|
Search the dblp DataBase
Phillip J. Brooke:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shukor A. Razak, Steven Furnell, Phillip J. Brooke
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ECIW, 2005, pp:271-280 [Conf]
- Xiaocheng Ge, Richard F. Paige, Fiona Polack, Howard Chivers, Phillip J. Brooke
Agile development of secure web applications. [Citation Graph (0, 0)][DBLP] ICWE, 2006, pp:305-312 [Conf]
- Richard F. Paige, Phillip J. Brooke
Agile Formal Method Engineering. [Citation Graph (0, 0)][DBLP] IFM, 2005, pp:109-128 [Conf]
- Phillip J. Brooke, Richard F. Paige
The Design of a Tool-Supported Graphical Notation for Timed CSP. [Citation Graph (0, 0)][DBLP] IFM, 2002, pp:299-318 [Conf]
- Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:590-595 [Conf]
- Emine G. Aydal, Richard F. Paige, Howard Chivers, Phillip J. Brooke
Security Planning and Refactoring in Extreme Programming. [Citation Graph (0, 0)][DBLP] XP, 2006, pp:154-163 [Conf]
- Richard F. Paige, Priyanka Agarwal, Phillip J. Brooke
Combining Agile Practices with UML and EJB: A Case Study in Agile Development. [Citation Graph (0, 0)][DBLP] XP, 2003, pp:351-353 [Conf]
- Richard F. Paige, Xiaochen Wang, Zoë R. Stephenson, Phillip J. Brooke
Towards an Agile Process for Building Software Product Lines. [Citation Graph (0, 0)][DBLP] XP, 2006, pp:198-199 [Conf]
- Phillip J. Brooke, Richard F. Paige
Fault trees for security system design and analysis. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:256-264 [Journal]
- Richard F. Paige, Jonathan S. Ostroff, Phillip J. Brooke
Principles for modeling language design. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2000, v:42, n:10, pp:665-675 [Journal]
- Jonathan S. Ostroff, Richard F. Paige, David Makalsky, Phillip J. Brooke
E-Tester: a Contract-Aware and Agent-Based Unit Testing Framework for Eiffel. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2005, v:4, n:7, pp:97-114 [Journal]
- Richard F. Paige, Phillip J. Brooke
Integrating BON and Object-Z. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2004, v:3, n:3, pp:121-141 [Journal]
- Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. [Citation Graph (0, 0)][DBLP] ADHOC-NOW, 2007, pp:129-141 [Conf]
- Peter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers
A Novel Approach to the Detection of Cheating in Multiplayer Online Games. [Citation Graph (0, 0)][DBLP] ICECCS, 2007, pp:97-106 [Conf]
- Xiaocheng Ge, Richard F. Paige, Fiona Polack, Phillip J. Brooke
Extreme Programming Security Practices. [Citation Graph (0, 0)][DBLP] XP, 2007, pp:226-230 [Conf]
- Richard F. Paige, Triston S. Attridge, Phillip J. Brooke
Game Development Using Design-by-Contract. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2006, v:5, n:7, pp:- [Journal]
- Richard F. Paige, Phillip J. Brooke, Jonathan S. Ostroff
Metamodel-based model conformance and multiview consistency checking. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2007, v:16, n:3, pp:- [Journal]
FPTC: Automated Safety Analysis for Domain-Specific Languages. [Citation Graph (, )][DBLP]
Towards Agile Engineering of High-Integrity Systems. [Citation Graph (, )][DBLP]
Lazy Exploration and Checking of CSP Models with CSPsim. [Citation Graph (, )][DBLP]
Theorem Proving Support for View Consistency Checking. [Citation Graph (, )][DBLP]
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|