关注
John A. Clark
John A. Clark
Professor of Computer and Information Security, University of Sheffield
在 sheffield.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
年份
“Devices are people too” using process patterns to elicit security requirements in novel domains: a ubiquitous healthcare example
Y Liu, JA Clark, S Stepney
Security in Pervasive Computing: Second International Conference, SPC 2005 …, 2005
92005
12 A Search-Based Automated Test-Data
N Tracey, J Clark, J McDermid, K Mander
Systems Engineering for Business Process Change: New Directions: Collected …, 2012
2012
2010 Index IEEE Transactions on Software Engineering Vol. 36
S Ali, H Aljazzar, K Anastasakis, J Antunes, E Arisholm, S Artzi, GK Baah, ...
IEEE Transactions on Software Engineering 36 (6), 1, 2010
2010
2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)| 978-1-6654-7408-5/22/$31.00© 2022 IEEE| DOI: 10.1109 …
N Aaraj, AJ Aberkane, M Aljohani, AH Alqahtani, T Al-Rahat, M Amoretti, ...
4 CoNVERSE: A Family-Oriented Software
J Clark
Systems Engineering for Business Process Change: New Directions: Collected …, 2012
2012
A deployment value model for intrusion detection sensors
SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen
Advances in Information Security and Assurance: Third International …, 2009
122009
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
S Şen, JA Clark
Proceedings of the second ACM conference on Wireless network security, 95-102, 2009
492009
A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad Hoc Networks
S ŞEN AKAGÜNDÜZ, J Clark
A multi-objective optimisation approach to IDS sensor placement
H Chen, JA Clark, JE Tapiador, SA Shaikh, H Chivers, P Nobles
Computational Intelligence in Security for Information Systems: CISIS’09 …, 2009
202009
A perspective on trust, security and autonomous systems
WT Harwood, JA Clark, JL Jacob
Proceedings of the New Security Paradigms Workshop, Concord, MA, 2010
62010
A principled evaluation of the effect of directed mutation on search-based statistical testing
S Poulding, JA Clark, H Waeselynck
2011 IEEE Fourth International Conference on Software Testing, Verification …, 2011
182011
A privacy-preserving energy theft detection model for effective demand-response management in smart grids
A Alromih, JA Clark, P Gope
arXiv preprint arXiv:2303.13204, 2023
12023
A proposal for trust management in coalition environments
D Agrawal, H Chivers, J Clark, C Jutla, J McDermid
IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 2008
52008
A research agenda for metaheuristic standardization
J Swan, S Adriaensen, M Bishr, EK Burke, JA Clark, P De Causmaecker, ...
Proceedings of the XI metaheuristics international conference, 1-3, 2015
532015
A Safe Change Oriented Process for Safety-Critical Systems
NTA Stephenson, J Clark, J McDermid, Y Heslington
A Safety Change Oriented Process for Safety-Critical Systems
N Tracey, A Stephenson, JA Clark, JA McDermid
71999
A search-based approach to the automated design of security protocols
C Hao, JA Clark, JL Jacob
Department of Computer Science, University of York, 2004
22004
A search-based automated test-data generation framework for high-integrity systems
N Tracey, J Clark, J McDermid, K Mander
Journal of Software Practice and Experience, 2000
22000
A search-based automated test-data generation framework for safety-critical systems
N Tracey, J Clark, J McDermid, K Mander
Systems Engineering for Business Process Change: New Directions: Collected …, 2002
672002
A search-based framework for automatic testing of MATLAB/Simulink models
Y Zhan, JA Clark
Journal of Systems and Software 81 (2), 262-285, 2008
722008
系统目前无法执行此操作,请稍后再试。
文章 1–20