default search action
Jeremy W. Bryans
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Giedre Sabaliauskaite, Jeremy W. Bryans, Hesamaldin Jadidbonab, Farhan Ahmad, Siraj A. Shaikh, Paul Wooderson:
TOMSAC - Methodology for trade-off management between automotive safety and cyber security. Comput. Secur. 140: 103798 (2024) - [j14]Sheraz Mazhar, Abdur Rakib, Lei Pan, Frank Jiang, Adnan Anwar, Robin Doss, Jeremy W. Bryans:
State-of-the-art authentication and verification schemes in VANETs: A survey. Veh. Commun. 49: 100804 (2024) - 2023
- [j13]Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh, Jeremy W. Bryans, Charles Wartnaby:
A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j12]Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj Ahmed Shaikh:
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis. Inf. 14(9): 481 (2023) - [j11]Ahmed Nawaz Khan, Jeremy W. Bryans, Giedre Sabaliauskaite, Hesamaldin Jadidbonab:
Integrated Attack Tree in Residual Risk Management Framework. Inf. 14(12): 639 (2023) - [j10]Rhys Kirk, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj Ahmed Shaikh, Charles Wartnaby:
A formal framework for security testing of automotive over-the-air update systems. J. Log. Algebraic Methods Program. 130: 100812 (2023) - 2022
- [c43]Ahmed Nawaz Khan, Jeremy W. Bryans, Giedre Sabaliauskaite:
Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434. ACNS Workshops 2022: 235-247 - 2021
- [j9]Andrew Tomlinson, Jeremy W. Bryans, Siraj Ahmed Shaikh:
Using internal context to detect automotive controller area network attacks. Comput. Electr. Eng. 91: 107048 (2021) - [c42]Rhys Kirk, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh, David Evans, David Price:
Formalising UPTANE in CSP for Security Testing. QRS Companion 2021: 816-824 - 2020
- [j8]Paolo Missier, Jeremy W. Bryans, Carl Gamble, Vasa Curcin:
Abstracting PROV provenance graphs: A validity-preserving approach. Future Gener. Comput. Syst. 111: 352-367 (2020)
2010 – 2019
- 2019
- [c41]John Heneghan, Siraj Ahmed Shaikh, Jeremy W. Bryans, Madeline Cheah, Paul Wooderson:
Enabling Security Checking of Automotive ECUs with Formal CSP Models. DSN Workshops 2019: 90-97 - [c40]Jeremy W. Bryans, Hoang Nga Nguyen, Siraj A. Shaikh:
Attack Defense Trees with Sequential Conjunction. HASE 2019: 247-252 - [c39]Fiona Jennet McNeill, Diana Bental, Jeremy W. Bryans, Paolo Missier, Jannetta S. Steyn, Tom Komar:
Communication in Emergency Management through Data Integration and Trust: an introduction to the CEM-DIT system. ISCRAM 2019 - [c38]Daniel S. Fowler, Jeremy W. Bryans, Madeline Cheah, Paul Wooderson, Siraj A. Shaikh:
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example. QRS Companion 2019: 1-8 - [c37]Jake Hayward, Andrew Tomlinson, Jeremy W. Bryans:
Adding Cyberattacks To An Industry-Leading CAN Simulator. QRS Companion 2019: 9-16 - [c36]Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh, Fengjun Zhou:
A Template-Based Method for the Generation of Attack Trees. WISTP 2019: 155-165 - 2018
- [j7]Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Paul Wooderson:
Building an automotive security assurance case using systematic security evaluations. Comput. Secur. 77: 360-379 (2018) - [c35]Andrew Tomlinson, Jeremy W. Bryans, Siraj Ahmed Shaikh, Harsha Kumara Kalutarage:
Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows. DSN Workshops 2018: 231-238 - [c34]Daniel S. Fowler, Jeremy W. Bryans, Siraj Ahmed Shaikh, Paul Wooderson:
Fuzz Testing for Automotive Cyber-Security. DSN Workshops 2018: 239-246 - [c33]Andrew Tomlinson, Jeremy W. Bryans, Siraj Ahmed Shaikh:
Using a one-class compound classifier to detect in-vehicle network attacks. GECCO (Companion) 2018: 1926-1929 - [c32]Fiona Jennet McNeill, Diana Bental, Jeremy W. Bryans, Paolo Missier, Jannetta S. Steyn:
Informing decision makers: facilitating communication and trust for decision makers during crises. ISCRAM 2018 - 2017
- [c31]Madeline Cheah, Jeremy W. Bryans, Daniel S. Fowler, Siraj Ahmed Shaikh:
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study. DSN Workshops 2017: 36-43 - [c30]Daniel S. Fowler, Madeline Cheah, Siraj Ahmed Shaikh, Jeremy W. Bryans:
Towards a Testbed for Automotive Cybersecurity. ICST 2017: 540-541 - [c29]Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh:
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. WISTP 2017: 113-129 - 2016
- [c28]Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Hoang Nga Nguyen:
Combining Third Party Components Securely in Automotive Systems. WISTP 2016: 262-269 - 2015
- [j6]Roxana Dánger, Vasa Curcin, Paolo Missier, Jeremy W. Bryans:
Access control and view generation for provenance graphs. Future Gener. Comput. Syst. 49: 8-27 (2015) - [j5]Jon Holt, Simon Perry, Richard John Payne, Jeremy W. Bryans, Stefan Hallerstede, Finn Overgaard Hansen:
A Model-Based Approach for Requirements Engineering for Systems of Systems. IEEE Syst. J. 9(1): 252-262 (2015) - 2014
- [c27]Alexei Iliasov, Jeremy W. Bryans:
A Proof-Based Method for Modelling Timed Systems. Ershov Memorial Conference 2014: 161-176 - [c26]John S. Fitzgerald, Jeremy W. Bryans, Peter Gorm Larsen, Hansen Salim:
Collaborative Systems of Systems Need Collaborative Design. PRO-VE 2014: 16-23 - [c25]Paolo Missier, Jeremy W. Bryans, Carl Gamble, Vasa Curcin, Roxana Dánger:
ProvAbs: Model, Policy, and Tooling for Abstracting PROV Graphs. IPAW 2014: 3-15 - [c24]Pedro R. G. Antonino, Marcel Vinícius Medeiros Oliveira, Augusto Sampaio, Klaus E. Kristensen, Jeremy W. Bryans:
Leadership Election: An Industrial SoS Application of Compositional Deadlock Verification. NASA Formal Methods 2014: 31-45 - [c23]Jeremy W. Bryans, John S. Fitzgerald, Richard John Payne, Alvaro Miyazawa, Klaus E. Kristensen:
SysML contracts for systems of systems. SoSE 2014: 73-78 - [i3]Zoe Andrews, Jeremy W. Bryans, Richard John Payne, Klaus E. Kristensen:
Fault Modelling in System-of-Systems Contracts. CoRR abs/1404.7775 (2014) - [i2]Paolo Missier, Jeremy W. Bryans, Carl Gamble, Vasa Curcin, Roxana Dánger Mercaderes:
ProvAbs: model, policy, and tooling for abstracting PROV graphs. CoRR abs/1406.1998 (2014) - 2013
- [c22]Jeremy W. Bryans, Richard John Payne, Jon Holt, Simon Perry:
Semi-formal and formal interface specification for system of systems architecture. SysCon 2013: 612-619 - 2012
- [c21]John S. Fitzgerald, Jeremy W. Bryans, Richard John Payne:
A Formal Model-Based Approach to Engineering Systems-of-Systems. PRO-VE 2012: 53-62 - [c20]Richard John Payne, Jeremy W. Bryans, John S. Fitzgerald, Steve Riddle:
Interface specification for system-of-systems architectures. SoSE 2012: 567-572 - [c19]Jeremy W. Bryans, Maciej Koutny, Chunyan Mu:
Towards Quantitative Analysis of Opacity. TGC 2012: 145-163 - 2011
- [c18]Jeremy W. Bryans:
Developing a Consensus Algorithm Using Stepwise Refinement. ICFEM 2011: 553-568 - [c17]Jeremy W. Bryans, John S. Fitzgerald, Tom McCutcheon:
Refinement-Based Techniques in the Analysis of Information Flow Policies for Dynamic Virtual Organisations. PRO-VE 2011: 314-321 - [e2]Jeremy W. Bryans, John S. Fitzgerald:
Proceedings Third Workshop on Formal Aspects of Virtual Organisations, FAVO 2011, Sao Paolo, Brazil, 18th October 2011. EPTCS 83, 2011 [contents] - 2010
- [c16]Jeremy W. Bryans, Wei Wei:
Formal Analysis of BPMN Models Using Event-B. FMICS 2010: 33-49 - [c15]Jeremy W. Bryans, John S. Fitzgerald, Alexander B. Romanovsky, Andreas Roth:
Patterns for Modelling Time and Consistency in Business Information Systems. ICECCS 2010: 105-114
2000 – 2009
- 2009
- [c14]Jeremy W. Bryans, John S. Fitzgerald, Alexander B. Romanovsky, Andreas Roth:
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware. ICECCS 2009: 68-77 - [e1]Jeremy W. Bryans, John S. Fitzgerald:
Proceedings Second Workshop on Formal Aspects of Virtual Organisations, FAVO 2009, Eindhoven, The Netherlands, 3rd November 2009. EPTCS 16, 2009 [contents] - 2008
- [j4]Panos Periorellis, N. Cook, Hugo Hiden, A. Conlin, M. D. Hamilton, Jiyi Wu, Jeremy W. Bryans, Xiangguo Gong, F. Zhu, R. Smith, Paul Watson, Allen R. Wright:
GOLD infrastructure for virtual organizations. Concurr. Comput. Pract. Exp. 20(11): 1273-1288 (2008) - [j3]Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan:
Opacity generalised to transition systems. Int. J. Inf. Sec. 7(6): 421-435 (2008) - 2007
- [c13]Jeremy W. Bryans, John S. Fitzgerald:
Formal Engineering of XACML Access Control Policies in VDM++. ICFEM 2007: 37-56 - 2006
- [c12]Jeremy W. Bryans, Bev Littlewood, Peter Y. A. Ryan, Lorenzo Strigini:
E-voting: Dependability Requirements and Design for Dependability. ARES 2006: 988-995 - [c11]Jeremy W. Bryans, John S. Fitzgerald, Cliff B. Jones, Igor Mozolevsky:
Formal Modelling of Dynamic Coalitions, with an Application in Chemical Engineering. ISoLA 2006: 91-98 - 2005
- [c10]Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan:
Opacity Generalised to Transition Systems. Formal Aspects in Security and Trust 2005: 81-95 - [c9]Jeremy W. Bryans:
Reasoning about XACML policies using CSP. SWS 2005: 28-35 - 2004
- [c8]Carron Shankland, Jeremy W. Bryans, Lionel Morel:
Expressing Iterative Properties Logically in a Symbolic Setting. AMAST 2004: 460-474 - [c7]Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan:
Modelling Dynamic Opacity Using Petri Nets with Silent Actions. Formal Aspects in Security and Trust 2004: 159-172 - [c6]Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan:
Modelling Opacity Using Petri Nets. WISP@ICATPN 2004: 101-115 - 2003
- [j2]Jeremy W. Bryans, Howard Bowman, John Derrick:
Model checking stochastic automata. ACM Trans. Comput. Log. 4(4): 452-492 (2003) - 2001
- [j1]Howard Bowman, Jeremy W. Bryans, John Derrick:
Analysis of a Multimedia Stream using Stochastic Process Algebra. Comput. J. 44(4): 230-245 (2001) - [c5]Jeremy W. Bryans, Carron Shankland:
Implementing a Modal Logic over Data and Processes using XTL. FORTE 2001: 201-218 - 2000
- [c4]Jeremy W. Bryans, Lynne Blair, Howard Bowman, John Derrick:
Specification and Analysis of Automata-Based Designs. IFM 2000: 176-193 - [i1]Jeremy W. Bryans, Howard Bowman, John Derrick:
Stochastic Model Checking for Multimedia. CoRR cs.MM/0002004 (2000)
1990 – 1999
- 1999
- [c3]Jeremy W. Bryans, John Derrick:
Stochastic Specification and Verification. IWFM 1999 - 1996
- [b1]Jeremy William Bryans:
Denotational semantic models for real-time LOTOS. University of Reading, UK, 1996 - 1995
- [c2]Jeremy W. Bryans, Jim Davies, Steve A. Schneider:
Towards a denotational semantics for ET-LOTOS. CONCUR 1995: 269-283 - [c1]Jim Davies, Jeremy W. Bryans, Steve A. Schneider:
Real-time LOTOS and Timed Observations. FORTE 1995: 383-397
Coauthor Index
aka: Siraj A. Shaikh
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint