Clark and Juan E. Tapiador and John A. McDermid and Pau{-}Chen Cheng and Dakshi Agrawal and Natalie Ivanic and Dave Slogget}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Modelling Uncertain and Time-Dependent Security Labels in {MLS} Systems}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {158--171}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_10}, doi = {10.1007/978-3-642-25206-8\_10}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icete/ClarkTMCAIS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/GilliamWC10, author = {Tara Gilliam and Richard C. Wilson and John A. Clark}, title = {Scribe Identification in Medieval English Manuscripts}, booktitle = {20th International Conference on Pattern Recognition, {ICPR} 2010, Istanbul, Turkey, 23-26 August 2010}, pages = {1880--1883}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPR.2010.463}, doi = {10.1109/ICPR.2010.463}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/GilliamWC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/ClarkDH10, author = {John A. Clark and Haitao Dan and Robert M. Hierons}, title = {Semantic Mutation Testing}, booktitle = {Third International Conference on Software Testing, Verification and Validation, {ICST} 2010, Paris, France, April 7-9, 2010, Workshops Proceedings}, pages = {100--109}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICSTW.2010.8}, doi = {10.1109/ICSTW.2010.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/ClarkDH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/StauntonC10, author = {Jan Staunton and John A. Clark}, title = {Searching for Safety Violations Using Estimation of Distribution Algorithms}, booktitle = {Third International Conference on Software Testing, Verification and Validation, {ICST} 2010, Paris, France, April 7-9, 2010, Workshops Proceedings}, pages = {212--221}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICSTW.2010.24}, doi = {10.1109/ICSTW.2010.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/StauntonC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TapiadorC10, author = {Juan E. Tapiador and John A. Clark}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Information-Theoretic Detection of Masquerade Mimicry Attacks}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {183--190}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.55}, doi = {10.1109/NSS.2010.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/TapiadorC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ClarkTMCAIS10, author = {John A. Clark and Juan E. Tapiador and John A. McDermid and Pau{-}Chen Cheng and Dakshi Agrawal and Natalie Ivanic and Dave Slogget}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Risk based Access Control with Uncertain and Time-dependent Sensitivity}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--13}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ClarkTMCAIS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChiversCC09, author = {Howard Chivers and John A. Clark and Pau{-}Chen Cheng}, title = {Risk profiles and distributed risk assessment}, journal = {Comput. Secur.}, volume = {28}, number = {7}, pages = {521--535}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.04.005}, doi = {10.1016/J.COSE.2009.04.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChiversCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/HarmanLMOC09, author = {Mark Harman and Zheng Li and Phil McMinn and Jeff Offutt and John A. Clark}, title = {{TAIC} {PART} 2007 and Mutation 2007 special issue editorial}, journal = {J. Syst. Softw.}, volume = {82}, number = {11}, pages = {1753--1754}, year = {2009}, url = {https://doi.org/10.1016/j.jss.2009.06.028}, doi = {10.1016/J.JSS.2009.06.028}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/HarmanLMOC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhocnets/SenCT09, author = {Sevil Sen and John A. Clark and Juan E. Tapiador}, editor = {Jun Zheng and Shiwen Mao and Scott F. Midkiff and Hua Zhu}, title = {Power-Aware Intrusion Detection in Mobile Ad Hoc Networks}, booktitle = {Ad Hoc Networks, First International Conference, {ADHOCNETS} 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {28}, pages = {224--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11723-7\_15}, doi = {10.1007/978-3-642-11723-7\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/adhocnets/SenCT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/GhaniCZ09, author = {Kamran Ghani and John A. Clark and Yuan Zhan}, title = {Comparing algorithms for search-based test data generation of Matlab{\textregistered} Simulink{\textregistered} models}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2009, Trondheim, Norway, 18-21 May, 2009}, pages = {2940--2947}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CEC.2009.4983313}, doi = {10.1109/CEC.2009.4983313}, timestamp = {Thu, 16 Dec 2021 14:01:55 +0100}, biburl = {https://dblp.org/rec/conf/cec/GhaniCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/ChenCTSCN09, author = {Hao Chen and John A. Clark and Juan E. Tapiador and Siraj A. Shaikh and Howard Chivers and Philip Nobles}, editor = {{\'{A}}lvaro Herrero and Paolo Gastaldo and Rodolfo Zunino and Emilio Corchado}, title = {A Multi-objective Optimisation Approach to {IDS} Sensor Placement}, booktitle = {Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings}, series = {Advances in Intelligent and Soft Computing}, volume = {63}, pages = {101--108}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04091-7\_13}, doi = {10.1007/978-3-642-04091-7\_13}, timestamp = {Fri, 12 Aug 2022 13:44:54 +0200}, biburl = {https://dblp.org/rec/conf/cisis-spain/ChenCTSCN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/RhysPC09, author = {Sion Ll Rhys and Simon M. Poulding and John A. Clark}, editor = {Franz Rothlauf}, title = {Using automated search to generate test data for matlab}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings, Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009}, pages = {1697--1704}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1569901.1570128}, doi = {10.1145/1569901.1570128}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/RhysPC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsea/GhaniC09, author = {Kamran Ghani and John A. Clark}, editor = {Kenneth Boness and Jo{\~{a}}o M. Fernandes and Jon G. Hall and Ricardo Jorge Machado and Roy Oberhauser}, title = {Automatic Test Data Generation for Multiple Condition and {MCDC} Coverage}, booktitle = {The Fourth International Conference on Software Engineering Advances, {ICSEA} 2009, 20-25 September 2009, Porto, Portugal}, pages = {152--157}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICSEA.2009.31}, doi = {10.1109/ICSEA.2009.31}, timestamp = {Wed, 09 Aug 2023 08:39:52 +0200}, biburl = {https://dblp.org/rec/conf/icsea/GhaniC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/Hernandez-CastroTPCT09, author = {Julio C. Hernandez{-}Castro and Juan E. Tapiador and Pedro Peris{-}Lopez and John A. Clark and El{-}Ghazali Talbi}, title = {Metaheuristic traceability attack against SLMAP, an {RFID} lightweight authentication protocol}, booktitle = {23rd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2009, Rome, Italy, May 23-29, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IPDPS.2009.5161121}, doi = {10.1109/IPDPS.2009.5161121}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipps/Hernandez-CastroTPCT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ShaikhCNCC09, author = {Siraj A. Shaikh and Howard Chivers and Philip Nobles and John A. Clark and Hao Chen}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {A Deployment Value Model for Intrusion Detection Sensors}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {250--259}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_26}, doi = {10.1007/978-3-642-02617-1\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ShaikhCNCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SenC09, author = {Sevil Sen and John Andrew Clark}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {A grammatical evolution approach to intrusion detection on mobile ad hoc networks}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {95--102}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514289}, doi = {10.1145/1514274.1514289}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/SenC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/SenC09, author = {Sevil Sen and John Andrew Clark}, editor = {Sudip Misra and Isaac Woungang and Subhas Chandra Misra}, title = {Intrusion Detection in Mobile Ad Hoc Networks}, booktitle = {Guide to Wireless Ad Hoc Networks}, series = {Computer Communications and Networks}, pages = {427--454}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-1-84800-328-6\_17}, doi = {10.1007/978-1-84800-328-6\_17}, timestamp = {Wed, 06 Mar 2019 09:21:44 +0100}, biburl = {https://dblp.org/rec/series/ccn/SenC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/WoodcockSCCJ08, author = {Jim Woodcock and Susan Stepney and David Cooper and John A. Clark and Jeremy Jacob}, title = {The certification of the Mondex electronic purse to {ITSEC} Level {E6}}, journal = {Formal Aspects Comput.}, volume = {20}, number = {1}, pages = {5--19}, year = {2008}, url = {https://doi.org/10.1007/s00165-007-0060-5}, doi = {10.1007/S00165-007-0060-5}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fac/WoodcockSCCJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhanC08, author = {Yuan Zhan and John A. Clark}, title = {A search-based framework for automatic testing of MATLAB/Simulink models}, journal = {J. Syst. Softw.}, volume = {81}, number = {2}, pages = {262--285}, year = {2008}, url = {https://doi.org/10.1016/j.jss.2007.05.039}, doi = {10.1016/J.JSS.2007.05.039}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhanC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/LimCCR08, author = {Yow Tzu Lim and Pau{-}Chen Cheng and John Andrew Clark and Pankaj Rohatgi}, title = {Policy evolution with Genetic Programming: {A} comparison of three approaches}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2008, June 1-6, 2008, Hong Kong, China}, pages = {1792--1800}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CEC.2008.4631032}, doi = {10.1109/CEC.2008.4631032}, timestamp = {Thu, 16 Dec 2021 14:01:33 +0100}, biburl = {https://dblp.org/rec/conf/cec/LimCCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/LimCRC08, author = {Yow Tzu Lim and Pau{-}Chen Cheng and Pankaj Rohatgi and John Andrew Clark}, editor = {Conor Ryan and Maarten Keijzer}, title = {{MLS} security policy evolution with genetic programming}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {1571--1578}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389395}, doi = {10.1145/1389095.1389395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/LimCRC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/WhiteCJP08, author = {David Robert White and John A. Clark and Jeremy Jacob and Simon M. Poulding}, editor = {Conor Ryan and Maarten Keijzer}, title = {Searching for resource-efficient programs: low-power pseudorandom number generators}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {1775--1782}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389437}, doi = {10.1145/1389095.1389437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/WhiteCJP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DongCJ08, author = {Xun Dong and John A. Clark and Jeremy L. Jacob}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Threat Modelling in User Performed Authentication}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {49--64}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_4}, doi = {10.1007/978-3-540-88625-9\_4}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/DongCJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/GhaniC08, author = {Kamran Ghani and John A. Clark}, title = {Strengthening Inferred Specifications using Search Based Testing}, booktitle = {First International Conference on Software Testing Verification and Validation, {ICST} 2008, Lillehammer, Norway, April 9-11, 2008, Workshops Proceedings}, pages = {187--194}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICSTW.2008.39}, doi = {10.1109/ICSTW.2008.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/GhaniC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imcsit/DongCJ08, author = {Xun Dong and John A. Clark and Jeremy L. Jacob}, title = {User behaviour based phishing websites detection}, booktitle = {Proceedings of the International Multiconference on Computer Science and Information Technology, {IMCSIT} 2008, Wisla, Poland, 20-22 October 2008}, pages = {783--790}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IMCSIT.2008.4747332}, doi = {10.1109/IMCSIT.2008.4747332}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imcsit/DongCJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pricai/SenC08, author = {Sevil Sen and John A. Clark}, editor = {Tu Bao Ho and Zhi{-}Hua Zhou}, title = {Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks}, booktitle = {{PRICAI} 2008: Trends in Artificial Intelligence, 10th Pacific Rim International Conference on Artificial Intelligence, Hanoi, Vietnam, December 15-19, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5351}, pages = {1053--1058}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89197-0\_106}, doi = {10.1007/978-3-540-89197-0\_106}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pricai/SenC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seal/ArcuriWCY08, author = {Andrea Arcuri and David Robert White and John A. Clark and Xin Yao}, editor = {Xiaodong Li and Michael Kirley and Mengjie Zhang and David G. Green and Victor Ciesielski and Hussein A. Abbass and Zbigniew Michalewicz and Tim Hendtlass and Kalyanmoy Deb and Kay Chen Tan and J{\"{u}}rgen Branke and Yuhui Shi}, title = {Multi-objective Improvement of Software Using Co-evolution and Smart Seeding}, booktitle = {Simulated Evolution and Learning, 7th International Conference, {SEAL} 2008, Melbourne, Australia, December 7-10, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5361}, pages = {61--70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89694-4\_7}, doi = {10.1007/978-3-540-89694-4\_7}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seal/ArcuriWCY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seal/LimCCR08, author = {Yow Tzu Lim and Pau{-}Chen Cheng and John Andrew Clark and Pankaj Rohatgi}, editor = {Xiaodong Li and Michael Kirley and Mengjie Zhang and David G. Green and Victor Ciesielski and Hussein A. Abbass and Zbigniew Michalewicz and Tim Hendtlass and Kalyanmoy Deb and Kay Chen Tan and J{\"{u}}rgen Branke and Yuhui Shi}, title = {Policy Evolution with Grammatical Evolution}, booktitle = {Simulated Evolution and Learning, 7th International Conference, {SEAL} 2008, Melbourne, Australia, December 7-10, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5361}, pages = {71--80}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89694-4\_8}, doi = {10.1007/978-3-540-89694-4\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seal/LimCCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/Estevez-TapiadorCC07, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and John A. Clark}, title = {Heuristic search for non-linear cryptanalytic approximations}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2007, 25-28 September 2007, Singapore}, pages = {3561--3568}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CEC.2007.4424934}, doi = {10.1109/CEC.2007.4424934}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/Estevez-TapiadorCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/PouldingEBC07, author = {Simon M. Poulding and Paul Emberson and Iain Bate and John A. Clark}, title = {An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms}, booktitle = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}}, pages = {53--62}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HASE.2007.27}, doi = {10.1109/HASE.2007.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/PouldingEBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Estevez-TapiadorCC07, author = {Juan M. Est{\'{e}}vez{-}Tapiador and John A. Clark and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Steven D. Galbraith}, title = {Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {99--117}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_7}, doi = {10.1007/978-3-540-77272-9\_7}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/Estevez-TapiadorCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ec/MasseyCS06, author = {Paul Massey and John A. Clark and Susan Stepney}, title = {Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming}, journal = {Evol. Comput.}, volume = {14}, number = {1}, pages = {21--40}, year = {2006}, url = {https://doi.org/10.1162/evco.2006.14.1.21}, doi = {10.1162/EVCO.2006.14.1.21}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ec/MasseyCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/StepneyBCTASAJTWMP06, author = {Susan Stepney and Samuel L. Braunstein and John A. Clark and Andrew M. Tyrrell and Andrew Adamatzky and Robert E. Smith and Thomas R. Addis and Colin G. Johnson and Jonathan Timmis and Peter H. Welch and Robin Milner and Derek Partridge}, title = {Journeys in non-classical computation {II:} initial journeys and waypoints}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {21}, number = {2}, pages = {97--125}, year = {2006}, url = {https://doi.org/10.1080/17445760500355454}, doi = {10.1080/17445760500355454}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/StepneyBCTASAJTWMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/PolackSKC06, author = {Fiona Polack and Thitima Srivatanakul and Tim Kelly and John A. Clark}, editor = {R{\'{e}}gine Laleau and Michel Lemoine}, title = {Deviational Analyses for Validating Regulations on Real Systems}, booktitle = {Proceedings of the CAISE*06 Workshop on Regulations Modelling and their Validation and Verification ReMo2V '06, Luxemburg, June 5-9, 2006}, series = {{CEUR} Workshop Proceedings}, volume = {241}, publisher = {CEUR-WS.org}, year = {2006}, url = {https://ceur-ws.org/Vol-241/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:33 +0100}, biburl = {https://dblp.org/rec/conf/caise/PolackSKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ClarkS06, author = {John A. Clark and Susan Stepney}, title = {Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range}, booktitle = {{IEEE} International Conference on Evolutionary Computation, {CEC} 2006, part of {WCCI} 2006, Vancouver, BC, Canada, 16-21 July 2006}, pages = {200--206}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CEC.2006.1688309}, doi = {10.1109/CEC.2006.1688309}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/ClarkS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ChenCJ06, author = {Hao Chen and John A. Clark and Jeremy Jacob}, editor = {Mike Cattolico}, title = {Human competitive security protocols synthesis}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006}, pages = {1855--1856}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143997.1144297}, doi = {10.1145/1143997.1144297}, timestamp = {Wed, 27 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ChenCJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ZhanC06, author = {Yuan Zhan and John A. Clark}, editor = {Mike Cattolico}, title = {The state problem for test generation in Simulink}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006}, pages = {1941--1948}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143997.1144319}, doi = {10.1145/1143997.1144319}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ZhanC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spc/2006, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666}, doi = {10.1007/11734666}, isbn = {3-540-33376-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/ClarkJS05, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney}, title = {The Design of S-Boxes by Simulated Annealing}, journal = {New Gener. Comput.}, volume = {23}, number = {3}, pages = {219--231}, year = {2005}, url = {https://doi.org/10.1007/BF03037656}, doi = {10.1007/BF03037656}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/ClarkJS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/StepneyBCTASAJTWMP05, author = {Susan Stepney and Samuel L. Braunstein and John A. Clark and Andrew M. Tyrrell and Andrew Adamatzky and Robert E. Smith and Tom Addis and Colin G. Johnson and Jonathan Timmis and Peter H. Welch and Robin Milner and Derek Partridge}, title = {Journeys in non-classical computation {I:} {A} grand challenge for computing research}, journal = {Parallel Algorithms Appl.}, volume = {20}, number = {1}, pages = {5--19}, year = {2005}, url = {https://doi.org/10.1080/17445760500033291}, doi = {10.1080/17445760500033291}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/StepneyBCTASAJTWMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ZhanC05, author = {Yuan Zhan and John A. Clark}, editor = {Hans{-}Georg Beyer and Una{-}May O'Reilly}, title = {Search-based mutation testing for \emph{Simulink} models}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2005, Proceedings, Washington DC, USA, June 25-29, 2005}, pages = {1061--1068}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1068009.1068188}, doi = {10.1145/1068009.1068188}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ZhanC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/MasseyCS05, author = {Paul Massey and John A. Clark and Susan Stepney}, editor = {Hans{-}Georg Beyer and Una{-}May O'Reilly}, title = {Evolution of a human-competitive quantum fourier transform algorithm using genetic programming}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2005, Proceedings, Washington DC, USA, June 25-29, 2005}, pages = {1657--1663}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1068009.1068288}, doi = {10.1145/1068009.1068288}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/MasseyCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/LiuCS05, author = {Yang Liu and John A. Clark and Susan Stepney}, editor = {Dieter Hutter and Markus Ullmann}, title = {"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: {A} Ubiquitous Healthcare Example}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {31--45}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_4}, doi = {10.1007/978-3-540-32004-3\_4}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spc/LiuCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ClarkSC05, author = {John A. Clark and Susan Stepney and Howard Chivers}, editor = {John Derrick and Eerke A. Boiten}, title = {Breaking the Model: Finalisation and a Taxonomy of Security Attacks}, booktitle = {Proceedings of the {REFINE} 2005 Workshop, {REFINE} 2005, Guildford, UK, April 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {137}, number = {2}, pages = {225--242}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.04.033}, doi = {10.1016/J.ENTCS.2005.04.033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/ClarkSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/ClarkJMS04, author = {John A. Clark and Jeremy L. Jacob and Subhamoy Maitra and Pantelimon Stanica}, title = {Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion}, journal = {Comput. Intell.}, volume = {20}, number = {3}, pages = {450--462}, year = {2004}, url = {https://doi.org/10.1111/j.0824-7935.2004.00245.x}, doi = {10.1111/J.0824-7935.2004.00245.X}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/ClarkJMS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/ChenCJ04, author = {Hao Chen and John A. Clark and Jeremy L. Jacob}, title = {Automated Design of Security Protocols}, journal = {Comput. Intell.}, volume = {20}, number = {3}, pages = {503--516}, year = {2004}, url = {https://doi.org/10.1111/j.0824-7935.2004.00249.x}, doi = {10.1111/J.0824-7935.2004.00249.X}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/ChenCJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChiversC04, author = {Howard Chivers and John A. Clark}, title = {Smart dust, friend or foe?--Replacing identity with configuration trust}, journal = {Comput. Networks}, volume = {46}, number = {5}, pages = {723--740}, year = {2004}, url = {https://doi.org/10.1016/j.comnet.2004.06.002}, doi = {10.1016/J.COMNET.2004.06.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChiversC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/BrookePCS04, author = {Phillip J. Brooke and Richard F. Paige and John A. Clark and Susan Stepney}, title = {Playing the game: cheating, loopholes, and virtual identity}, journal = {{SIGCAS} Comput. Soc.}, volume = {34}, number = {2}, pages = {3}, year = {2004}, url = {https://doi.org/10.1145/1052791.1052794}, doi = {10.1145/1052791.1052794}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/BrookePCS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/ClarkHH04, author = {John A. Clark and Mark Harman and Robert M. Hierons}, title = {Editorial: Software testing in the United Kingdom}, journal = {Softw. Test. Verification Reliab.}, volume = {14}, number = {3}, pages = {165--166}, year = {2004}, url = {https://doi.org/10.1002/stvr.302}, doi = {10.1002/STVR.302}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/ClarkHH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ClarkJS04, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney}, title = {Searching for cost functions}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2004, 19-23 June 2004, Portland, OR, {USA}}, pages = {1517--1524}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CEC.2004.1331076}, doi = {10.1109/CEC.2004.1331076}, timestamp = {Thu, 16 Dec 2021 13:58:46 +0100}, biburl = {https://dblp.org/rec/conf/cec/ClarkJS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ClarkJS04a, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney}, title = {The design of s-boxes by simulated annealing}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2004, 19-23 June 2004, Portland, OR, {USA}}, pages = {1533--1537}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CEC.2004.1331078}, doi = {10.1109/CEC.2004.1331078}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/ClarkJS04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/StanicaMC04, author = {Pantelimon Stanica and Subhamoy Maitra and John A. Clark}, editor = {Bimal K. Roy and Willi Meier}, title = {Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {161--177}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_11}, doi = {10.1007/978-3-540-25937-4\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/StanicaMC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/MasseyCS04, author = {Paul Massey and John A. Clark and Susan Stepney}, editor = {Kalyanmoy Deb and Riccardo Poli and Wolfgang Banzhaf and Hans{-}Georg Beyer and Edmund K. Burke and Paul J. Darwen and Dipankar Dasgupta and Dario Floreano and James A. Foster and Mark Harman and Owen Holland and Pier Luca Lanzi and Lee Spector and Andrea Tettamanzi and Dirk Thierens and Andrew M. Tyrrell}, title = {Evolving Quantum Circuits and Programs Through Genetic Programming}, booktitle = {Genetic and Evolutionary Computation - {GECCO} 2004, Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3103}, pages = {569--580}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24855-2\_66}, doi = {10.1007/978-3-540-24855-2\_66}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/gecco/MasseyCS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ZhanC04, author = {Yuan Zhan and John A. Clark}, editor = {Kalyanmoy Deb and Riccardo Poli and Wolfgang Banzhaf and Hans{-}Georg Beyer and Edmund K. Burke and Paul J. Darwen and Dipankar Dasgupta and Dario Floreano and James A. Foster and Mark Harman and Owen Holland and Pier Luca Lanzi and Lee Spector and Andrea Tettamanzi and Dirk Thierens and Andrew M. Tyrrell}, title = {Search Based Automatic Test-Data Generation at an Architectural Level}, booktitle = {Genetic and Evolutionary Computation - {GECCO} 2004, Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3103}, pages = {1413--1424}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24855-2\_161}, doi = {10.1007/978-3-540-24855-2\_161}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/ZhanC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SrivatanakulCP04, author = {Thitima Srivatanakul and John A. Clark and Fiona Polack}, editor = {Kan Zhang and Yuliang Zheng}, title = {Effective Security Requirements Analysis: {HAZOP} and Use Cases}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {416--427}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_35}, doi = {10.1007/978-3-540-30144-8\_35}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/isw/SrivatanakulCP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metrics/HarmanC04, author = {Mark Harman and John A. Clark}, title = {Metrics Are Fitness Functions Too}, booktitle = {10th {IEEE} International Software Metrics Symposium {(METRICS} 2004), 11-17 September 2004, Chicago, IL, {USA}}, pages = {58--69}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/METRIC.2004.1357891}, doi = {10.1109/METRIC.2004.1357891}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/metrics/HarmanC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/HaoCJ05, author = {Hao Chen and John A. Clark and Jeremy L. Jacob}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Synthesising Efficient and Effective Security Protocols}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {25--41}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.017}, doi = {10.1016/J.ENTCS.2004.05.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/HaoCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iee/ClarkeDHHJLMMRRS03, author = {John A. Clark and Jos{\'{e}} Javier Dolado and Mark Harman and Robert M. Hierons and Bryan F. Jones and M. Lumkin and Brian S. Mitchell and Spiros Mancoridis and K. Rees and Marc Roper and Martin J. Shepperd}, title = {Formulating software engineering as a search problem}, journal = {{IEE} Proc. Softw.}, volume = {150}, number = {3}, pages = {161--175}, year = {2003}, url = {https://doi.org/10.1049/ip-sen:20030559}, doi = {10.1049/IP-SEN:20030559}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iee/ClarkeDHHJLMMRRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/SrivatanakulCSP03, author = {Thitima Srivatanakul and John A. Clark and Susan Stepney and Fiona Polack}, title = {Challenging Formal Specifications by Mutation: a {CSP} security example}, booktitle = {10th Asia-Pacific Software Engineering Conference {(APSEC} 2003), 10-12 December 2003, Chiang Mai, Thailand}, pages = {340}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/APSEC.2003.1254388}, doi = {10.1109/APSEC.2003.1254388}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsec/SrivatanakulCSP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/Clark03, author = {John A. Clark}, title = {Nature-inspired cryptography: past, present and future}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2003, Canberra, Australia, December 8-12, 2003}, pages = {1647--1654}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CEC.2003.1299870}, doi = {10.1109/CEC.2003.1299870}, timestamp = {Thu, 16 Dec 2021 11:43:24 +0100}, biburl = {https://dblp.org/rec/conf/cec/Clark03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ClarkJMS03, author = {John A. Clark and Jeremy L. Jacob and Subhamoy Maitra and Pantelimon Stanica}, title = {Almost Boolean functions: the design of Boolean functions by spectral inversion}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2003, Canberra, Australia, December 8-12, 2003}, pages = {2173--2180}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CEC.2003.1299941}, doi = {10.1109/CEC.2003.1299941}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cec/ClarkJMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/0032CJ03, author = {Hao Chen and John A. Clark and Jeremy L. Jacob}, title = {Automated design of security protocols}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2003, Canberra, Australia, December 8-12, 2003}, pages = {2181--2188}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CEC.2003.1299942}, doi = {10.1109/CEC.2003.1299942}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cec/0032CJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/RussellCS03, author = {Matthew D. Russell and John A. Clark and Susan Stepney}, title = {Making the most of two heuristics: breaking transposition ciphers with ants}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2003, Canberra, Australia, December 8-12, 2003}, pages = {2653--2658}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CEC.2003.1299423}, doi = {10.1109/CEC.2003.1299423}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cec/RussellCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/RussellCS03, author = {Matthew D. Russell and John A. Clark and Susan Stepney}, editor = {Erick Cant{\'{u}}{-}Paz and James A. Foster and Kalyanmoy Deb and Lawrence Davis and Rajkumar Roy and Una{-}May O'Reilly and Hans{-}Georg Beyer and Russell K. Standish and Graham Kendall and Stewart W. Wilson and Mark Harman and Joachim Wegener and Dipankar Dasgupta and Mitchell A. Potter and Alan C. Schultz and Kathryn A. Dowsland and Natasa Jonoska and Julian F. Miller}, title = {Using Ants to Attack a Classical Cipher}, booktitle = {Genetic and Evolutionary Computation - {GECCO} 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {2723}, pages = {146--147}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45105-6\_16}, doi = {10.1007/3-540-45105-6\_16}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/RussellCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ClarkJS03, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney}, editor = {Erick Cant{\'{u}}{-}Paz and James A. Foster and Kalyanmoy Deb and Lawrence Davis and Rajkumar Roy and Una{-}May O'Reilly and Hans{-}Georg Beyer and Russell K. Standish and Graham Kendall and Stewart W. Wilson and Mark Harman and Joachim Wegener and Dipankar Dasgupta and Mitchell A. Potter and Alan C. Schultz and Kathryn A. Dowsland and Natasa Jonoska and Julian F. Miller}, title = {Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It}, booktitle = {Genetic and Evolutionary Computation - {GECCO} 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {2724}, pages = {2022--2033}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45110-2\_100}, doi = {10.1007/3-540-45110-2\_100}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/gecco/ClarkJS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaris/StepneyCJPS03, author = {Susan Stepney and John A. Clark and Colin G. Johnson and Derek Partridge and Robert E. Smith}, editor = {Jon Timmis and Peter J. Bentley and Emma Hart}, title = {Artificial Immune Systems and the Grand Challenge for Non-classical Computation}, booktitle = {Artificial Immune Systems, Second International Conference, {ICARIS} 2003, Edinburgh, UK, September 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2787}, pages = {204--216}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45192-1\_20}, doi = {10.1007/978-3-540-45192-1\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaris/StepneyCJPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/ChiversCS03, author = {Howard Chivers and John A. Clark and Susan Stepney}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Smart Devices and Software Agents: The Basics of Good Behaviour}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {39--52}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_7}, doi = {10.1007/978-3-540-39881-3\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/ChiversCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/BowenBCHHK02, author = {Jonathan P. Bowen and Kirill Bogdanov and John A. Clark and Mark Harman and Robert M. Hierons and Paul J. Krause}, title = {{FORTEST:} Formal Methods and Testing}, booktitle = {26th International Computer Software and Applications Conference {(COMPSAC} 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings}, pages = {91--104}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CMPSAC.2002.1044538}, doi = {10.1109/CMPSAC.2002.1044538}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/BowenBCHHK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ClarkJ02, author = {John A. Clark and Jeremy L. Jacob}, editor = {Lars R. Knudsen}, title = {Fault Injection and a Timing Channel on an Analysis Technique}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {181--196}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_12}, doi = {10.1007/3-540-46035-7\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ClarkJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ClarkJSMM02, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney and Subhamoy Maitra and William Millan}, editor = {Alfred Menezes and Palash Sarkar}, title = {Evolving Boolean Functions Satisfying Multiple Criteria}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {246--259}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_20}, doi = {10.1007/3-540-36231-2\_20}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ClarkJSMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/ClarkJ01, author = {John A. Clark and Jeremy L. Jacob}, title = {Protocols are programs too: the meta-heuristic search for security protocols}, journal = {Inf. Softw. Technol.}, volume = {43}, number = {14}, pages = {891--904}, year = {2001}, url = {https://doi.org/10.1016/S0950-5849(01)00195-1}, doi = {10.1016/S0950-5849(01)00195-1}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/ClarkJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/KimCM01, author = {Sun{-}Woo Kim and John A. Clark and John A. McDermid}, title = {Investigating the effectiveness of object-oriented testing strategies using the mutation method}, journal = {Softw. Test. Verification Reliab.}, volume = {11}, number = {3}, pages = {207--225}, year = {2001}, url = {https://doi.org/10.1002/stvr.238}, doi = {10.1002/STVR.238}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/stvr/KimCM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/TraceyCMM00, author = {Nigel J. Tracey and John A. Clark and Keith Mander and John A. McDermid}, title = {Automated test-data generation for exception conditions}, journal = {Softw. Pract. Exp.}, volume = {30}, number = {1}, pages = {61--79}, year = {2000}, url = {https://doi.org/10.1002/(SICI)1097-024X(200001)30:1\&\#60;61::AID-SPE292\&\#62;3.0.CO;2-9}, doi = {10.1002/(SICI)1097-024X(200001)30:1\&\#60;61::AID-SPE292\&\#62;3.0.CO;2-9}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spe/TraceyCMM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ClarkJ00, author = {John A. Clark and Jeremy Jacob}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Two-Stage Optimisation in the Design of Boolean Functions}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {242--254}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_20}, doi = {10.1007/10718964\_20}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ClarkJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ClarkJ00, author = {John A. Clark and Jeremy L. Jacob}, title = {Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols}, booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000}, pages = {82--95}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SECPRI.2000.848447}, doi = {10.1109/SECPRI.2000.848447}, timestamp = {Thu, 21 Sep 2023 15:57:29 +0200}, biburl = {https://dblp.org/rec/conf/sp/ClarkJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iee/ButtleCMST99, author = {Darren Lee Buttle and John A. Clark and John A. McDermid and Alan Stephenson and Nigel James Tracey}, title = {{CONVERSE:} {A} change-oriented process for engine controllers}, journal = {{IEE} Proc. Softw.}, volume = {146}, number = {3}, pages = {130--136}, year = {1999}, url = {https://doi.org/10.1049/ip-sen:19990612}, doi = {10.1049/IP-SEN:19990612}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iee/ButtleCMST99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/McDermidGBCTTV98, author = {John A. McDermid and Andy Galloway and Simon Burton and John A. Clark and Ian Toyn and Nigel J. Tracey and Samuel H. Valentine}, title = {Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap}, booktitle = {Second {IEEE} International Conference on Formal Engineering Methods, {ICFEM} 1998, Brisbane, Queensland, Australia, December 9-11, 1998, Proceedings}, pages = {76--89}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICFEM.1998.730572}, doi = {10.1109/ICFEM.1998.730572}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfem/McDermidGBCTTV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/TraceyCM98, author = {Nigel J. Tracey and John A. Clark and Keith Mander}, editor = {Mary Lou Soffa and Michal Young and Will Tracz}, title = {Automated Program Flaw Finding Using Simulated Annealing}, booktitle = {Proceedings of {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 1998, Clearwater Beach, Florida, USA, March 2-5, 1998}, pages = {73--81}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/271771.271792}, doi = {10.1145/271771.271792}, timestamp = {Mon, 31 Jan 2022 15:15:10 +0100}, biburl = {https://dblp.org/rec/conf/issta/TraceyCM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/TraceyCMM98, author = {Nigel J. Tracey and John A. Clark and Keith Mander and John A. McDermid}, title = {An Automated Framework for Structural Test-Data Generation}, booktitle = {The Thirteenth {IEEE} Conference on Automated Software Engineering, {ASE} 1998, Honolulu, Hawaii, USA, October 13-16, 1998}, pages = {285--288}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ASE.1998.732680}, doi = {10.1109/ASE.1998.732680}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/TraceyCMM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ClarkJ95, author = {John A. Clark and Jeremy Jacob}, title = {On the Security of Recent Protocols}, journal = {Inf. Process. Lett.}, volume = {56}, number = {3}, pages = {151--155}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(95)00136-Z}, doi = {10.1016/0020-0190(95)00136-Z}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ClarkJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/TindellC94, author = {Ken Tindell and John A. Clark}, title = {Holistic schedulability analysis for distributed hard real-time systems}, journal = {Microprocess. Microprogramming}, volume = {40}, number = {2-3}, pages = {117--134}, year = {1994}, url = {https://doi.org/10.1016/0165-6074(94)90080-9}, doi = {10.1016/0165-6074(94)90080-9}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/TindellC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.