


Остановите войну!
for scientists:


default search action
Sadie Creese
S. J. Creese
Person information

- affiliation: University of Oxford, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j32]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - [j31]Ruth Shillair
, Patricia Esteve-González, William H. Dutton, Sadie Creese, Eva Nagyfejeo, Basie von Solms:
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Comput. Secur. 119: 102756 (2022) - [j30]Arnau Erola
, Ioannis Agrafiotis, Michael Goldsmith
, Sadie Creese:
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations. J. Inf. Secur. Appl. 67: 103167 (2022) - 2021
- [j29]Jongkil Jay Jeong
, Gillian C. Oliver, Eunsuk Kang, Sadie Creese, Peter Thomas:
The current state of research on people, culture and cybersecurity. Pers. Ubiquitous Comput. 25(5): 809-812 (2021) - [j28]Sadie Creese
, William H. Dutton
, Patricia Esteve-González
:
The social and cultural shaping of cybersecurity capacity building: a comparative study of nations and regions. Pers. Ubiquitous Comput. 25(5): 941-955 (2021) - [j27]Louise Axon
, Jassim Happa
, Alastair Janse van Rensburg
, Michael Goldsmith
, Sadie Creese:
Sonification to Support the Monitoring Tasks of Security Operations Centres. IEEE Trans. Dependable Secur. Comput. 18(3): 1227-1244 (2021) - [c65]Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. ARES 2021: 87:1-87:10 - [c64]Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. ARES 2021: 91:1-91:10 - [i11]Gregory Falco, Paul Cornish, Sadie Creese, Madeline Carr, Myriam Dunn Cavelty, Claudia Eckert, Herbert Lin, Gen Goto, Jamie Saunders, Andrew Grotto, Howard E. Shrobe, Sean Kanuck, Lawrence Susskind, Arvind Parthasarathi:
Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance. CoRR abs/2107.14065 (2021) - 2020
- [j26]Selina Y. Cho, Jassim Happa
, Sadie Creese:
Capturing Tacit Knowledge in Security Operation Centers. IEEE Access 8: 42021-42041 (2020) - [j25]Carsten Rudolph
, Sadie Creese, Sameer Sharma:
Cybersecurity in Pacific Island nations. Commun. ACM 63(4): 53-54 (2020) - [j24]Louise Axon
, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice. J. Cybersecur. 6(1): tyaa004 (2020) - [c63]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [i10]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020)
2010 – 2019
- 2019
- [j23]Jassim Happa
, Thomas Bashford-Rogers, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Anomaly Detection Using Pattern-of-Life Visual Metaphors. IEEE Access 7: 154018-154034 (2019) - [j22]Meredydd Williams
, Jason R. C. Nurse, Sadie Creese:
Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Comput. Hum. Behav. 99: 38-54 (2019) - [j21]Louise Axon
, Jassim Happa, Michael Goldsmith, Sadie Creese:
Hearing attacks in network data: An effectiveness study. Comput. Secur. 83: 367-388 (2019) - [j20]Rodrigo Carvalho
, Michael Goldsmith, Sadie Creese:
Investigating Malware Campaigns With Semantic Technologies. IEEE Secur. Priv. 17(1): 43-54 (2019) - [j19]Meredydd Williams, Jason R. C. Nurse
, Sadie Creese:
(Smart)Watch Out! encouraging privacy-protective behavior through interactive games. Int. J. Hum. Comput. Stud. 132: 121-137 (2019) - [c62]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Analysing cyber-insurance claims to design harm-propagation trees. CyberSA 2019: 1-4 - [c61]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing. Cyber Security 2019: 1-9 - [c60]Arianna Schuler Scott
, Michael Goldsmith, Harriet Teare, Helena Webb
, Sadie Creese:
Why We Trust Dynamic Consent to Deliver on Privacy. IFIPTM 2019: 28-38 - [i9]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. CoRR abs/1905.05222 (2019) - 2018
- [j18]Louise Axon
, Michael Goldsmith, Sadie Creese:
Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain. Adv. Comput. 111: 229-278 (2018) - [j17]Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton:
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1): tyy006 (2018) - [j16]Cheyenne Atapour, Ioannis Agrafiotis, Sadie Creese:
Modeling Advanced Persistent Threats to enhance anomaly detection techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 71-102 (2018) - [c59]Jassim Happa, Nick Moffat, Michael Goldsmith, Sadie Creese:
Run-Time Monitoring of Data-Handling Violations. CyberICPS/SECPRE@ESORICS 2018: 213-232 - [c58]Haozhe Zhang, Ioannis Agrafiotis, Arnau Erola, Sadie Creese, Michael Goldsmith:
A State Machine System for Insider Threat Detection. GraMSec@FLoC 2018: 111-129 - [i8]Jason R. C. Nurse, Petar Radanliev, Sadie Creese, David De Roure:
If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. CoRR abs/1806.10906 (2018) - [i7]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future Scenarios and Challenges for Security and Privacy. CoRR abs/1807.05746 (2018) - [i6]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. CoRR abs/1807.05754 (2018) - [i5]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy Salience: Taxonomies and Research Opportunities. CoRR abs/1807.05756 (2018) - [i4]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
"Privacy is the Boring Bit": User Perceptions and Behaviour in the Internet-of-Things. CoRR abs/1807.05761 (2018) - [i3]Louise M. Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Sonification in security operations centres: what do security practitioners think? CoRR abs/1807.06706 (2018) - [i2]Aastha Madaan, Jason R. C. Nurse, David De Roure, Kieron O'Hara, Wendy Hall, Sadie Creese:
A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines. CoRR abs/1809.05904 (2018) - [i1]Jason R. C. Nurse, Sadie Creese, David De Roure:
Security Risk Assessment in Internet of Things Systems. CoRR abs/1811.03290 (2018) - 2017
- [j15]Jason R. C. Nurse, Sadie Creese, David De Roure
:
Security Risk Assessment in Internet of Things Systems. IT Prof. 19(5): 20-26 (2017) - [j14]Daniel W. Woods
, Ioannis Agrafiotis, Jason R. C. Nurse
, Sadie Creese:
Mapping the coverage of security controls in cyber insurance proposal forms. J. Internet Serv. Appl. 8(1): 8:1-8:13 (2017) - [j13]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
Formalising Policies for Insider-threat Detection: A Tripwire Grammar. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 26-43 (2017) - [j12]Philip A. Legg, Oliver Buckley
, Michael Goldsmith, Sadie Creese:
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Syst. J. 11(2): 503-512 (2017) - [c57]Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg
:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. CyberSA 2017: 1-8 - [c56]Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. HCI (22) 2017: 366-383 - [c55]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-Things. PST 2017: 181-190 - 2016
- [j11]Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Analytics for characterising and measuring the naturalness of online personae. Secur. Informatics 5(1): 3 (2016) - [c54]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
The Perfect Storm: The Privacy Paradox and the Internet-of-Things. ARES 2016: 644-652 - [c53]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
A Tripwire Grammar for Insider Threat Detection. MIST@CCS 2016: 105-108 - [c52]Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
A Pragmatic System-failure Assessment and Response Model. ICISSP 2016: 503-508 - [c51]Meredydd Williams, Jason R. C. Nurse, Sadie Creese:
Privacy Salience: Taxonomies and Research Opportunities. Privacy and Identity Management 2016: 263-278 - [c50]Meredydd Williams, Louise Axon, Jason R. C. Nurse, Sadie Creese:
Future scenarios and challenges for security and privacy. RTSI 2016: 1-6 - [c49]Ioannis Agrafiotis, Arnau Erola, Jassim Happa, Michael Goldsmith, Sadie Creese:
Validating an Insider Threat Detection System: A Real Scenario Perspective. IEEE Symposium on Security and Privacy Workshops 2016: 286-295 - 2015
- [j10]Monica T. Whitty
, James Doodson, Sadie Creese, Duncan Hodges
:
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords. Cyberpsychology Behav. Soc. Netw. 18(1): 3-7 (2015) - [j9]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
An overview of insider attacks in cloud computing. Concurr. Comput. Pract. Exp. 27(12): 2964-2981 (2015) - [j8]Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese:
Investigating the leakage of sensitive personal and organisational information in email headers. J. Internet Serv. Inf. Secur. 5(1): 70-84 (2015) - [c48]Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, Koen Lamberts:
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content. CIT/IUCC/DASC/PICom 2015: 461-468 - [c47]Rodrigo Carvalho
, Michael Goldsmith, Sadie Creese:
Applying Semantic Technologies to Fight Online Banking Fraud. EISIC 2015: 61-68 - [c46]Matthieu Devlin, Jason R. C. Nurse, Duncan Hodges
, Michael Goldsmith, Sadie Creese:
Predicting Graphical Passwords. HCI (22) 2015: 23-35 - [c45]Jason R. C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. SIoT 2015: 5-14 - 2014
- [j7]Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. J. Internet Serv. Inf. Secur. 4(4): 1-13 (2014) - [j6]Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. J. Internet Serv. Inf. Secur. 4(4): 127-137 (2014) - [j5]Joseph Bruce, Jean Scholtz, Duncan Hodges
, Lia R. Emanuel, Danaë Stanton Fraser
, Sadie Creese, Oriana Love:
Pathways to identity: using visualization to aid law enforcement in identification tasks. Secur. Informatics 3(1): 12 (2014) - [c44]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty
, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - [c43]Monica T. Whitty
, James Doodson, Sadie Creese, Duncan Hodges
:
Image Choice to Represent the Self in Different Online Environments. HCI (22) 2014: 528-537 - [c42]Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Inferring social relationships from technology-level device connections. PST 2014: 40-47 - [c41]Jason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty
:
Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Symposium on Security and Privacy Workshops 2014: 214-228 - [c40]Oliver Buckley
, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. STAST 2014: 8-15 - 2013
- [j4]Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 20-37 (2013) - [c39]Duncan Hodges
, Sadie Creese:
Breaking the Arc: Risk control for Big Data. IEEE BigData 2013: 613-621 - [c38]Sadie Creese, Duncan Hodges
, Sue Jamison-Powell, Monica T. Whitty
:
Relationships between Password Choices, Perceptions of Risk and Security Expertise. HCI (27) 2013: 80-89 - [c37]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman:
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics. HCI (27) 2013: 316-325 - [c36]Duncan Hodges
, Sadie Creese:
Building a better intelligence machine: A new approach to capability review and development. ISI 2013: 113-115 - [c35]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Communicating trustworthiness using radar graphs: A detailed look. PST 2013: 333-339 - [c34]James Nicholls, Dominik Peters, Albert Slawinski, Thomas Spoor, Sergiu Vicol, Jassim Happa, Michael Goldsmith, Sadie Creese:
NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data. TPCG 2013: 9-16 - [c33]Adrian J. Duncan, Sadie Creese, Michael Goldsmith, Jamie S. Quinton
:
Cloud Computing: Insider Attacks on Virtual Machines during Migration. TrustCom/ISPA/IUCC 2013: 493-500 - [c32]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. TrustCom/ISPA/IUCC 2013: 535-543 - 2012
- [j3]Nikolaos Papanikolaou, Sadie Creese, Michael Goldsmith:
Refinement checking for privacy policies. Sci. Comput. Program. 77(10-11): 1198-1209 (2012) - [j2]Jennifer T. Jackson, Sadie Creese:
Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors. IEEE Trans. Dependable Secur. Comput. 9(6): 930-943 (2012) - [c31]Adedayo Oyelakin Adetoye, Sadie Creese, Michael Goldsmith:
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment. CRITIS 2012: 155-167 - [c30]Duncan Hodges
, Sadie Creese, Michael Goldsmith:
A Model for Identity in the Cyber and Natural Universes. EISIC 2012: 115-122 - [c29]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Rachel Craddock, Glyn Jones:
An initial usability evaluation of the secure situation awareness system. ISCRAM 2012 - [c28]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Using Information Trustworthiness Advice in Decision Making. STAST 2012: 35-42 - [c27]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
Insider Attacks in Cloud Computing. TrustCom 2012: 857-862 - [c26]Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips
:
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. TrustCom 2012: 1124-1131 - 2011
- [c25]Jennifer T. Jackson, Sadie Creese, Mark S. Leeson
:
Biodiversity: A security approach for ad hoc networks. CICS 2011: 186-193 - [c24]Adedayo Oyelakin Adetoye, Michael Goldsmith, Sadie Creese:
Analysis of Dependencies in Critical Infrastructures. CRITIS 2011: 18-29 - [c23]Sadie Creese, Michael Goldsmith, Adedayo Adetoye:
A logical high-level framework for Critical Infrastructure resilience and risk assessment. CSS 2011: 7-14 - [c22]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Guidelines for usable cybersecurity: Past and present. CSS 2011: 21-26 - [c21]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Developing a Strategy for Automated Privacy Testing Suites. PrimeLife 2011: 32-44 - [c20]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation. PrimeLife 2011: 232-244 - [c19]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Trustworthy and effective communication of cybersecurity risks: A review. STAST 2011: 60-68 - [c18]Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith:
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. STM 2011: 223-238 - 2010
- [c17]M. Auty, Sadie Creese, Michael Goldsmith, Paul Hopkins:
Inadequacies of Current Risk Controls for the Cloud. CloudCom 2010: 659-666 - [c16]Adedayo Adetoye, Sadie Creese, Michael Goldsmith, Paul Hopkins:
A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract. CRITIS 2010: 153-156 - [c15]Marco Casassa Mont, Siani Pearson
, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. PrimeLife 2010: 258-270 - [c14]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. PrimeLife 2010: 271-282 - [c13]Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson:
EnCoRe: Towards a Holistic Approach to Privacy. SECRYPT 2010: 171-176 - [c12]Michael Goldsmith, Sadie Creese:
Refinement-Friendly Bigraphs and Spygraphs. SEFM 2010: 203-207
2000 – 2009
- 2009
- [j1]Sadie Creese, Koen Lamberts:
Can Cognitive Science Help Us Make Online Risk More Tangible?. IEEE Intell. Syst. 24(6): 32-36 (2009) - [c11]Sadie Creese, Paul Hopkins, Siani Pearson
, Yun Shen:
Data Protection-Aware Design for Cloud Services. CloudCom 2009: 119-130 - [c10]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data. PrimeLife 2009: 246-258 - 2008
- [c9]Sadie Creese, Michael Goldsmith:
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design. SASO Workshops 2008: 73-77 - 2006
- [c8]Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao:
Bootstrapping multi-party ad-hoc security. SAC 2006: 369-375 - 2005
- [c7]Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin:
Exploiting Empirical Engagement in Authentication Protocol Design. SPC 2005: 119-133 - 2004
- [c6]Sadie Creese:
Industrial Strength CSP: Opportunities and Challenges in Model-Checking. 25 Years Communicating Sequential Processes 2004: 292-292 - 2003
- [c5]Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin:
Authentication for Pervasive Computing. SPC 2003: 116-129 - 2001
- [b1]S. J. Creese:
Data independent induction : CSP model checking or arbitary sized networks. University of Oxford, UK, 2001 - 2000
- [c4]S. J. Creese, A. W. Roscoe:
Data Independent Induction over Structured Networks. PDPTA 2000
1990 – 1999
- 1999
- [c3]S. J. Creese, A. W. Roscoe:
Verifying an infinite family of inductions simultaneously using data independence and FDR. FORTE 1999: 437-452 - [c2]S. J. Creese, Joy N. Reed:
Verifying End-to-End Protocols using Induction with CSP/FDR. IPPS/SPDP Workshops 1999: 1243-1257 - [c1]S. J. Creese, A. W. Roscoe:
Formal Verification of Arbitrary Network Topologies. PDPTA 1999: 1033-1039
Coauthor Index
Louise Axon
aka: Louise M. Axon
aka: Louise M. Axon
[j32] [j30] [j27] [c65] [c64] [j24] [c63] [i10] [j23] [j21] [j20] [c62] [c61] [c60] [j18] [j17] [c59] [c58] [i3] [j13] [j12] [c57] [c56] [j11] [c53] [c52] [c49] [j9] [j8] [c48] [c47] [c46] [c45] [j7] [j6] [c44] [c42] [c41] [c40] [j4] [c37] [c35] [c34] [c33] [c32] [j3] [c31] [c30] [c29] [c28] [c27] [c26] [c24] [c23] [c22] [c21] [c20] [c19] [c18] [c17] [c16] [c15] [c14] [c13] [c12] [c10] [c9] [c8] [c7] [c5]