“Devices are people too” using process patterns to elicit security requirements in novel domains: a ubiquitous healthcare example Y Liu, JA Clark, S Stepney Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005 | 9 | 2005 |
12 A Search-Based Automated Test-Data N Tracey, J Clark, J McDermid, K Mander Systems Engineering for Business Process Change: New Directions: Collected …, 2012 | | 2012 |
2010 Index IEEE Transactions on Software Engineering Vol. 36 S Ali, H Aljazzar, K Anastasakis, J Antunes, E Arisholm, S Artzi, GK Baah, ... IEEE Transactions on Software Engineering 36 (6), 1, 2010 | | 2010 |
2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)| 978-1-6654-7408-5/22/$31.00© 2022 IEEE| DOI: 10.1109 … N Aaraj, AJ Aberkane, M Aljohani, AH Alqahtani, T Al-Rahat, M Amoretti, ... | | |
4 CoNVERSE: A Family-Oriented Software J Clark Systems Engineering for Business Process Change: New Directions: Collected …, 2012 | | 2012 |
A deployment value model for intrusion detection sensors SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen Advances in Information Security and Assurance: Third International …, 2009 | 12 | 2009 |
A grammatical evolution approach to intrusion detection on mobile ad hoc networks S Şen, JA Clark Proceedings of the second ACM conference on Wireless network security, 95-102, 2009 | 49 | 2009 |
A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad Hoc Networks S ŞEN AKAGÜNDÜZ, J Clark | | |
A multi-objective optimisation approach to IDS sensor placement H Chen, JA Clark, JE Tapiador, SA Shaikh, H Chivers, P Nobles Computational Intelligence in Security for Information Systems: CISIS’09 …, 2009 | 20 | 2009 |
A perspective on trust, security and autonomous systems WT Harwood, JA Clark, JL Jacob Proceedings of the New Security Paradigms Workshop, Concord, MA, 2010 | 6 | 2010 |
A principled evaluation of the effect of directed mutation on search-based statistical testing S Poulding, JA Clark, H Waeselynck 2011 IEEE Fourth International Conference on Software Testing, Verification …, 2011 | 18 | 2011 |
A privacy-preserving energy theft detection model for effective demand-response management in smart grids A Alromih, JA Clark, P Gope arXiv preprint arXiv:2303.13204, 2023 | 1 | 2023 |
A proposal for trust management in coalition environments D Agrawal, H Chivers, J Clark, C Jutla, J McDermid IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 2008 | 5 | 2008 |
A research agenda for metaheuristic standardization J Swan, S Adriaensen, M Bishr, EK Burke, JA Clark, P De Causmaecker, ... Proceedings of the XI metaheuristics international conference, 1-3, 2015 | 53 | 2015 |
A Safe Change Oriented Process for Safety-Critical Systems NTA Stephenson, J Clark, J McDermid, Y Heslington | | |
A Safety Change Oriented Process for Safety-Critical Systems N Tracey, A Stephenson, JA Clark, JA McDermid | 7 | 1999 |
A search-based approach to the automated design of security protocols C Hao, JA Clark, JL Jacob Department of Computer Science, University of York, 2004 | 2 | 2004 |
A search-based automated test-data generation framework for high-integrity systems N Tracey, J Clark, J McDermid, K Mander Journal of Software Practice and Experience, 2000 | 2 | 2000 |
A search-based automated test-data generation framework for safety-critical systems N Tracey, J Clark, J McDermid, K Mander Systems Engineering for Business Process Change: New Directions: Collected …, 2002 | 67 | 2002 |
A search-based framework for automatic testing of MATLAB/Simulink models Y Zhan, JA Clark Journal of Systems and Software 81 (2), 262-285, 2008 | 72 | 2008 |