


Остановите войну!
for scientists:


default search action
Colin J. Fidge
Person information

- affiliation: Queensland University of Technology, Brisbane, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j59]Mukhtar Hussain
, Colin J. Fidge
, Ernest Foo
, Zahra Jadidi
:
Discovering a data interpreted petri net model of industrial control systems for anomaly detection. Expert Syst. Appl. 230: 120511 (2023) - [j58]Alexey Nekrasov
, Alena B. Khachaturian
, Colin J. Fidge
:
Optimization of Airborne Scatterometer NRCS Semicircular Sampling for Sea Wind Retrieval. Remote. Sens. 15(6): 1613 (2023) - [j57]Elena Basan
, Alexandr S. Basan, Alexey Nekrasov
, Colin J. Fidge
, Evgeniya Ishchukova
, Anatoly Basyuk, Alexandr Lesnikov:
Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode. Sensors 23(4): 1996 (2023) - [j56]Andrei Furda
, Alessandro Soro
, Erwin Fielt
, Nicola Bartlett, Colin J. Fidge
, Jesse Steineck
, Lionel van den Berg:
Jump-Starting Software Engineering Careers. IEEE Softw. 40(5): 108-115 (2023) - 2022
- [j55]Xuelei Wang
, Colin J. Fidge
, Ghavameddin Nourbakhsh
, Ernest Foo
, Zahra Jadidi
, Calvin Li:
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems. IEEE Access 10: 6629-6649 (2022) - [j54]Md Whaiduzzaman
, Alistair Barros, Moumita Chanda, Supti Barman, Tania Sultana, Md. Sazzadur Rahman
, Shanto Roy, Colin J. Fidge
:
A Review of Emerging Technologies for IoT-Based Smart Cities. Sensors 22(23): 9271 (2022) - [j53]Mukhtar Hussain
, Colin J. Fidge
, Ernest Foo
, Zahra Jadidi
:
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control. IEEE Trans. Ind. Informatics 18(6): 3734-3743 (2022) - 2021
- [j52]Md Whaiduzzaman
, Md. Julkar Nayeen Mahi
, Alistair Barros, Md. Ibrahim Khalil, Colin J. Fidge
, Rajkumar Buyya
:
BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture. IEEE Access 9: 106655-106674 (2021) - [j51]Md Whaiduzzaman
, Nishat Farjana, Alistair Barros, Md. Julkar Nayeen Mahi
, Md. Shahriare Satu
, Shanto Roy, Colin J. Fidge:
HIBAF: A data security scheme for fog computing. J. High Speed Networks 27(4): 381-402 (2021) - [j50]Elena Basan
, Alexandr S. Basan, Alexey Nekrasov
, Colin J. Fidge
, Ján Gamec
, Mária Gamcová
:
A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes. Sensors 21(2): 509 (2021) - [j49]Ján Labun
, Pavol Kurdel
, Alexey Nekrasov
, Mária Gamcová
, Marek Ceskovic
, Colin J. Fidge
:
Specific Resonant Properties of Non-Symmetrical Microwave Antennas. Sensors 21(3): 939 (2021) - [j48]Ján Gamec, Elena Basan
, Alexandr S. Basan, Alexey Nekrasov
, Colin J. Fidge
, Nikita Sushkin:
An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes. Sensors 21(18): 6116 (2021) - [j47]Md. Razon Hossain
, Md Whaiduzzaman
, Alistair Barros, Shelia Rahman Tuly, Md. Julkar Nayeen Mahi
, Shanto Roy, Colin J. Fidge, Rajkumar Buyya:
A scheduling-based dynamic fog computing framework for augmenting resource utilization. Simul. Model. Pract. Theory 111: 102336 (2021) - [c92]Md Whaiduzzaman
, Alistair Barros, Ahmedur Rahman Shovon
, Md. Razon Hossain
, Colin J. Fidge:
A Resilient Fog-IoT Framework for Seamless Microservice Execution. SCC 2021: 213-221 - [c91]Adambarage Anuruddha Chathuranga De Alwis
, Alistair Barros
, Colin J. Fidge
, Artem Polyvyanyy
:
Microservice Remodularisation of Monolithic Enterprise Systems for Embedding in Industrial IoT Networks. CAiSE 2021: 432-448 - 2020
- [j46]Ján Labun, Gabriel Kalapos
, Marek Ceskovic
, Pavol Kurdel
, Ján Gamec, Alexey Nekrasov
, Colin J. Fidge
, Miroslav Lassák
:
A Simple High-Precision 2-Port Vector Analyzer. IEEE Access 8: 196609-196617 (2020) - [c90]Mahesh Fernando, Colin J. Fidge
, Tony Sahama:
Design Guidelines for Effective Occupation-Based Personal Health Records. ACSW 2020: 25:1-25:10 - [c89]Adambarage Anuruddha Chathuranga De Alwis
, Alistair Barros
, Colin J. Fidge
, Artem Polyvyanyy
:
Remodularization Analysis for Microservice Discovery Using Syntactic and Semantic Clustering. CAiSE 2020: 3-19 - [c88]Zahra Jadidi
, Ali Dorri, Raja Jurdak
, Colin J. Fidge:
Securing Manufacturing Using Blockchain. TrustCom 2020: 1920-1925 - [i1]Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge:
Securing Manufacturing Using Blockchain. CoRR abs/2010.07493 (2020)
2010 – 2019
- 2019
- [c87]Mahesh Fernando, Colin J. Fidge
, Tony Sahama:
An Overall Health and Well-Being Data Model for Employer-Sponsored Personal Health Records. ACSW 2019: 23:1-23:10 - [c86]Chathurika Wickramage, Colin J. Fidge
, Chun Ouyang, Tony Sahama:
Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling. ACSW 2019: 35:1-35:10 - [c85]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros
, Colin J. Fidge
, Artem Polyvyanyy
:
Business Object Centric Microservices Patterns. OTM Conferences 2019: 476-495 - [c84]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros
, Colin J. Fidge
, Artem Polyvyanyy
:
Availability and Scalability Optimized Microservice Discovery from Enterprise Systems. OTM Conferences 2019: 496-514 - 2018
- [j45]Andrei Furda
, Colin J. Fidge
, Alistair Barros
:
A practical approach for detecting multi-tenancy data interference. Sci. Comput. Program. 163: 160-173 (2018) - [j44]Andrei Furda
, Colin J. Fidge
, Olaf Zimmermann, Wayne Kelly, Alistair Barros
:
Migrating Enterprise Legacy Source Code to Microservices: On Multitenancy, Statefulness, and Data Consistency. IEEE Softw. 35(3): 63-72 (2018) - [c83]Mahesh Fernando, Colin J. Fidge
, Tony Sahama, K. Priyantha Hewagamage:
Employees' perceptions of sharing employer-sponsored personal health records. ACSW 2018: 35:1-35:10 - [c82]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros
, Artem Polyvyanyy
, Colin J. Fidge
:
Function-Splitting Heuristics for Discovery of Microservices in Enterprise Systems. ICSOC 2018: 37-53 - [c81]Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros
, Colin J. Fidge
, Artem Polyvyanyy
:
Discovering Microservices in Enterprise Systems Using a Business Object Containment Heuristic. OTM Conferences (2) 2018: 60-79 - 2017
- [j43]Yi-Fan Zhang
, Yu-Chu Tian
, Wayne Kelly, Colin J. Fidge
:
Scalable and efficient data distribution for distributed computing of all-to-all comparison problems. Future Gener. Comput. Syst. 67: 152-162 (2017) - [j42]Anastasiia Pika, Michael Leyer, Moe Thandar Wynn
, Colin J. Fidge
, Arthur H. M. ter Hofstede
, Wil M. P. van der Aalst
:
Mining Resource Profiles from Event Logs. ACM Trans. Manag. Inf. Syst. 8(1): 1:1-1:30 (2017) - [c80]Daniel Hunter, Jack Parry, Kenneth Radke, Colin J. Fidge
:
Authenticated encryption for time-sensitive critical infrastructure. ACSW 2017: 19:1-19:10 - [c79]Chathurika Wickramage, Colin J. Fidge
, Tony Sahama, Roy Wong:
Challenges for Log Based Detection of Privacy Violations during Healthcare Emergencies. GLOBECOM 2017: 1-6 - [c78]Pramitha Perera, Yu-Chu Tian
, Colin J. Fidge
, Wayne Kelly:
A Comparison of Supervised Machine Learning Algorithms for Classification of Communications Network Traffic. ICONIP (1) 2017: 445-454 - 2016
- [j41]Subrata Chakraborty
, Kerrie L. Mengersen, Colin J. Fidge
, Lin Ma, David Lassen:
A Bayesian Network-based customer satisfaction model: a tool for management decisions in railway transport. Decis. Anal. 3: 4 (2016) - [j40]Anastasiia Pika, Wil M. P. van der Aalst
, Moe Thandar Wynn
, Colin J. Fidge
, Arthur H. M. ter Hofstede
:
Evaluating and predicting overall process risk using event logs. Inf. Sci. 352-353: 98-120 (2016) - [j39]Yi-Fan Zhang
, Yu-Chu Tian
, Colin J. Fidge
, Wayne Kelly:
Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems. J. Parallel Distributed Comput. 93-94: 87-101 (2016) - [c77]Donna Teague, Colin J. Fidge
, Yue Xu
:
Combining unsupervised and invigilated assessment of introductory programming. ACSW 2016: 9 - [c76]Jack Parry, Daniel Hunter, Kenneth Radke, Colin J. Fidge
:
A network forensics tool for precise data packet capture and replay in cyber-physical systems. ACSW 2016: 22 - [c75]Chathurika Wickramage, Tony Sahama, Colin J. Fidge
:
Anatomy of log files: Implications for information accountability measures. HealthCom 2016: 1-6 - [c74]Mahesh Fernando, Tony Sahama, Colin J. Fidge
, K. Priyantha Hewagamage:
Personal health records as sources of productivity evidence. ICC 2016: 1-6 - 2015
- [j38]Nuwan Goonasekera, William J. Caelli, Colin J. Fidge
:
LibVM: an architecture for shared library sandboxing. Softw. Pract. Exp. 45(12): 1597-1617 (2015) - [c73]Ayodeji James Akande, Colin J. Fidge, Ernest Foo:
Component Modeling for SCADA Network Mapping. ACSC 2015: 91-100 - [c72]Yi-Fan Zhang
, Yu-Chu Tian
, Wayne Kelly, Colin J. Fidge
, Jing Gao:
Application of Simulated Annealing to Data Distribution for All-to-All Comparison Problems in Homogeneous Systems. ICONIP (3) 2015: 683-691 - [c71]Yi-Fan Zhang
, Yu-Chu Tian
, Wayne Kelly, Colin J. Fidge
:
Distributed computing of all-to-all comparison problems in heterogeneous systems. IECON 2015: 2053-2058 - [c70]Samuel A. Brian, Richard N. Thomas
, James M. Hogan, Colin J. Fidge
:
Planting Bugs: A System for Testing Students' Unit Tests. ITiCSE 2015: 45-50 - 2014
- [j37]Suriadi Suriadi, Burkhard Weiß, Axel Winkelmann, Arthur H. M. ter Hofstede
, Michael Adams, Raffaele Conforti, Colin J. Fidge
, Marcello La Rosa, Chun Ouyang, Anastasiia Pika, Michael Rosemann, Moe Thandar Wynn:
Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis. Commun. Assoc. Inf. Syst. 34: 52 (2014) - [j36]Guosong Tian, Yu-Chu Tian
, Colin J. Fidge
:
Precise relative clock synchronization for distributed control using TSC registers. J. Netw. Comput. Appl. 44: 63-71 (2014) - [j35]Madhushika M. E. Karunarathna, Yu-Chu Tian
, Colin J. Fidge
:
Domain-specific application analysis for customized instruction identification. Microprocess. Microsystems 38(7): 637-648 (2014) - [c69]Anastasiia Pika, Moe Thandar Wynn
, Colin J. Fidge
, Arthur H. M. ter Hofstede
, Michael Leyer, Wil M. P. van der Aalst
:
An Extensible Framework for Analysing Resource Behaviour Using Event Logs. CAiSE 2014: 564-579 - [c68]Yi-Fan Zhang
, Yu-Chu Tian
, Wayne Kelly, Colin J. Fidge
:
A distributed computing framework for All-to-All comparison problems. IECON 2014: 2499-2505 - 2013
- [c67]Colin J. Fidge, Jim Hogan, Raymond Lister:
What vs. how: comparing students' testing and coding skills. ACE 2013: 97-106 - [c66]Anastasiia Pika, Wil M. P. van der Aalst
, Colin J. Fidge
, Arthur H. M. ter Hofstede
, Moe Thandar Wynn
:
Profiling Event Logs to Configure Risk Indicators for Process Delays. CAiSE 2013: 465-481 - [c65]Christophe Hauser, Frederic Tronel
, Colin J. Fidge
, Ludovic Mé:
Intrusion detection in distributed systems, an approach based on taint marking. ICC 2013: 1962-1967 - [c64]Madhushika M. E. Karunarathna, Yu-Chu Tian
, Colin J. Fidge
, Ross Hayward:
Algorithm clustering for multi-algorithm processor design. ICCD 2013: 451-454 - [c63]Bandar Alshammari, Colin J. Fidge, Diane Corney:
Security Metrics for Java Bytecode Programs (S). SEKE 2013: 394-399 - [p2]Bandar Alhaqbani, Michael Adams, Colin J. Fidge
, Arthur H. M. ter Hofstede
:
Privacy-Aware Workflow Management. Business Process Management 2013: 111-128 - 2012
- [j34]Nuwan Goonasekera, William J. Caelli, Colin J. Fidge
:
A Hardware Virtualization Based Component Sandboxing Architecture. J. Softw. 7(9): 2107-2118 (2012) - [c62]Chris Mills, Colin J. Fidge, Diane Corney:
Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. AISC 2012: 59-70 - [c61]Christopher Doble, Colin J. Fidge, Diane Corney:
Data Flow Analysis of Embedded Program Expressions. AISC 2012: 71-82 - [c60]Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge:
A taint marking approach to confidentiality violation detection. AISC 2012: 83-90 - [c59]Anastasiia Pika, Wil M. P. van der Aalst
, Colin J. Fidge, Arthur H. M. ter Hofstede, Moe Thandar Wynn:
Predicting Deadline Transgressions Using Event Logs. Business Process Management Workshops 2012: 211-216 - 2011
- [j33]Moe Thandar Wynn
, Chun Ouyang, Arthur H. M. ter Hofstede
, Colin J. Fidge
:
Data and process requirements for product recall coordination. Comput. Ind. 62(7): 776-786 (2011) - [j32]Lifeng Ai, Maolin Tang
, Colin J. Fidge
:
Partitioning composite web services for decentralized execution using a genetic algorithm. Future Gener. Comput. Syst. 27(2): 157-172 (2011) - [c58]Chun Ouyang, Moe Thandar Wynn, Jan-Christian Kuhr, Michael Adams, Thomas Becker, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow support for scheduling in surgical care processes. ECIS 2011: 30 - [c57]Lifeng Ai, Maolin Tang
, Colin J. Fidge
:
Resource Allocation and Scheduling of Multiple Composite Web Services in Cloud Computing Using Cooperative Coevolution Genetic Algorithm. ICONIP (2) 2011: 258-267 - [c56]Li Gui, Yu-Chu Tian
, Colin J. Fidge
:
A conditional retransmission enabled transport protocol for real-time networked control systems. LCN 2011: 231-234 - [c55]Bandar Alshammari
, Colin J. Fidge
, Diane Corney:
A Hierarchical Security Assessment Model for Object-Oriented Programs. QSIC 2011: 218-227 - 2010
- [j31]Lifeng Ai, Maolin Tang, Colin J. Fidge:
QoS-oriented Resource Allocation and Scheduling of Multiple CompositeWeb Services in a Hybrid Cloud Using a Random-Key Genetic Algorithm. Aust. J. Intell. Inf. Process. Syst. 12(1) (2010) - [j30]Bandar Alhaqbani, Colin J. Fidge
:
Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance. Int. J. Inf. Secur. Priv. 4(4): 35-59 (2010) - [c54]Bandar Alshammari
, Colin J. Fidge
, Diane Corney:
Assessing the Impact of Refactoring on Security-Critical Object-Oriented Designs. APSEC 2010: 186-195 - [c53]Bandar Alshammari
, Colin J. Fidge
, Diane Corney:
Security Metrics for Object-Oriented Designs. Australian Software Engineering Conference 2010: 55-64 - [c52]Maolin Tang, Colin J. Fidge:
Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. AISC 2010: 12-21 - [c51]Reza Hassanzadeh, Tony Sahama, Colin J. Fidge:
A Secure Framework and Related Protocols for Ubiquitous Access to Electronic Health Records Using Java SIM Cards. E-HEALTH 2010: 102-113 - [c50]Guosong Tian, Yu-Chu Tian
, Colin J. Fidge
:
Performance analysis of IEEE 802.11 DCF based WNCS networks. LCN 2010: 496-503 - [c49]Shamsul Kamal Ahmad Khalid
, Jacob Zimmermann, Diane Corney, Colin J. Fidge
:
Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types. NSS 2010: 351-356 - [p1]Moe Thandar Wynn
, Anne Rozinat, Wil M. P. van der Aalst
, Arthur H. M. ter Hofstede
, Colin J. Fidge
:
Process Mining and Simulation. Modern Business Process Automation 2010: 437-457
2000 – 2009
- 2009
- [j29]Anne Rozinat, Moe Thandar Wynn
, Wil M. P. van der Aalst
, Arthur H. M. ter Hofstede
, Colin J. Fidge
:
Workflow simulation for operational decision support. Data Knowl. Eng. 68(9): 834-850 (2009) - [j28]Bandar Alhaqbani, Audun Jøsang
, Colin J. Fidge
:
A Medical Data Reliability Assessment Model. J. Theor. Appl. Electron. Commer. Res. 4(2): 64-63 (2009) - [c48]Maolin Tang
, Colin J. Fidge
:
A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications. IEEE Congress on Evolutionary Computation 2009: 3226-3233 - [c47]Raymond Lister, Colin J. Fidge
, Donna Teague:
Further evidence of a relationship between explaining, tracing and writing skills in introductory programming. ITiCSE 2009: 161-165 - [c46]Colin J. Fidge
, Diane Corney:
Integrating hardware and software information flow analyses. LCTES 2009: 157-166 - [c45]Guosong Tian, Colin J. Fidge
, Yu-Chu Tian
:
Hybrid system simulation of computer control applications over communication networks. MASCOTS 2009: 1-10 - [c44]Bandar Alshammari
, Colin J. Fidge
, Diane Corney:
Security Metrics for Object-Oriented Class Designs. QSIC 2009: 11-20 - 2008
- [c43]Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter Hofstede, Marlon Dumas:
Product flow analysis in distribution networks with a fixed time horizon. ACSC 2008: 73-81 - [c42]Colin J. Fidge:
Relative simulation and model checking of real-time processes. ACSC 2008: 157-165 - [c41]Anne Rozinat, Moe Thandar Wynn, Wil M. P. van der Aalst
, Arthur H. M. ter Hofstede, Colin J. Fidge:
Workflow Simulation for Operational Decision Support Using Design, Historic and State Information. BPM 2008: 196-211 - [c40]Guosong Tian, Yu-Chu Tian
, Colin J. Fidge
:
High-Precision Relative Clock Synchronization Using Time Stamp Counters. ICECCS 2008: 69-78 - 2007
- [c39]Benjamin W. Long, Colin J. Fidge, David A. Carrington:
Cross-Layer Verification of Type Flaw Attacks on Security Protocols. ACSC 2007: 171-180 - [c38]Moe Thandar Wynn
, Marlon Dumas
, Colin J. Fidge
, Arthur H. M. ter Hofstede
, Wil M. P. van der Aalst
:
Business Process Simulation for Operational Decision Support. Business Process Management Workshops 2007: 66-77 - [c37]Bandar Alhaqbani, Colin J. Fidge
:
Access Control Requirements for Processing Electronic Health Records. Business Process Management Workshops 2007: 371-382 - [c36]Li Gui, Yu-Chu Tian, Colin J. Fidge:
Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. ESA 2007: 121-126 - 2006
- [j27]Andrew Rae
, Colin J. Fidge
, Luke Wildman:
Fault Evaluation for Security-Critical Communications Devices. Computer 39(5): 61-68 (2006) - [j26]Karl Lermer, Colin J. Fidge
:
Procedure compilation in the refinement calculus. Formal Aspects Comput. 18(2): 152-180 (2006) - [j25]Colin J. Fidge
:
Formal change impact analyses for emulated control software. Int. J. Softw. Tools Technol. Transf. 8(4-5): 321-335 (2006) - [c35]Colin J. Fidge, Tim McComb:
Tracing secure information flow through mode changes. ACSC 2006: 303-310 - [c34]Benjamin W. Long, Colin J. Fidge
:
Formally Analysing a Security Protocol for Replay Attacks. ASWEC 2006: 171-180 - [c33]Phil Cook, Colin J. Fidge
:
Well-Measuring Programs. ASWEC 2006: 253-261 - [c32]Colin J. Fidge, Yu-Chu Tian
:
Functional Analysis of a Real-Time Protocol for Networked Control Systems. ATVA 2006: 446-460 - 2005
- [j24]Andrew Rae, Colin J. Fidge:
Identifying Critical Components During Information Security Evaluations. J. Res. Pract. Inf. Technol. 37(4) (2005) - [j23]Andrew Rae
, Colin J. Fidge
:
Information Flow Analysis for Fail-Secure Devices. Comput. J. 48(1): 17-26 (2005) - [j22]Karl Lermer, Colin J. Fidge
, Ian J. Hayes
:
A theory for execution-time derivation in real-time programs. Theor. Comput. Sci. 346(1): 3-27 (2005) - [c31]Colin J. Fidge
, Phil Cook:
Model Checking Interrupt-Dependent Software. APSEC 2005: 51-58 - [c30]Colin J. Fidge
, Peter J. Robinson, Steve Dunne:
Refinement Laws for Verifying Library Subroutine Adaptation. Australian Software Engineering Conference 2005: 224-232 - 2003
- [j21]Colin J. Fidge
, Carron Shankland
:
But What if I Don't Want to Wait Forever? Formal Aspects Comput. 14(3): 281-294 (2003) - [j20]Luke Wildman, Colin J. Fidge
, David A. Carrington:
The Variety of Variables in Automated Real-Time Refinement. Formal Aspects Comput. 15(2-3): 258-279 (2003) - [j19]Karl Lermer, Colin J. Fidge
, Ian J. Hayes
:
Linear Approximation of Execution-Time Constraints. Formal Aspects Comput. 15(4): 319-348 (2003) - [j18]Colin J. Fidge
:
Foreword. Theor. Comput. Sci. 293(3): 477 (2003) - [c29]Colin J. Fidge
:
Verifying Emulation of Legacy Mission Computer Systems. FME 2003: 187-207 - [c28]Benjamin W. Long, Colin J. Fidge
, Antonio Cerone:
A Z Based Approach to Verifying Security Protocols. ICFEM 2003: 375-395 - [c27]Geoffrey Watson, Colin J. Fidge
:
A Partial-Correctness Semantics for Modelling Assembler Programs. SEFM 2003: 82-90 - [c26]