BibTeX records: John A. Clark

download as .bib file

@article{DBLP:journals/ton/DasPGCPS24,
  author       = {Soumadeep Das and
                  Aryan Mohammadi Pasikhani and
                  Prosanta Gope and
                  John A. Clark and
                  Chintan Patel and
                  Biplab Sikdar},
  title        = {{AIDPS:} Adaptive Intrusion Detection and Prevention System for Underwater
                  Acoustic Sensor Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {32},
  number       = {2},
  pages        = {1080--1095},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNET.2023.3313156},
  doi          = {10.1109/TNET.2023.3313156},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/DasPGCPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PasikhaniCG23,
  author       = {Aryan Mohammadi Pasikhani and
                  John A. Clark and
                  Prosanta Gope},
  title        = {Incremental hybrid intrusion detection for 6LoWPAN},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103447},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103447},
  doi          = {10.1016/J.COSE.2023.103447},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PasikhaniCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/AlbatatiCA23,
  author       = {Hebah A. Albatati and
                  John A. Clark and
                  Maysoon F. Abulkhair},
  editor       = {Abbas Moallem},
  title        = {Privacy Awareness Among Users of Digital Healthcare Services in Saudi
                  Arabia},
  booktitle    = {{HCI} for Cybersecurity, Privacy and Trust - 5th International Conference,
                  {HCI-CPT} 2023, Held as Part of the 25th {HCI} International Conference,
                  {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14045},
  pages        = {247--261},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35822-7\_17},
  doi          = {10.1007/978-3-031-35822-7\_17},
  timestamp    = {Thu, 13 Jul 2023 13:58:21 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/AlbatatiCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-13204,
  author       = {Arwa Alromih and
                  John A. Clark and
                  Prosanta Gope},
  title        = {A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response
                  Management in Smart Grids},
  journal      = {CoRR},
  volume       = {abs/2303.13204},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.13204},
  doi          = {10.48550/ARXIV.2303.13204},
  eprinttype    = {arXiv},
  eprint       = {2303.13204},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-13204.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-07730,
  author       = {Soumadeep Das and
                  Aryan Mohammadi Pasikhani and
                  Prosanta Gope and
                  John A. Clark and
                  Chintan Patel and
                  Biplab Sikdar},
  title        = {{AIDPS:} Adaptive Intrusion Detection and Prevention System for Underwater
                  Acoustic Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/2309.07730},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.07730},
  doi          = {10.48550/ARXIV.2309.07730},
  eprinttype    = {arXiv},
  eprint       = {2309.07730},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-07730.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PasikhaniCG22,
  author       = {Aryan Mohammadi Pasikhani and
                  John A. Clark and
                  Prosanta Gope},
  title        = {Adversarial RL-Based {IDS} for Evolving Data Environment in 6LoWPAN},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3831--3846},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3214099},
  doi          = {10.1109/TIFS.2022.3214099},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PasikhaniCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccci/AlshahraniC22,
  author       = {Abdulmonem Alshahrani and
                  John A. Clark},
  editor       = {Mohammad S. Obaidat and
                  Qiang Zhang and
                  Guowei Wu and
                  Kuei{-}Fang Hsiao and
                  Petros Nicopolitidis and
                  Yu Guo},
  title        = {Transfer Learning Approach to Discover {IDS} Configurations Using
                  Deep Neural Networks},
  booktitle    = {International Conference on Communications, Computing, Cybersecurity,
                  and Informatics, {CCCI} 2022, Dalian, China, October 17-19, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCCI55352.2022.9926695},
  doi          = {10.1109/CCCI55352.2022.9926695},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccci/AlshahraniC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/AlshahraniC22,
  author       = {Abdulmonem Alshahrani and
                  John A. Clark},
  title        = {Neural Network Approximation of Simulation-based {IDS} Fitness Evaluation},
  booktitle    = {25th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2022, Wuhan, China, December 9-11, 2022},
  pages        = {81--89},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSE57773.2022.00021},
  doi          = {10.1109/CSE57773.2022.00021},
  timestamp    = {Wed, 29 Mar 2023 11:07:46 +0200},
  biburl       = {https://dblp.org/rec/conf/cse/AlshahraniC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftc/AlshahraniC22,
  author       = {Abdulmonem Alshahrani and
                  John A. Clark},
  editor       = {Kohei Arai},
  title        = {On Optimal Configuration of {IDS} for {RPL} Resource-Constrained Networks
                  Using Evolutionary Algorithm},
  booktitle    = {Proceedings of the Future Technologies Conference, {FTC} 2022, Virtual
                  Event, 20-21 October 2022, Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {560},
  pages        = {514--535},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18458-1\_35},
  doi          = {10.1007/978-3-031-18458-1\_35},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ftc/AlshahraniC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AlromihCG22,
  author       = {Arwa Alromih and
                  John A. Clark and
                  Prosanta Gope},
  editor       = {Cristina Alcaraz and
                  Liqun Chen and
                  Shujun Li and
                  Pierangela Samarati},
  title        = {Privacy-Aware Split Learning Based Energy Theft Detection for Smart
                  Grids},
  booktitle    = {Information and Communications Security - 24th International Conference,
                  {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13407},
  pages        = {281--300},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15777-6\_16},
  doi          = {10.1007/978-3-031-15777-6\_16},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/AlromihCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/AlqahtaniC22,
  author       = {Abdullah H. Alqahtani and
                  John A. Clark},
  title        = {Enhanced Scanning in {SDN} Networks and its Detection using Machine
                  Learning},
  booktitle    = {4th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems, and Applications, {TPS-ISA} 2022, Atlanta,
                  GA, USA, December 14-17, 2022},
  pages        = {188--197},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPS-ISA56441.2022.00032},
  doi          = {10.1109/TPS-ISA56441.2022.00032},
  timestamp    = {Mon, 27 Mar 2023 16:44:41 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/AlqahtaniC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-09170,
  author       = {Aryan Mohammadi Pasikhani and
                  John A. Clark and
                  Prosanta Gope},
  title        = {Adaptive Hybrid Heterogeneous {IDS} for 6LoWPAN},
  journal      = {CoRR},
  volume       = {abs/2205.09170},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.09170},
  doi          = {10.48550/ARXIV.2205.09170},
  eprinttype    = {arXiv},
  eprint       = {2205.09170},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-09170.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/CzeksterMCSPD21,
  author       = {Ricardo M. Czekster and
                  Charles Morisset and
                  John A. Clark and
                  Sadegh Soudjani and
                  Charalampos Patsios and
                  Peter Davison},
  title        = {Systematic review of features for co-simulating security incidents
                  in Cyber-Physical Systems},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.150},
  doi          = {10.1002/SPY2.150},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/CzeksterMCSPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AlmohamadeCL21,
  author       = {Shurook S. Almohamade and
                  John A. Clark and
                  James Law},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Continuous User Authentication for Human-Robot Collaboration},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {115:1--115:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470025},
  doi          = {10.1145/3465481.3470025},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AlmohamadeCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etaa/AlmohamadeCL21,
  author       = {Shurook S. Almohamade and
                  John A. Clark and
                  James Law},
  editor       = {Andrea Saracino and
                  Paolo Mori},
  title        = {Mimicry Attacks Against Behavioural-Based User Authentication for
                  Human-Robot Interaction},
  booktitle    = {Emerging Technologies for Authorization and Authentication - 4th International
                  Workshop, {ETAA} 2021, Darmstadt, Germany, October 8, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13136},
  pages        = {111--126},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93747-8\_8},
  doi          = {10.1007/978-3-030-93747-8\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/etaa/AlmohamadeCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi-ws/OBrienC21,
  author       = {George O. O'Brien and
                  John A. Clark},
  title        = {Using Genetic Improvement to Retarget quantum Software on Differing
                  Hardware},
  booktitle    = {10th {IEEE/ACM} International Workshop on Genetic Improvement, GI@ICSE
                  2021, Madrid, Spain, May 30, 2021},
  pages        = {31--38},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/GI52543.2021.00015},
  doi          = {10.1109/GI52543.2021.00015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi-ws/OBrienC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/AlyasiriCMF21,
  author       = {Hasanen Alyasiri and
                  John A. Clark and
                  Ali Malik and
                  Ruair{\'{\i}} de Fr{\'{e}}in},
  title        = {Grammatical Evolution for Detecting Cyberattacks in Internet of Things
                  Environments},
  booktitle    = {30th International Conference on Computer Communications and Networks,
                  {ICCCN} 2021, Athens, Greece, July 19-22, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCN52240.2021.9522283},
  doi          = {10.1109/ICCCN52240.2021.9522283},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/AlyasiriCMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgai/AlGorainC21,
  author       = {Fahad T. AlGorain and
                  John A. Clark},
  editor       = {Sadiq Sani and
                  Harsha K. Kalutarage},
  title        = {Bayesian Hyper-Parameter Optimization for Malware Detection},
  booktitle    = {Proceedings of the Workshop on {AI} and Cybersecurity (AI-Cybersec
                  2021) co-located with 41st {SGAI} International Conference on Artificial
                  Intelligence {(SGAI} 2021), Cambridge, United Kingdom, December 14th,
                  2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3125},
  pages        = {69--84},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-3125/paper6.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sgai/AlGorainC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AlromihCG21,
  author       = {Arwa Alromih and
                  John A. Clark and
                  Prosanta Gope},
  title        = {Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based
                  Multi-feature Detection Model},
  booktitle    = {{IEEE} International Conference on Communications, Control, and Computing
                  Technologies for Smart Grids, SmartGridComm 2021, Aachen, Germany,
                  October 25-28, 2021},
  pages        = {339--345},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SmartGridComm51999.2021.9632322},
  doi          = {10.1109/SMARTGRIDCOMM51999.2021.9632322},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AlromihCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PasikhaniCG21,
  author       = {Aryan Mohammadi Pasikhani and
                  John A. Clark and
                  Prosanta Gope},
  title        = {Reinforcement-Learning-based {IDS} for 6LoWPAN},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {1049--1060},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00144},
  doi          = {10.1109/TRUSTCOM53373.2021.00144},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PasikhaniCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AlmohamadeCL20,
  author       = {Shurook S. Almohamade and
                  John A. Clark and
                  James Law},
  editor       = {Diana Maimut and
                  Andrei{-}George Oprina and
                  Damien Sauveron},
  title        = {Behaviour-Based Biometrics for Continuous User Authentication to Industrial
                  Collaborative Robots},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 13th International Conference, SecITC 2020, Bucharest, Romania,
                  November 19-20, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12596},
  pages        = {185--197},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69255-1\_12},
  doi          = {10.1007/978-3-030-69255-1\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/AlmohamadeCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-11099,
  author       = {Mario Gleirscher and
                  Nikita Johnson and
                  Panayiotis Karachristou and
                  Radu Calinescu and
                  James Law and
                  John A. Clark},
  title        = {Challenges in the Safety-Security Co-Assurance of Collaborative Industrial
                  Robots},
  journal      = {CoRR},
  volume       = {abs/2007.11099},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.11099},
  eprinttype    = {arXiv},
  eprint       = {2007.11099},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-11099.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/JonesWOCC19,
  author       = {Benjamin D. M. Jones and
                  David Robert White and
                  George O. O'Brien and
                  John A. Clark and
                  Earl T. Campbell},
  editor       = {Anne Auger and
                  Thomas St{\"{u}}tzle},
  title        = {Optimising trotter-suzuki decompositions for quantum simulation using
                  evolutionary strategies},
  booktitle    = {Proceedings of the Genetic and Evolutionary Computation Conference,
                  {GECCO} 2019, Prague, Czech Republic, July 13-17, 2019},
  pages        = {1223--1231},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321707.3321835},
  doi          = {10.1145/3321707.3321835},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/JonesWOCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/HatasSC19,
  author       = {Veysel Hatas and
                  Sevil Sen and
                  John A. Clark},
  title        = {Efficient Evolutionary Fuzzing for Android Application Installation
                  Process},
  booktitle    = {19th {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2019, Sofia, Bulgaria, July 22-26, 2019},
  pages        = {62--68},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/QRS.2019.00021},
  doi          = {10.1109/QRS.2019.00021},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/HatasSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-01336,
  author       = {Benjamin D. M. Jones and
                  George O. O'Brien and
                  David Robert White and
                  Earl T. Campbell and
                  John A. Clark},
  title        = {Optimising Trotter-Suzuki Decompositions for Quantum Simulation Using
                  Evolutionary Strategies},
  journal      = {CoRR},
  volume       = {abs/1904.01336},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.01336},
  eprinttype    = {arXiv},
  eprint       = {1904.01336},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-01336.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/Delgado-PerezHG18,
  author       = {Pedro Delgado{-}P{\'{e}}rez and
                  Ibrahim Habli and
                  Steve Gregory and
                  Rob Alexander and
                  John A. Clark and
                  Inmaculada Medina{-}Bulo},
  title        = {Evaluation of Mutation Testing in a Nuclear Industry Case Study},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {67},
  number       = {4},
  pages        = {1406--1419},
  year         = {2018},
  url          = {https://doi.org/10.1109/TR.2018.2864678},
  doi          = {10.1109/TR.2018.2864678},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/Delgado-PerezHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoW/SrivisutCP18,
  author       = {Komsan Srivisut and
                  John A. Clark and
                  Richard F. Paige},
  editor       = {Kevin Sim and
                  Paul Kaufmann},
  title        = {Search-Based Temporal Testing in an Embedded Multicore Platform},
  booktitle    = {Applications of Evolutionary Computation - 21st International Conference,
                  EvoApplications 2018, Parma, Italy, April 4-6, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10784},
  pages        = {794--809},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-77538-8\_53},
  doi          = {10.1007/978-3-319-77538-8\_53},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/evoW/SrivisutCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/SrivisutCP18,
  author       = {Komsan Srivisut and
                  John A. Clark and
                  Richard F. Paige},
  editor       = {Hern{\'{a}}n E. Aguirre and
                  Keiki Takadama},
  title        = {Dependent input sampling strategies: using metaheuristics for generating
                  parameterised random sampling regimes},
  booktitle    = {Proceedings of the Genetic and Evolutionary Computation Conference,
                  {GECCO} 2018, Kyoto, Japan, July 15-19, 2018},
  pages        = {1451--1458},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205455.3205495},
  doi          = {10.1145/3205455.3205495},
  timestamp    = {Wed, 21 Nov 2018 12:43:54 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/SrivisutCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcci/AlyasiriCK18,
  author       = {Hasanen Alyasiri and
                  John A. Clark and
                  Daniel Kudenko},
  editor       = {Christophe Sabourin and
                  Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and
                  Alejandro Linares{-}Barranco and
                  Kurosh Madani and
                  Kevin Warwick},
  title        = {Applying Cartesian Genetic Programming to Evolve Rules for Intrusion
                  Detection System},
  booktitle    = {Proceedings of the 10th International Joint Conference on Computational
                  Intelligence, {IJCCI} 2018, Seville, Spain, September 18-20, 2018},
  pages        = {176--183},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006925901760183},
  doi          = {10.5220/0006925901760183},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcci/AlyasiriCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/AlyasiriCK18,
  author       = {Hasanen Alyasiri and
                  John A. Clark and
                  Daniel Kudenko},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Evolutionary Computation Algorithms for Detecting Known and Unknown
                  Attacks},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {170--184},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_14},
  doi          = {10.1007/978-3-030-12942-2\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/AlyasiriCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SenAC17,
  author       = {Sevil Sen and
                  Ahmet Ilhan Aysan and
                  John A. Clark},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {SAFEDroid: Using Structural Features for Detecting Android Malwares},
  booktitle    = {Security and Privacy in Communication Networks - SecureComm 2017 International
                  Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October
                  22-25, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {239},
  pages        = {255--270},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78816-6\_18},
  doi          = {10.1007/978-3-319-78816-6\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/SenAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/shonan-reports/WagnerMHC17,
  author       = {Markus Wagner and
                  Leandro L. Minku and
                  Ahmed E. Hassan and
                  John A. Clark},
  title        = {Data-Driven Search-Based Software Engineering {(NII} Shonan Meeting
                  2017-19)},
  journal      = {{NII} Shonan Meet. Rep.},
  volume       = {2017},
  year         = {2017},
  url          = {https://shonan.nii.ac.jp/seminars/105/},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/shonan-reports/WagnerMHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/PouldingACH15,
  author       = {Simon M. Poulding and
                  Robert Alexander and
                  John A. Clark and
                  Mark J. Hadley},
  title        = {The optimisation of stochastic grammars to enable cost-effective probabilistic
                  structural testing},
  journal      = {J. Syst. Softw.},
  volume       = {103},
  pages        = {296--310},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jss.2014.11.042},
  doi          = {10.1016/J.JSS.2014.11.042},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/PouldingACH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/PatrickAOC15,
  author       = {Matthew Patrick and
                  Robert Alexander and
                  Manuel Oriol and
                  John A. Clark},
  title        = {Subdomain-based test data generation},
  journal      = {J. Syst. Softw.},
  volume       = {103},
  pages        = {328--342},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jss.2014.11.033},
  doi          = {10.1016/J.JSS.2014.11.033},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/PatrickAOC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PerezTCPG14,
  author       = {Manuel Gil P{\'{e}}rez and
                  Juan E. Tapiador and
                  John A. Clark and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {Trustworthy placements: Improving quality and resilience in collaborative
                  attack detection},
  journal      = {Comput. Networks},
  volume       = {58},
  pages        = {70--86},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2013.08.026},
  doi          = {10.1016/J.COMNET.2013.08.026},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PerezTCPG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dalt/HuangAC14,
  author       = {Zhan Huang and
                  Rob Alexander and
                  John A. Clark},
  editor       = {Fabiano Dalpiaz and
                  J{\"{u}}rgen Dix and
                  M. Birna van Riemsdijk},
  title        = {Mutation Testing for Jason Agents},
  booktitle    = {Engineering Multi-Agent Systems - Second International Workshop, {EMAS}
                  2014, Paris, France, May 5-6, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8758},
  pages        = {309--327},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14484-9\_16},
  doi          = {10.1007/978-3-319-14484-9\_16},
  timestamp    = {Mon, 03 Jan 2022 22:22:03 +0100},
  biburl       = {https://dblp.org/rec/conf/dalt/HuangAC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/NeumannSHC14,
  author       = {Geoffrey Neumann and
                  Jerry Swan and
                  Mark Harman and
                  John A. Clark},
  editor       = {Dirk V. Arnold and
                  Enrique Alba},
  title        = {The executable experimental template pattern for the systematic comparison
                  of metaheuristics: Extended Abstract},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} '14, Vancouver,
                  BC, Canada, July 12-16, 2014, Companion Material Proceedings},
  pages        = {1427--1430},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2598394.2609850},
  doi          = {10.1145/2598394.2609850},
  timestamp    = {Wed, 13 Jul 2022 16:15:15 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/NeumannSHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/PatrickAOC14,
  author       = {Matthew Patrick and
                  Robert Alexander and
                  Manuel Oriol and
                  John A. Clark},
  title        = {Probability-Based Semantic Interpretation of Mutants},
  booktitle    = {Seventh {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April
                  4, 2014, Cleveland, Ohio, {USA}},
  pages        = {186--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICSTW.2014.18},
  doi          = {10.1109/ICSTW.2014.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/PatrickAOC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/TapiadorC13,
  author       = {Juan E. Tapiador and
                  John A. Clark},
  title        = {The placement-configuration problem for intrusion detection nodes
                  in wireless sensor networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {7},
  pages        = {2306--2317},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2013.02.012},
  doi          = {10.1016/J.COMPELECENG.2013.02.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/TapiadorC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/BriandC13,
  author       = {Lionel C. Briand and
                  John A. Clark},
  title        = {Guest Editorial: Special section of the best papers from the 2nd International
                  Symposium on Search Based Software Engineering 2010},
  journal      = {Inf. Softw. Technol.},
  volume       = {55},
  number       = {1},
  pages        = {111},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.infsof.2012.07.012},
  doi          = {10.1016/J.INFSOF.2012.07.012},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/BriandC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ChiversCNSC13,
  author       = {Howard Chivers and
                  John A. Clark and
                  Philip Nobles and
                  Siraj A. Shaikh and
                  Hao Chen},
  title        = {Knowing who to watch: Identifying attackers whose actions are hidden
                  within false alarms and background noise},
  journal      = {Inf. Syst. Frontiers},
  volume       = {15},
  number       = {1},
  pages        = {17--34},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10796-010-9268-7},
  doi          = {10.1007/S10796-010-9268-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/ChiversCNSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/AnandBCCCGHHMOE13,
  author       = {Saswat Anand and
                  Edmund K. Burke and
                  Tsong Yueh Chen and
                  John A. Clark and
                  Myra B. Cohen and
                  Wolfgang Grieskamp and
                  Mark Harman and
                  Mary Jean Harrold and
                  Phil McMinn},
  title        = {An orchestrated survey of methodologies for automated software test
                  case generation},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {8},
  pages        = {1978--2001},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2013.02.061},
  doi          = {10.1016/J.JSS.2013.02.061},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/AnandBCCCGHHMOE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/ClarkDH13,
  author       = {John A. Clark and
                  Haitao Dan and
                  Robert M. Hierons},
  title        = {Semantic mutation testing},
  journal      = {Sci. Comput. Program.},
  volume       = {78},
  number       = {4},
  pages        = {345--363},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.scico.2011.03.011},
  doi          = {10.1016/J.SCICO.2011.03.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/ClarkDH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/PatrickAOC13,
  author       = {Matthew Patrick and
                  Robert Alexander and
                  Manuel Oriol and
                  John A. Clark},
  editor       = {Pornsiri Muenchaisri and
                  Gregg Rothermel},
  title        = {Selecting Highly Efficient Sets of Subdomains for Mutation Adequacy},
  booktitle    = {20th Asia-Pacific Software Engineering Conference, {APSEC} 2013, Ratchathewi,
                  Bangkok, Thailand, December 2-5, 2013 - Volume 1},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/APSEC.2013.23},
  doi          = {10.1109/APSEC.2013.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/PatrickAOC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/PouldingACH13,
  author       = {Simon M. Poulding and
                  Robert Alexander and
                  John A. Clark and
                  Mark J. Hadley},
  editor       = {Christian Blum and
                  Enrique Alba},
  title        = {The optimisation of stochastic grammars to enable cost-effective probabilistic
                  structural testing},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} '13, Amsterdam,
                  The Netherlands, July 6-10, 2013},
  pages        = {1477--1484},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2463372.2463550},
  doi          = {10.1145/2463372.2463550},
  timestamp    = {Wed, 13 Jul 2022 16:15:15 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/PouldingACH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Clark13,
  author       = {John A. Clark},
  title        = {{SE} and {AI:} {A} two-way street},
  booktitle    = {2nd International Workshop on Realizing Artificial Intelligence Synergies
                  in Software Engineering, {RAISE} 2013, San Francisco, CA, USA, May
                  25-26, 2013},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/RAISE.2013.6615196},
  doi          = {10.1109/RAISE.2013.6615196},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Clark13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/HarmanCC13,
  author       = {Mark Harman and
                  John A. Clark and
                  Mel {\'{O}} Cinn{\'{e}}ide},
  title        = {Dynamic adaptive Search Based Software Engineering needs fast approximate
                  metrics (keynote)},
  booktitle    = {4th International Workshop on Emerging Trends in Software Metrics,
                  WETSoM 2013, San Francisco, CA, USA, May 21, 2013},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WETSoM.2013.6619329},
  doi          = {10.1109/WETSOM.2013.6619329},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/HarmanCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/PatrickAOC13,
  author       = {Matthew Patrick and
                  Robert Alexander and
                  Manuel Oriol and
                  John A. Clark},
  title        = {Using Mutation Analysis to Evolve Subdomains for Random Testing},
  booktitle    = {Sixth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg,
                  March 18-22, 2013},
  pages        = {53--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICSTW.2013.14},
  doi          = {10.1109/ICSTW.2013.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/PatrickAOC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/McLaughlinC13,
  author       = {James McLaughlin and
                  John A. Clark},
  editor       = {Martijn Stam},
  title        = {Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the
                  Wrong-Key Randomization Hypothesis},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {120--140},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_8},
  doi          = {10.1007/978-3-642-45239-0\_8},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/McLaughlinC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssbse/PatrickAOC13,
  author       = {Matthew Patrick and
                  Robert Alexander and
                  Manuel Oriol and
                  John A. Clark},
  editor       = {G{\"{u}}nther Ruhe and
                  Yuanyuan Zhang},
  title        = {Efficient Subdomains for Random Testing},
  booktitle    = {Search Based Software Engineering - 5th International Symposium, {SSBSE}
                  2013, St. Petersburg, Russia, August 24-26, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8084},
  pages        = {251--256},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39742-4\_20},
  doi          = {10.1007/978-3-642-39742-4\_20},
  timestamp    = {Thu, 22 Aug 2019 08:46:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ssbse/PatrickAOC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-6972,
  author       = {James McLaughlin and
                  John A. Clark},
  title        = {Using evolutionary computation to create vectorial Boolean functions
                  with low differential uniformity and high nonlinearity},
  journal      = {CoRR},
  volume       = {abs/1301.6972},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.6972},
  eprinttype    = {arXiv},
  eprint       = {1301.6972},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-6972.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BechmannCS13,
  author       = {Matthias Bechmann and
                  John A. Clark and
                  Angelika Sebald},
  title        = {Genetic algorithms and solid state {NMR} pulse sequences},
  journal      = {CoRR},
  volume       = {abs/1306.0194},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.0194},
  eprinttype    = {arXiv},
  eprint       = {1306.0194},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/BechmannCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McLaughlinC13,
  author       = {James McLaughlin and
                  John A. Clark},
  title        = {Evolving balanced Boolean functions with optimal resistance to algebraic
                  and fast algebraic attacks, maximal algebraic degree, and very high
                  nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/011},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McLaughlinC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McLaughlinC13a,
  author       = {James McLaughlin and
                  John A. Clark},
  title        = {Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic
                  search for S-box approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/022},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McLaughlinC13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McLaughlinC13b,
  author       = {James McLaughlin and
                  John A. Clark},
  title        = {Filtered nonlinear cryptanalysis of reduced-round Serpent, and the
                  Wrong-Key Randomization Hypothesis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/089},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McLaughlinC13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/CastroEPCT12,
  author       = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Pedro Peris{-}Lopez and
                  John A. Clark and
                  El{-}Ghazali Talbi},
  title        = {Metaheuristic Traceability Attack against SLMAP, an {RFID} Lightweight
                  Authentication Protocol},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {23},
  number       = {2},
  pages        = {543--553},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0129054112400278},
  doi          = {10.1142/S0129054112400278},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/CastroEPCT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esem/HarmanBCY12,
  author       = {Mark Harman and
                  Edmund K. Burke and
                  John A. Clark and
                  Xin Yao},
  editor       = {Per Runeson and
                  Martin H{\"{o}}st and
                  Emilia Mendes and
                  Anneliese Amschler Andrews and
                  Rachel Harrison},
  title        = {Dynamic adaptive search based software engineering},
  booktitle    = {2012 {ACM-IEEE} International Symposium on Empirical Software Engineering
                  and Measurement, {ESEM} '12, Lund, Sweden - September 19 - 20, 2012},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2372251.2372253},
  doi          = {10.1145/2372251.2372253},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/esem/HarmanBCY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/PatrickOC12,
  author       = {Matthew Patrick and
                  Manuel Oriol and
                  John A. Clark},
  editor       = {Giuliano Antoniol and
                  Antonia Bertolino and
                  Yvan Labiche},
  title        = {{MESSI:} Mutant Evaluation by Static Semantic Interpretation},
  booktitle    = {Fifth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2012, Montreal, QC, Canada, April 17-21, 2012},
  pages        = {711--719},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICST.2012.161},
  doi          = {10.1109/ICST.2012.161},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/PatrickOC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/HarmanLJWAC12,
  author       = {Mark Harman and
                  William B. Langdon and
                  Yue Jia and
                  David Robert White and
                  Andrea Arcuri and
                  John A. Clark},
  editor       = {Michael Goedicke and
                  Tim Menzies and
                  Motoshi Saeki},
  title        = {The {GISMOE} challenge: constructing the pareto program surface using
                  genetic programming to find better programs (keynote paper)},
  booktitle    = {{IEEE/ACM} International Conference on Automated Software Engineering,
                  ASE'12, Essen, Germany, September 3-7, 2012},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2351676.2351678},
  doi          = {10.1145/2351676.2351678},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/HarmanLJWAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssbse/MillardWC12,
  author       = {Alan G. Millard and
                  David Robert White and
                  John A. Clark},
  editor       = {Gordon Fraser and
                  Jerffeson Teixeira de Souza},
  title        = {Searching for Pareto-optimal Randomised Algorithms},
  booktitle    = {Search Based Software Engineering - 4th International Symposium, {SSBSE}
                  2012, Riva del Garda, Italy, September 28-30, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7515},
  pages        = {183--197},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33119-0\_14},
  doi          = {10.1007/978-3-642-33119-0\_14},
  timestamp    = {Mon, 23 Nov 2020 12:33:05 +0100},
  biburl       = {https://dblp.org/rec/conf/ssbse/MillardWC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SenC11,
  author       = {Sevil Sen and
                  John A. Clark},
  title        = {Evolutionary computation techniques for intrusion detection in mobile
                  ad hoc networks},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {15},
  pages        = {3441--3457},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2011.07.001},
  doi          = {10.1016/J.COMNET.2011.07.001},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SenC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TapiadorC11,
  author       = {Juan E. Tapiador and
                  John A. Clark},
  title        = {Masquerade mimicry attack detection: {A} randomised approach},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {5},
  pages        = {297--310},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.05.004},
  doi          = {10.1016/J.COSE.2011.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TapiadorC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tec/WhiteAC11,
  author       = {David Robert White and
                  Andrea Arcuri and
                  John A. Clark},
  title        = {Evolutionary Improvement of Programs},
  journal      = {{IEEE} Trans. Evol. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {515--538},
  year         = {2011},
  url          = {https://doi.org/10.1109/TEVC.2010.2083669},
  doi          = {10.1109/TEVC.2010.2083669},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tec/WhiteAC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BlythePC11,
  author       = {Mark Blythe and
                  Helen Petrie and
                  John A. Clark},
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {F for fake: four studies on how we fall for phish},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages        = {3469--3478},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978942.1979459},
  doi          = {10.1145/1978942.1979459},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/BlythePC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/RatcliffWC11,
  author       = {Sam Ratcliff and
                  David Robert White and
                  John A. Clark},
  editor       = {Natalio Krasnogor and
                  Pier Luca Lanzi},
  title        = {Searching for invariants using genetic programming and mutation testing},
  booktitle    = {13th Annual Genetic and Evolutionary Computation Conference, {GECCO}
                  2011, Proceedings, Dublin, Ireland, July 12-16, 2011},
  pages        = {1907--1914},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2001576.2001832},
  doi          = {10.1145/2001576.2001832},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/RatcliffWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/StauntonC11,
  author       = {Jan Staunton and
                  John A. Clark},
  editor       = {Natalio Krasnogor and
                  Pier Luca Lanzi},
  title        = {Finding short counterexamples in promela models using estimation of
                  distribution algorithms},
  booktitle    = {13th Annual Genetic and Evolutionary Computation Conference, {GECCO}
                  2011, Proceedings, Dublin, Ireland, July 12-16, 2011},
  pages        = {1923--1930},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2001576.2001834},
  doi          = {10.1145/2001576.2001834},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/StauntonC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdar/GilliamWC11,
  author       = {Tara Gilliam and
                  Richard C. Wilson and
                  John A. Clark},
  title        = {Segmentation and Normalisation in Grapheme Codebooks},
  booktitle    = {2011 International Conference on Document Analysis and Recognition,
                  {ICDAR} 2011, Beijing, China, September 18-21, 2011},
  pages        = {613--617},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDAR.2011.129},
  doi          = {10.1109/ICDAR.2011.129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdar/GilliamWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/PouldingCW11,
  author       = {Simon M. Poulding and
                  John A. Clark and
                  H{\'{e}}l{\`{e}}ne Waeselynck},
  title        = {A Principled Evaluation of the Effect of Directed Mutation on Search-Based
                  Statistical Testing},
  booktitle    = {Fourth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2012, Berlin, Germany, 21-25 March, 2011, Workshop
                  Proceedings},
  pages        = {184--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICSTW.2011.36},
  doi          = {10.1109/ICSTW.2011.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/PouldingCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/TapiadorSCM11,
  author       = {Juan E. Tapiador and
                  Mudhakar Srivatsa and
                  John A. Clark and
                  John A. McDermid},
  editor       = {Vicente Casares Giner and
                  Pietro Manzoni and
                  Ana Pont},
  title        = {Decorrelating {WSN} Traffic Patterns with Maximally Uninformative
                  Constrained Routing},
  booktitle    = {{NETWORKING} 2011 Workshops - International {IFIP} {TC} 6 Workshops,
                  PE-CRN, NC-Pro, WCNS, and {SUNSET} 2011, Held at {NETWORKING} 2011,
                  Valencia, Spain, May 13, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6827},
  pages        = {207--218},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23041-7\_20},
  doi          = {10.1007/978-3-642-23041-7\_20},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/TapiadorSCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssbse/StauntonC11,
  author       = {Jan Staunton and
                  John A. Clark},
  editor       = {Myra B. Cohen and
                  Mel {\'{O}} Cinn{\'{e}}ide},
  title        = {Applications of Model Reuse When Using Estimation of Distribution
                  Algorithms to Test Concurrent Software},
  booktitle    = {Search Based Software Engineering - Third International Symposium,
                  {SSBSE} 2011, Szeged, Hungary, September 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6956},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23716-4\_12},
  doi          = {10.1007/978-3-642-23716-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ssbse/StauntonC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-2744,
  author       = {Juan E. Tapiador and
                  Julio C. Hernandez{-}Castro and
                  Pedro Peris{-}Lopez and
                  John A. Clark},
  title        = {Cryptanalysis of Song's advanced smart card based password authentication
                  protocol},
  journal      = {CoRR},
  volume       = {abs/1111.2744},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.2744},
  eprinttype    = {arXiv},
  eprint       = {1111.2744},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-2744.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/DongCJ10,
  author       = {Xun Dong and
                  John A. Clark and
                  Jeremy L. Jacob},
  title        = {Defending the weakest link: phishing websites detection by analysing
                  user behaviours},
  journal      = {Telecommun. Syst.},
  volume       = {45},
  number       = {2-3},
  pages        = {215--226},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11235-009-9247-9},
  doi          = {10.1007/S11235-009-9247-9},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/DongCJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/PouldingC10,
  author       = {Simon M. Poulding and
                  John A. Clark},
  title        = {Efficient Software Verification: Statistical Testing Using Automated
                  Search},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {36},
  number       = {6},
  pages        = {763--777},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSE.2010.24},
  doi          = {10.1109/TSE.2010.24},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/PouldingC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChenCSCN10,
  author       = {Hao Chen and
                  John A. Clark and
                  Siraj A. Shaikh and
                  Howard Chivers and
                  Philip Nobles},
  title        = {Optimising {IDS} Sensor Placement},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {315--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.92},
  doi          = {10.1109/ARES.2010.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChenCSCN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/TapiadorC10,
  author       = {Juan E. Tapiador and
                  John A. Clark},
  title        = {Learning Autonomic Security Reconfiguration Policies},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {902--909},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.168},
  doi          = {10.1109/CIT.2010.168},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/TapiadorC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurogp/WhiteTCC10,
  author       = {David Robert White and
                  Juan E. Tapiador and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  John A. Clark},
  editor       = {Anna Isabel Esparcia{-}Alc{\'{a}}zar and
                  Anik{\'{o}} Ek{\'{a}}rt and
                  Sara Silva and
                  Stephen Dignum and
                  A. Sima Etaner{-}Uyar},
  title        = {Fine-Grained Timing Using Genetic Programming},
  booktitle    = {Genetic Programming, 13th European Conference, EuroGP 2010, Istanbul,
                  Turkey, April 7-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6021},
  pages        = {325--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12148-7\_28},
  doi          = {10.1007/978-3-642-12148-7\_28},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/eurogp/WhiteTCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/ClarkTMCAIS10,
  author       = {John A. Clark and
                  Juan E. Tapiador and
                  John A. McDermid and
                  Pau{-}Chen Cheng and
                  Dakshi Agrawal and
                  Natalie Ivanic and
                  Dave Slogget},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Modelling Uncertain and Time-Dependent Security Labels in {MLS} Systems},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {158--171},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_10},
  doi          = {10.1007/978-3-642-25206-8\_10},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/ClarkTMCAIS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/GilliamWC10,
  author       = {Tara Gilliam and
                  Richard C. Wilson and
                  John A. Clark},
  title        = {Scribe Identification in Medieval English Manuscripts},
  booktitle    = {20th International Conference on Pattern Recognition, {ICPR} 2010,
                  Istanbul, Turkey, 23-26 August 2010},
  pages        = {1880--1883},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICPR.2010.463},
  doi          = {10.1109/ICPR.2010.463},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpr/GilliamWC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/ClarkDH10,
  author       = {John A. Clark and
                  Haitao Dan and
                  Robert M. Hierons},
  title        = {Semantic Mutation Testing},
  booktitle    = {Third International Conference on Software Testing, Verification and
                  Validation, {ICST} 2010, Paris, France, April 7-9, 2010, Workshops
                  Proceedings},
  pages        = {100--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICSTW.2010.8},
  doi          = {10.1109/ICSTW.2010.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/ClarkDH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/StauntonC10,
  author       = {Jan Staunton and
                  John A. Clark},
  title        = {Searching for Safety Violations Using Estimation of Distribution Algorithms},
  booktitle    = {Third International Conference on Software Testing, Verification and
                  Validation, {ICST} 2010, Paris, France, April 7-9, 2010, Workshops
                  Proceedings},
  pages        = {212--221},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICSTW.2010.24},
  doi          = {10.1109/ICSTW.2010.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/StauntonC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TapiadorC10,
  author       = {Juan E. Tapiador and
                  John A. Clark},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Information-Theoretic Detection of Masquerade Mimicry Attacks},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {183--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.55},
  doi          = {10.1109/NSS.2010.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/TapiadorC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ClarkTMCAIS10,
  author       = {John A. Clark and
                  Juan E. Tapiador and
                  John A. McDermid and
                  Pau{-}Chen Cheng and
                  Dakshi Agrawal and
                  Natalie Ivanic and
                  Dave Slogget},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Risk based Access Control with Uncertain and Time-dependent Sensitivity},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {5--13},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ClarkTMCAIS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChiversCC09,
  author       = {Howard Chivers and
                  John A. Clark and
                  Pau{-}Chen Cheng},
  title        = {Risk profiles and distributed risk assessment},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {7},
  pages        = {521--535},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2009.04.005},
  doi          = {10.1016/J.COSE.2009.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChiversCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HarmanLMOC09,
  author       = {Mark Harman and
                  Zheng Li and
                  Phil McMinn and
                  Jeff Offutt and
                  John A. Clark},
  title        = {{TAIC} {PART} 2007 and Mutation 2007 special issue editorial},
  journal      = {J. Syst. Softw.},
  volume       = {82},
  number       = {11},
  pages        = {1753--1754},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jss.2009.06.028},
  doi          = {10.1016/J.JSS.2009.06.028},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/HarmanLMOC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhocnets/SenCT09,
  author       = {Sevil Sen and
                  John A. Clark and
                  Juan E. Tapiador},
  editor       = {Jun Zheng and
                  Shiwen Mao and
                  Scott F. Midkiff and
                  Hua Zhu},
  title        = {Power-Aware Intrusion Detection in Mobile Ad Hoc Networks},
  booktitle    = {Ad Hoc Networks, First International Conference, {ADHOCNETS} 2009,
                  Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {28},
  pages        = {224--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11723-7\_15},
  doi          = {10.1007/978-3-642-11723-7\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/adhocnets/SenCT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/GhaniCZ09,
  author       = {Kamran Ghani and
                  John A. Clark and
                  Yuan Zhan},
  title        = {Comparing algorithms for search-based test data generation of Matlab{\textregistered}
                  Simulink{\textregistered} models},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2009, Trondheim, Norway, 18-21 May, 2009},
  pages        = {2940--2947},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CEC.2009.4983313},
  doi          = {10.1109/CEC.2009.4983313},
  timestamp    = {Thu, 16 Dec 2021 14:01:55 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/GhaniCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/ChenCTSCN09,
  author       = {Hao Chen and
                  John A. Clark and
                  Juan E. Tapiador and
                  Siraj A. Shaikh and
                  Howard Chivers and
                  Philip Nobles},
  editor       = {{\'{A}}lvaro Herrero and
                  Paolo Gastaldo and
                  Rodolfo Zunino and
                  Emilio Corchado},
  title        = {A Multi-objective Optimisation Approach to {IDS} Sensor Placement},
  booktitle    = {Computational Intelligence in Security for Information Systems - CISIS'09,
                  2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {63},
  pages        = {101--108},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04091-7\_13},
  doi          = {10.1007/978-3-642-04091-7\_13},
  timestamp    = {Fri, 12 Aug 2022 13:44:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/ChenCTSCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/RhysPC09,
  author       = {Sion Ll Rhys and
                  Simon M. Poulding and
                  John A. Clark},
  editor       = {Franz Rothlauf},
  title        = {Using automated search to generate test data for matlab},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2009, Proceedings,
                  Montreal, Qu{\'{e}}bec, Canada, July 8-12, 2009},
  pages        = {1697--1704},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1569901.1570128},
  doi          = {10.1145/1569901.1570128},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/RhysPC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsea/GhaniC09,
  author       = {Kamran Ghani and
                  John A. Clark},
  editor       = {Kenneth Boness and
                  Jo{\~{a}}o M. Fernandes and
                  Jon G. Hall and
                  Ricardo Jorge Machado and
                  Roy Oberhauser},
  title        = {Automatic Test Data Generation for Multiple Condition and {MCDC} Coverage},
  booktitle    = {The Fourth International Conference on Software Engineering Advances,
                  {ICSEA} 2009, 20-25 September 2009, Porto, Portugal},
  pages        = {152--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICSEA.2009.31},
  doi          = {10.1109/ICSEA.2009.31},
  timestamp    = {Wed, 09 Aug 2023 08:39:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icsea/GhaniC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/Hernandez-CastroTPCT09,
  author       = {Julio C. Hernandez{-}Castro and
                  Juan E. Tapiador and
                  Pedro Peris{-}Lopez and
                  John A. Clark and
                  El{-}Ghazali Talbi},
  title        = {Metaheuristic traceability attack against SLMAP, an {RFID} lightweight
                  authentication protocol},
  booktitle    = {23rd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2009, Rome, Italy, May 23-29, 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IPDPS.2009.5161121},
  doi          = {10.1109/IPDPS.2009.5161121},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipps/Hernandez-CastroTPCT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ShaikhCNCC09,
  author       = {Siraj A. Shaikh and
                  Howard Chivers and
                  Philip Nobles and
                  John A. Clark and
                  Hao Chen},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {A Deployment Value Model for Intrusion Detection Sensors},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {250--259},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_26},
  doi          = {10.1007/978-3-642-02617-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ShaikhCNCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SenC09,
  author       = {Sevil Sen and
                  John Andrew Clark},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A grammatical evolution approach to intrusion detection on mobile
                  ad hoc networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {95--102},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514289},
  doi          = {10.1145/1514274.1514289},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/SenC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/SenC09,
  author       = {Sevil Sen and
                  John Andrew Clark},
  editor       = {Sudip Misra and
                  Isaac Woungang and
                  Subhas Chandra Misra},
  title        = {Intrusion Detection in Mobile Ad Hoc Networks},
  booktitle    = {Guide to Wireless Ad Hoc Networks},
  series       = {Computer Communications and Networks},
  pages        = {427--454},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-1-84800-328-6\_17},
  doi          = {10.1007/978-1-84800-328-6\_17},
  timestamp    = {Wed, 06 Mar 2019 09:21:44 +0100},
  biburl       = {https://dblp.org/rec/series/ccn/SenC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/WoodcockSCCJ08,
  author       = {Jim Woodcock and
                  Susan Stepney and
                  David Cooper and
                  John A. Clark and
                  Jeremy Jacob},
  title        = {The certification of the Mondex electronic purse to {ITSEC} Level
                  {E6}},
  journal      = {Formal Aspects Comput.},
  volume       = {20},
  number       = {1},
  pages        = {5--19},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00165-007-0060-5},
  doi          = {10.1007/S00165-007-0060-5},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fac/WoodcockSCCJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhanC08,
  author       = {Yuan Zhan and
                  John A. Clark},
  title        = {A search-based framework for automatic testing of MATLAB/Simulink
                  models},
  journal      = {J. Syst. Softw.},
  volume       = {81},
  number       = {2},
  pages        = {262--285},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jss.2007.05.039},
  doi          = {10.1016/J.JSS.2007.05.039},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhanC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/LimCCR08,
  author       = {Yow Tzu Lim and
                  Pau{-}Chen Cheng and
                  John Andrew Clark and
                  Pankaj Rohatgi},
  title        = {Policy evolution with Genetic Programming: {A} comparison of three
                  approaches},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2008, June 1-6, 2008, Hong Kong, China},
  pages        = {1792--1800},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CEC.2008.4631032},
  doi          = {10.1109/CEC.2008.4631032},
  timestamp    = {Thu, 16 Dec 2021 14:01:33 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/LimCCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/LimCRC08,
  author       = {Yow Tzu Lim and
                  Pau{-}Chen Cheng and
                  Pankaj Rohatgi and
                  John Andrew Clark},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {{MLS} security policy evolution with genetic programming},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {1571--1578},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389395},
  doi          = {10.1145/1389095.1389395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/LimCRC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/WhiteCJP08,
  author       = {David Robert White and
                  John A. Clark and
                  Jeremy Jacob and
                  Simon M. Poulding},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {Searching for resource-efficient programs: low-power pseudorandom
                  number generators},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {1775--1782},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389437},
  doi          = {10.1145/1389095.1389437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/WhiteCJP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DongCJ08,
  author       = {Xun Dong and
                  John A. Clark and
                  Jeremy L. Jacob},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Threat Modelling in User Performed Authentication},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_4},
  doi          = {10.1007/978-3-540-88625-9\_4},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/DongCJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/GhaniC08,
  author       = {Kamran Ghani and
                  John A. Clark},
  title        = {Strengthening Inferred Specifications using Search Based Testing},
  booktitle    = {First International Conference on Software Testing Verification and
                  Validation, {ICST} 2008, Lillehammer, Norway, April 9-11, 2008, Workshops
                  Proceedings},
  pages        = {187--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICSTW.2008.39},
  doi          = {10.1109/ICSTW.2008.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/GhaniC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imcsit/DongCJ08,
  author       = {Xun Dong and
                  John A. Clark and
                  Jeremy L. Jacob},
  title        = {User behaviour based phishing websites detection},
  booktitle    = {Proceedings of the International Multiconference on Computer Science
                  and Information Technology, {IMCSIT} 2008, Wisla, Poland, 20-22 October
                  2008},
  pages        = {783--790},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IMCSIT.2008.4747332},
  doi          = {10.1109/IMCSIT.2008.4747332},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imcsit/DongCJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pricai/SenC08,
  author       = {Sevil Sen and
                  John A. Clark},
  editor       = {Tu Bao Ho and
                  Zhi{-}Hua Zhou},
  title        = {Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks},
  booktitle    = {{PRICAI} 2008: Trends in Artificial Intelligence, 10th Pacific Rim
                  International Conference on Artificial Intelligence, Hanoi, Vietnam,
                  December 15-19, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5351},
  pages        = {1053--1058},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89197-0\_106},
  doi          = {10.1007/978-3-540-89197-0\_106},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pricai/SenC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seal/ArcuriWCY08,
  author       = {Andrea Arcuri and
                  David Robert White and
                  John A. Clark and
                  Xin Yao},
  editor       = {Xiaodong Li and
                  Michael Kirley and
                  Mengjie Zhang and
                  David G. Green and
                  Victor Ciesielski and
                  Hussein A. Abbass and
                  Zbigniew Michalewicz and
                  Tim Hendtlass and
                  Kalyanmoy Deb and
                  Kay Chen Tan and
                  J{\"{u}}rgen Branke and
                  Yuhui Shi},
  title        = {Multi-objective Improvement of Software Using Co-evolution and Smart
                  Seeding},
  booktitle    = {Simulated Evolution and Learning, 7th International Conference, {SEAL}
                  2008, Melbourne, Australia, December 7-10, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5361},
  pages        = {61--70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89694-4\_7},
  doi          = {10.1007/978-3-540-89694-4\_7},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seal/ArcuriWCY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seal/LimCCR08,
  author       = {Yow Tzu Lim and
                  Pau{-}Chen Cheng and
                  John Andrew Clark and
                  Pankaj Rohatgi},
  editor       = {Xiaodong Li and
                  Michael Kirley and
                  Mengjie Zhang and
                  David G. Green and
                  Victor Ciesielski and
                  Hussein A. Abbass and
                  Zbigniew Michalewicz and
                  Tim Hendtlass and
                  Kalyanmoy Deb and
                  Kay Chen Tan and
                  J{\"{u}}rgen Branke and
                  Yuhui Shi},
  title        = {Policy Evolution with Grammatical Evolution},
  booktitle    = {Simulated Evolution and Learning, 7th International Conference, {SEAL}
                  2008, Melbourne, Australia, December 7-10, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5361},
  pages        = {71--80},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89694-4\_8},
  doi          = {10.1007/978-3-540-89694-4\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seal/LimCCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/Estevez-TapiadorCC07,
  author       = {Juan M. Est{\'{e}}vez{-}Tapiador and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  John A. Clark},
  title        = {Heuristic search for non-linear cryptanalytic approximations},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2007, 25-28 September 2007, Singapore},
  pages        = {3561--3568},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CEC.2007.4424934},
  doi          = {10.1109/CEC.2007.4424934},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cec/Estevez-TapiadorCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/PouldingEBC07,
  author       = {Simon M. Poulding and
                  Paul Emberson and
                  Iain Bate and
                  John A. Clark},
  title        = {An Efficient Experimental Methodology for Configuring Search-Based
                  Design Algorithms},
  booktitle    = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering
                  {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}},
  pages        = {53--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HASE.2007.27},
  doi          = {10.1109/HASE.2007.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/PouldingEBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Estevez-TapiadorCC07,
  author       = {Juan M. Est{\'{e}}vez{-}Tapiador and
                  John A. Clark and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro},
  editor       = {Steven D. Galbraith},
  title        = {Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations
                  to S-Boxes},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {99--117},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_7},
  doi          = {10.1007/978-3-540-77272-9\_7},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Estevez-TapiadorCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ec/MasseyCS06,
  author       = {Paul Massey and
                  John A. Clark and
                  Susan Stepney},
  title        = {Human-Competitive Evolution of Quantum Computing Artefacts by Genetic
                  Programming},
  journal      = {Evol. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {21--40},
  year         = {2006},
  url          = {https://doi.org/10.1162/evco.2006.14.1.21},
  doi          = {10.1162/EVCO.2006.14.1.21},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ec/MasseyCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/StepneyBCTASAJTWMP06,
  author       = {Susan Stepney and
                  Samuel L. Braunstein and
                  John A. Clark and
                  Andrew M. Tyrrell and
                  Andrew Adamatzky and
                  Robert E. Smith and
                  Thomas R. Addis and
                  Colin G. Johnson and
                  Jonathan Timmis and
                  Peter H. Welch and
                  Robin Milner and
                  Derek Partridge},
  title        = {Journeys in non-classical computation {II:} initial journeys and waypoints},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {21},
  number       = {2},
  pages        = {97--125},
  year         = {2006},
  url          = {https://doi.org/10.1080/17445760500355454},
  doi          = {10.1080/17445760500355454},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/StepneyBCTASAJTWMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/PolackSKC06,
  author       = {Fiona Polack and
                  Thitima Srivatanakul and
                  Tim Kelly and
                  John A. Clark},
  editor       = {R{\'{e}}gine Laleau and
                  Michel Lemoine},
  title        = {Deviational Analyses for Validating Regulations on Real Systems},
  booktitle    = {Proceedings of the CAISE*06 Workshop on Regulations Modelling and
                  their Validation and Verification ReMo2V '06, Luxemburg, June 5-9,
                  2006},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {241},
  publisher    = {CEUR-WS.org},
  year         = {2006},
  url          = {https://ceur-ws.org/Vol-241/paper5.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:33 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/PolackSKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ClarkS06,
  author       = {John A. Clark and
                  Susan Stepney},
  title        = {Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using
                  Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational
                  Range},
  booktitle    = {{IEEE} International Conference on Evolutionary Computation, {CEC}
                  2006, part of {WCCI} 2006, Vancouver, BC, Canada, 16-21 July 2006},
  pages        = {200--206},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CEC.2006.1688309},
  doi          = {10.1109/CEC.2006.1688309},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cec/ClarkS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ChenCJ06,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy Jacob},
  editor       = {Mike Cattolico},
  title        = {Human competitive security protocols synthesis},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings,
                  Seattle, Washington, USA, July 8-12, 2006},
  pages        = {1855--1856},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143997.1144297},
  doi          = {10.1145/1143997.1144297},
  timestamp    = {Wed, 27 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ChenCJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ZhanC06,
  author       = {Yuan Zhan and
                  John A. Clark},
  editor       = {Mike Cattolico},
  title        = {The state problem for test generation in Simulink},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings,
                  Seattle, Washington, USA, July 8-12, 2006},
  pages        = {1941--1948},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143997.1144319},
  doi          = {10.1145/1143997.1144319},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ZhanC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spc/2006,
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666},
  doi          = {10.1007/11734666},
  isbn         = {3-540-33376-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/ClarkJS05,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney},
  title        = {The Design of S-Boxes by Simulated Annealing},
  journal      = {New Gener. Comput.},
  volume       = {23},
  number       = {3},
  pages        = {219--231},
  year         = {2005},
  url          = {https://doi.org/10.1007/BF03037656},
  doi          = {10.1007/BF03037656},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/ClarkJS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/StepneyBCTASAJTWMP05,
  author       = {Susan Stepney and
                  Samuel L. Braunstein and
                  John A. Clark and
                  Andrew M. Tyrrell and
                  Andrew Adamatzky and
                  Robert E. Smith and
                  Tom Addis and
                  Colin G. Johnson and
                  Jonathan Timmis and
                  Peter H. Welch and
                  Robin Milner and
                  Derek Partridge},
  title        = {Journeys in non-classical computation {I:} {A} grand challenge for
                  computing research},
  journal      = {Parallel Algorithms Appl.},
  volume       = {20},
  number       = {1},
  pages        = {5--19},
  year         = {2005},
  url          = {https://doi.org/10.1080/17445760500033291},
  doi          = {10.1080/17445760500033291},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/StepneyBCTASAJTWMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ZhanC05,
  author       = {Yuan Zhan and
                  John A. Clark},
  editor       = {Hans{-}Georg Beyer and
                  Una{-}May O'Reilly},
  title        = {Search-based mutation testing for \emph{Simulink} models},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2005, Proceedings,
                  Washington DC, USA, June 25-29, 2005},
  pages        = {1061--1068},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1068009.1068188},
  doi          = {10.1145/1068009.1068188},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ZhanC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/MasseyCS05,
  author       = {Paul Massey and
                  John A. Clark and
                  Susan Stepney},
  editor       = {Hans{-}Georg Beyer and
                  Una{-}May O'Reilly},
  title        = {Evolution of a human-competitive quantum fourier transform algorithm
                  using genetic programming},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2005, Proceedings,
                  Washington DC, USA, June 25-29, 2005},
  pages        = {1657--1663},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1068009.1068288},
  doi          = {10.1145/1068009.1068288},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/MasseyCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/LiuCS05,
  author       = {Yang Liu and
                  John A. Clark and
                  Susan Stepney},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {"Devices Are People Too" Using Process Patterns to Elicit
                  Security Requirements in Novel Domains: {A} Ubiquitous Healthcare
                  Example},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_4},
  doi          = {10.1007/978-3-540-32004-3\_4},
  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/LiuCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ClarkSC05,
  author       = {John A. Clark and
                  Susan Stepney and
                  Howard Chivers},
  editor       = {John Derrick and
                  Eerke A. Boiten},
  title        = {Breaking the Model: Finalisation and a Taxonomy of Security Attacks},
  booktitle    = {Proceedings of the {REFINE} 2005 Workshop, {REFINE} 2005, Guildford,
                  UK, April 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {137},
  number       = {2},
  pages        = {225--242},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.04.033},
  doi          = {10.1016/J.ENTCS.2005.04.033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/ClarkSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/ClarkJMS04,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Subhamoy Maitra and
                  Pantelimon Stanica},
  title        = {Almost Boolean Functions: The Design of Boolean Functions by Spectral
                  Inversion},
  journal      = {Comput. Intell.},
  volume       = {20},
  number       = {3},
  pages        = {450--462},
  year         = {2004},
  url          = {https://doi.org/10.1111/j.0824-7935.2004.00245.x},
  doi          = {10.1111/J.0824-7935.2004.00245.X},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/ClarkJMS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/ChenCJ04,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy L. Jacob},
  title        = {Automated Design of Security Protocols},
  journal      = {Comput. Intell.},
  volume       = {20},
  number       = {3},
  pages        = {503--516},
  year         = {2004},
  url          = {https://doi.org/10.1111/j.0824-7935.2004.00249.x},
  doi          = {10.1111/J.0824-7935.2004.00249.X},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/ChenCJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChiversC04,
  author       = {Howard Chivers and
                  John A. Clark},
  title        = {Smart dust, friend or foe?--Replacing identity with configuration
                  trust},
  journal      = {Comput. Networks},
  volume       = {46},
  number       = {5},
  pages        = {723--740},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comnet.2004.06.002},
  doi          = {10.1016/J.COMNET.2004.06.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChiversC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/BrookePCS04,
  author       = {Phillip J. Brooke and
                  Richard F. Paige and
                  John A. Clark and
                  Susan Stepney},
  title        = {Playing the game: cheating, loopholes, and virtual identity},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {34},
  number       = {2},
  pages        = {3},
  year         = {2004},
  url          = {https://doi.org/10.1145/1052791.1052794},
  doi          = {10.1145/1052791.1052794},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/BrookePCS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/ClarkHH04,
  author       = {John A. Clark and
                  Mark Harman and
                  Robert M. Hierons},
  title        = {Editorial: Software testing in the United Kingdom},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {14},
  number       = {3},
  pages        = {165--166},
  year         = {2004},
  url          = {https://doi.org/10.1002/stvr.302},
  doi          = {10.1002/STVR.302},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stvr/ClarkHH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ClarkJS04,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney},
  title        = {Searching for cost functions},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2004, 19-23 June 2004, Portland, OR, {USA}},
  pages        = {1517--1524},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/CEC.2004.1331076},
  doi          = {10.1109/CEC.2004.1331076},
  timestamp    = {Thu, 16 Dec 2021 13:58:46 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/ClarkJS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ClarkJS04a,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney},
  title        = {The design of s-boxes by simulated annealing},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2004, 19-23 June 2004, Portland, OR, {USA}},
  pages        = {1533--1537},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/CEC.2004.1331078},
  doi          = {10.1109/CEC.2004.1331078},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cec/ClarkJS04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/StanicaMC04,
  author       = {Pantelimon Stanica and
                  Subhamoy Maitra and
                  John A. Clark},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Results on Rotation Symmetric Bent and Correlation Immune Boolean
                  Functions},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_11},
  doi          = {10.1007/978-3-540-25937-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/StanicaMC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/MasseyCS04,
  author       = {Paul Massey and
                  John A. Clark and
                  Susan Stepney},
  editor       = {Kalyanmoy Deb and
                  Riccardo Poli and
                  Wolfgang Banzhaf and
                  Hans{-}Georg Beyer and
                  Edmund K. Burke and
                  Paul J. Darwen and
                  Dipankar Dasgupta and
                  Dario Floreano and
                  James A. Foster and
                  Mark Harman and
                  Owen Holland and
                  Pier Luca Lanzi and
                  Lee Spector and
                  Andrea Tettamanzi and
                  Dirk Thierens and
                  Andrew M. Tyrrell},
  title        = {Evolving Quantum Circuits and Programs Through Genetic Programming},
  booktitle    = {Genetic and Evolutionary Computation - {GECCO} 2004, Genetic and Evolutionary
                  Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3103},
  pages        = {569--580},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24855-2\_66},
  doi          = {10.1007/978-3-540-24855-2\_66},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/MasseyCS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ZhanC04,
  author       = {Yuan Zhan and
                  John A. Clark},
  editor       = {Kalyanmoy Deb and
                  Riccardo Poli and
                  Wolfgang Banzhaf and
                  Hans{-}Georg Beyer and
                  Edmund K. Burke and
                  Paul J. Darwen and
                  Dipankar Dasgupta and
                  Dario Floreano and
                  James A. Foster and
                  Mark Harman and
                  Owen Holland and
                  Pier Luca Lanzi and
                  Lee Spector and
                  Andrea Tettamanzi and
                  Dirk Thierens and
                  Andrew M. Tyrrell},
  title        = {Search Based Automatic Test-Data Generation at an Architectural Level},
  booktitle    = {Genetic and Evolutionary Computation - {GECCO} 2004, Genetic and Evolutionary
                  Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3103},
  pages        = {1413--1424},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24855-2\_161},
  doi          = {10.1007/978-3-540-24855-2\_161},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/ZhanC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SrivatanakulCP04,
  author       = {Thitima Srivatanakul and
                  John A. Clark and
                  Fiona Polack},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Effective Security Requirements Analysis: {HAZOP} and Use Cases},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {416--427},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_35},
  doi          = {10.1007/978-3-540-30144-8\_35},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SrivatanakulCP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metrics/HarmanC04,
  author       = {Mark Harman and
                  John A. Clark},
  title        = {Metrics Are Fitness Functions Too},
  booktitle    = {10th {IEEE} International Software Metrics Symposium {(METRICS} 2004),
                  11-17 September 2004, Chicago, IL, {USA}},
  pages        = {58--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/METRIC.2004.1357891},
  doi          = {10.1109/METRIC.2004.1357891},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/metrics/HarmanC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/HaoCJ05,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy L. Jacob},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Synthesising Efficient and Effective Security Protocols},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {25--41},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.017},
  doi          = {10.1016/J.ENTCS.2004.05.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/HaoCJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/ClarkeDHHJLMMRRS03,
  author       = {John A. Clark and
                  Jos{\'{e}} Javier Dolado and
                  Mark Harman and
                  Robert M. Hierons and
                  Bryan F. Jones and
                  M. Lumkin and
                  Brian S. Mitchell and
                  Spiros Mancoridis and
                  K. Rees and
                  Marc Roper and
                  Martin J. Shepperd},
  title        = {Formulating software engineering as a search problem},
  journal      = {{IEE} Proc. Softw.},
  volume       = {150},
  number       = {3},
  pages        = {161--175},
  year         = {2003},
  url          = {https://doi.org/10.1049/ip-sen:20030559},
  doi          = {10.1049/IP-SEN:20030559},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iee/ClarkeDHHJLMMRRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/SrivatanakulCSP03,
  author       = {Thitima Srivatanakul and
                  John A. Clark and
                  Susan Stepney and
                  Fiona Polack},
  title        = {Challenging Formal Specifications by Mutation: a {CSP} security example},
  booktitle    = {10th Asia-Pacific Software Engineering Conference {(APSEC} 2003),
                  10-12 December 2003, Chiang Mai, Thailand},
  pages        = {340},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/APSEC.2003.1254388},
  doi          = {10.1109/APSEC.2003.1254388},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/SrivatanakulCSP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/Clark03,
  author       = {John A. Clark},
  title        = {Nature-inspired cryptography: past, present and future},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2003, Canberra, Australia, December 8-12, 2003},
  pages        = {1647--1654},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/CEC.2003.1299870},
  doi          = {10.1109/CEC.2003.1299870},
  timestamp    = {Thu, 16 Dec 2021 11:43:24 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/Clark03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ClarkJMS03,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Subhamoy Maitra and
                  Pantelimon Stanica},
  title        = {Almost Boolean functions: the design of Boolean functions by spectral
                  inversion},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2003, Canberra, Australia, December 8-12, 2003},
  pages        = {2173--2180},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/CEC.2003.1299941},
  doi          = {10.1109/CEC.2003.1299941},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/ClarkJMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/0032CJ03,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy L. Jacob},
  title        = {Automated design of security protocols},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2003, Canberra, Australia, December 8-12, 2003},
  pages        = {2181--2188},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/CEC.2003.1299942},
  doi          = {10.1109/CEC.2003.1299942},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/0032CJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/RussellCS03,
  author       = {Matthew D. Russell and
                  John A. Clark and
                  Susan Stepney},
  title        = {Making the most of two heuristics: breaking transposition ciphers
                  with ants},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2003, Canberra, Australia, December 8-12, 2003},
  pages        = {2653--2658},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/CEC.2003.1299423},
  doi          = {10.1109/CEC.2003.1299423},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/RussellCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/RussellCS03,
  author       = {Matthew D. Russell and
                  John A. Clark and
                  Susan Stepney},
  editor       = {Erick Cant{\'{u}}{-}Paz and
                  James A. Foster and
                  Kalyanmoy Deb and
                  Lawrence Davis and
                  Rajkumar Roy and
                  Una{-}May O'Reilly and
                  Hans{-}Georg Beyer and
                  Russell K. Standish and
                  Graham Kendall and
                  Stewart W. Wilson and
                  Mark Harman and
                  Joachim Wegener and
                  Dipankar Dasgupta and
                  Mitchell A. Potter and
                  Alan C. Schultz and
                  Kathryn A. Dowsland and
                  Natasa Jonoska and
                  Julian F. Miller},
  title        = {Using Ants to Attack a Classical Cipher},
  booktitle    = {Genetic and Evolutionary Computation - {GECCO} 2003, Genetic and Evolutionary
                  Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2723},
  pages        = {146--147},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45105-6\_16},
  doi          = {10.1007/3-540-45105-6\_16},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/RussellCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ClarkJS03,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney},
  editor       = {Erick Cant{\'{u}}{-}Paz and
                  James A. Foster and
                  Kalyanmoy Deb and
                  Lawrence Davis and
                  Rajkumar Roy and
                  Una{-}May O'Reilly and
                  Hans{-}Georg Beyer and
                  Russell K. Standish and
                  Graham Kendall and
                  Stewart W. Wilson and
                  Mark Harman and
                  Joachim Wegener and
                  Dipankar Dasgupta and
                  Mitchell A. Potter and
                  Alan C. Schultz and
                  Kathryn A. Dowsland and
                  Natasa Jonoska and
                  Julian F. Miller},
  title        = {Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor,
                  and Why You Might Not Get Away with It},
  booktitle    = {Genetic and Evolutionary Computation - {GECCO} 2003, Genetic and Evolutionary
                  Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2724},
  pages        = {2022--2033},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45110-2\_100},
  doi          = {10.1007/3-540-45110-2\_100},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/ClarkJS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaris/StepneyCJPS03,
  author       = {Susan Stepney and
                  John A. Clark and
                  Colin G. Johnson and
                  Derek Partridge and
                  Robert E. Smith},
  editor       = {Jon Timmis and
                  Peter J. Bentley and
                  Emma Hart},
  title        = {Artificial Immune Systems and the Grand Challenge for Non-classical
                  Computation},
  booktitle    = {Artificial Immune Systems, Second International Conference, {ICARIS}
                  2003, Edinburgh, UK, September 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2787},
  pages        = {204--216},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45192-1\_20},
  doi          = {10.1007/978-3-540-45192-1\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaris/StepneyCJPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/ChiversCS03,
  author       = {Howard Chivers and
                  John A. Clark and
                  Susan Stepney},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Smart Devices and Software Agents: The Basics of Good Behaviour},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {39--52},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_7},
  doi          = {10.1007/978-3-540-39881-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/ChiversCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BowenBCHHK02,
  author       = {Jonathan P. Bowen and
                  Kirill Bogdanov and
                  John A. Clark and
                  Mark Harman and
                  Robert M. Hierons and
                  Paul J. Krause},
  title        = {{FORTEST:} Formal Methods and Testing},
  booktitle    = {26th International Computer Software and Applications Conference {(COMPSAC}
                  2002), Prolonging Software Life: Development and Redevelopment, 26-29
                  August 2002, Oxford, England, Proceedings},
  pages        = {91--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CMPSAC.2002.1044538},
  doi          = {10.1109/CMPSAC.2002.1044538},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/BowenBCHHK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ClarkJ02,
  author       = {John A. Clark and
                  Jeremy L. Jacob},
  editor       = {Lars R. Knudsen},
  title        = {Fault Injection and a Timing Channel on an Analysis Technique},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_12},
  doi          = {10.1007/3-540-46035-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ClarkJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ClarkJSMM02,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney and
                  Subhamoy Maitra and
                  William Millan},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Evolving Boolean Functions Satisfying Multiple Criteria},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {246--259},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_20},
  doi          = {10.1007/3-540-36231-2\_20},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ClarkJSMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/ClarkJ01,
  author       = {John A. Clark and
                  Jeremy L. Jacob},
  title        = {Protocols are programs too: the meta-heuristic search for security
                  protocols},
  journal      = {Inf. Softw. Technol.},
  volume       = {43},
  number       = {14},
  pages        = {891--904},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0950-5849(01)00195-1},
  doi          = {10.1016/S0950-5849(01)00195-1},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/ClarkJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/KimCM01,
  author       = {Sun{-}Woo Kim and
                  John A. Clark and
                  John A. McDermid},
  title        = {Investigating the effectiveness of object-oriented testing strategies
                  using the mutation method},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {11},
  number       = {3},
  pages        = {207--225},
  year         = {2001},
  url          = {https://doi.org/10.1002/stvr.238},
  doi          = {10.1002/STVR.238},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/stvr/KimCM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/TraceyCMM00,
  author       = {Nigel J. Tracey and
                  John A. Clark and
                  Keith Mander and
                  John A. McDermid},
  title        = {Automated test-data generation for exception conditions},
  journal      = {Softw. Pract. Exp.},
  volume       = {30},
  number       = {1},
  pages        = {61--79},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1097-024X(200001)30:1\&\#60;61::AID-SPE292\&\#62;3.0.CO;2-9},
  doi          = {10.1002/(SICI)1097-024X(200001)30:1\&\#60;61::AID-SPE292\&\#62;3.0.CO;2-9},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spe/TraceyCMM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ClarkJ00,
  author       = {John A. Clark and
                  Jeremy Jacob},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Two-Stage Optimisation in the Design of Boolean Functions},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {242--254},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_20},
  doi          = {10.1007/10718964\_20},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ClarkJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ClarkJ00,
  author       = {John A. Clark and
                  Jeremy L. Jacob},
  title        = {Searching for a Solution: Engineering Tradeoffs and the Evolution
                  of Provably Secure Protocols},
  booktitle    = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 14-17, 2000},
  pages        = {82--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SECPRI.2000.848447},
  doi          = {10.1109/SECPRI.2000.848447},
  timestamp    = {Thu, 21 Sep 2023 15:57:29 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ClarkJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/ButtleCMST99,
  author       = {Darren Lee Buttle and
                  John A. Clark and
                  John A. McDermid and
                  Alan Stephenson and
                  Nigel James Tracey},
  title        = {{CONVERSE:} {A} change-oriented process for engine controllers},
  journal      = {{IEE} Proc. Softw.},
  volume       = {146},
  number       = {3},
  pages        = {130--136},
  year         = {1999},
  url          = {https://doi.org/10.1049/ip-sen:19990612},
  doi          = {10.1049/IP-SEN:19990612},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iee/ButtleCMST99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/McDermidGBCTTV98,
  author       = {John A. McDermid and
                  Andy Galloway and
                  Simon Burton and
                  John A. Clark and
                  Ian Toyn and
                  Nigel J. Tracey and
                  Samuel H. Valentine},
  title        = {Towards Industrially Applicable Formal Methods: Three Small Steps
                  and One Giant Leap},
  booktitle    = {Second {IEEE} International Conference on Formal Engineering Methods,
                  {ICFEM} 1998, Brisbane, Queensland, Australia, December 9-11, 1998,
                  Proceedings},
  pages        = {76--89},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICFEM.1998.730572},
  doi          = {10.1109/ICFEM.1998.730572},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfem/McDermidGBCTTV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/TraceyCM98,
  author       = {Nigel J. Tracey and
                  John A. Clark and
                  Keith Mander},
  editor       = {Mary Lou Soffa and
                  Michal Young and
                  Will Tracz},
  title        = {Automated Program Flaw Finding Using Simulated Annealing},
  booktitle    = {Proceedings of {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, {ISSTA} 1998, Clearwater Beach, Florida, USA,
                  March 2-5, 1998},
  pages        = {73--81},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/271771.271792},
  doi          = {10.1145/271771.271792},
  timestamp    = {Mon, 31 Jan 2022 15:15:10 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/TraceyCM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/TraceyCMM98,
  author       = {Nigel J. Tracey and
                  John A. Clark and
                  Keith Mander and
                  John A. McDermid},
  title        = {An Automated Framework for Structural Test-Data Generation},
  booktitle    = {The Thirteenth {IEEE} Conference on Automated Software Engineering,
                  {ASE} 1998, Honolulu, Hawaii, USA, October 13-16, 1998},
  pages        = {285--288},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ASE.1998.732680},
  doi          = {10.1109/ASE.1998.732680},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/TraceyCMM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ClarkJ95,
  author       = {John A. Clark and
                  Jeremy Jacob},
  title        = {On the Security of Recent Protocols},
  journal      = {Inf. Process. Lett.},
  volume       = {56},
  number       = {3},
  pages        = {151--155},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(95)00136-Z},
  doi          = {10.1016/0020-0190(95)00136-Z},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ClarkJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/TindellC94,
  author       = {Ken Tindell and
                  John A. Clark},
  title        = {Holistic schedulability analysis for distributed hard real-time systems},
  journal      = {Microprocess. Microprogramming},
  volume       = {40},
  number       = {2-3},
  pages        = {117--134},
  year         = {1994},
  url          = {https://doi.org/10.1016/0165-6074(94)90080-9},
  doi          = {10.1016/0165-6074(94)90080-9},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/TindellC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics