The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Phillip J. Brooke: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shukor A. Razak, Steven Furnell, Phillip J. Brooke
    A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:271-280 [Conf]
  2. Xiaocheng Ge, Richard F. Paige, Fiona Polack, Howard Chivers, Phillip J. Brooke
    Agile development of secure web applications. [Citation Graph (0, 0)][DBLP]
    ICWE, 2006, pp:305-312 [Conf]
  3. Richard F. Paige, Phillip J. Brooke
    Agile Formal Method Engineering. [Citation Graph (0, 0)][DBLP]
    IFM, 2005, pp:109-128 [Conf]
  4. Phillip J. Brooke, Richard F. Paige
    The Design of a Tool-Supported Graphical Notation for Timed CSP. [Citation Graph (0, 0)][DBLP]
    IFM, 2002, pp:299-318 [Conf]
  5. Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
    A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:590-595 [Conf]
  6. Emine G. Aydal, Richard F. Paige, Howard Chivers, Phillip J. Brooke
    Security Planning and Refactoring in Extreme Programming. [Citation Graph (0, 0)][DBLP]
    XP, 2006, pp:154-163 [Conf]
  7. Richard F. Paige, Priyanka Agarwal, Phillip J. Brooke
    Combining Agile Practices with UML and EJB: A Case Study in Agile Development. [Citation Graph (0, 0)][DBLP]
    XP, 2003, pp:351-353 [Conf]
  8. Richard F. Paige, Xiaochen Wang, Zoë R. Stephenson, Phillip J. Brooke
    Towards an Agile Process for Building Software Product Lines. [Citation Graph (0, 0)][DBLP]
    XP, 2006, pp:198-199 [Conf]
  9. Phillip J. Brooke, Richard F. Paige
    Fault trees for security system design and analysis. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:256-264 [Journal]
  10. Richard F. Paige, Jonathan S. Ostroff, Phillip J. Brooke
    Principles for modeling language design. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2000, v:42, n:10, pp:665-675 [Journal]
  11. Jonathan S. Ostroff, Richard F. Paige, David Makalsky, Phillip J. Brooke
    E-Tester: a Contract-Aware and Agent-Based Unit Testing Framework for Eiffel. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2005, v:4, n:7, pp:97-114 [Journal]
  12. Richard F. Paige, Phillip J. Brooke
    Integrating BON and Object-Z. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2004, v:3, n:3, pp:121-141 [Journal]
  13. Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke
    Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2007, pp:129-141 [Conf]
  14. Peter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers
    A Novel Approach to the Detection of Cheating in Multiplayer Online Games. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2007, pp:97-106 [Conf]
  15. Xiaocheng Ge, Richard F. Paige, Fiona Polack, Phillip J. Brooke
    Extreme Programming Security Practices. [Citation Graph (0, 0)][DBLP]
    XP, 2007, pp:226-230 [Conf]
  16. Richard F. Paige, Triston S. Attridge, Phillip J. Brooke
    Game Development Using Design-by-Contract. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2006, v:5, n:7, pp:- [Journal]
  17. Richard F. Paige, Phillip J. Brooke, Jonathan S. Ostroff
    Metamodel-based model conformance and multiview consistency checking. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2007, v:16, n:3, pp:- [Journal]

  18. FPTC: Automated Safety Analysis for Domain-Specific Languages. [Citation Graph (, )][DBLP]


  19. Towards Agile Engineering of High-Integrity Systems. [Citation Graph (, )][DBLP]


  20. Lazy Exploration and Checking of CSP Models with CSPsim. [Citation Graph (, )][DBLP]


  21. Theorem Proving Support for View Consistency Checking. [Citation Graph (, )][DBLP]


  22. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002