Search the dblp DataBase
John A. Clark :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John A. Clark , Jeremy Jacob Two-Stage Optimisation in the Design of Boolean Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:242-254 [Conf ] Thitima Srivatanakul , John A. Clark , Susan Stepney , Fiona Polack Challenging Formal Specifications by Mutation: a CSP security example. [Citation Graph (0, 0)][DBLP ] APSEC, 2003, pp:340-0 [Conf ] Jonathan P. Bowen , Kirill Bogdanov , John A. Clark , Mark Harman , Robert M. Hierons , Paul Krause FORTEST: Formal Methods and Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:91-104 [Conf ] John A. Clark , Jeremy L. Jacob Fault Injection and a Timing Channel on an Analysis Technique. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:181-196 [Conf ] Pantelimon Stanica , Subhamoy Maitra , John A. Clark Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP ] FSE, 2004, pp:161-177 [Conf ] Hao Chen , John Clark , Jeremy Jacob Human competitive security protocols synthesis. [Citation Graph (0, 0)][DBLP ] GECCO, 2006, pp:1855-1856 [Conf ] John A. Clark , Jeremy L. Jacob , Susan Stepney Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It. [Citation Graph (0, 0)][DBLP ] GECCO, 2003, pp:2022-2033 [Conf ] Paul Massey , John A. Clark , Susan Stepney Evolving Quantum Circuits and Programs Through Genetic Programming. [Citation Graph (0, 0)][DBLP ] GECCO (2), 2004, pp:569-580 [Conf ] Paul Massey , John A. Clark , Susan Stepney Evolution of a human-competitive quantum fourier transform algorithm using genetic programming. [Citation Graph (0, 0)][DBLP ] GECCO, 2005, pp:1657-1663 [Conf ] Matthew Russell , John A. Clark , Susan Stepney Using Ants to Attack a Classical Cipher. [Citation Graph (0, 0)][DBLP ] GECCO, 2003, pp:146-147 [Conf ] Yuan Zhan , John A. Clark Search Based Automatic Test-Data Generation at an Architectural Level. [Citation Graph (0, 0)][DBLP ] GECCO (2), 2004, pp:1413-1424 [Conf ] Yuan Zhan , John A. Clark Search-based mutation testing for Simulink models. [Citation Graph (0, 0)][DBLP ] GECCO, 2005, pp:1061-1068 [Conf ] Yuan Zhan , John A. Clark The state problem for test generation in Simulink. [Citation Graph (0, 0)][DBLP ] GECCO, 2006, pp:1941-1948 [Conf ] Susan Stepney , John A. Clark , Colin G. Johnson , Derek Partridge , Robert E. Smith Artificial Immune Systems and the Grand Challenge for Non-classical Computation. [Citation Graph (0, 0)][DBLP ] ICARIS, 2003, pp:204-216 [Conf ] John A. McDermid , Andy Galloway , Simon Burton , John A. Clark , Ian Toyn , Nigel Tracey , Samuel H. Valentine Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap. [Citation Graph (0, 0)][DBLP ] ICFEM, 1998, pp:76-0 [Conf ] John A. Clark , Jeremy L. Jacob , Susan Stepney , Subhamoy Maitra , William Millan Evolving Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:246-259 [Conf ] Nigel Tracey , John A. Clark , Keith Mander Automated Program Flaw Finding Using Simulated Annealing. [Citation Graph (0, 0)][DBLP ] ISSTA, 1998, pp:73-81 [Conf ] Thitima Srivatanakul , John A. Clark , Fiona Polack Effective Security Requirements Analysis: HAZOP and Use Cases. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:416-427 [Conf ] Nigel Tracey , John A. Clark , Keith Mander , John A. McDermid An Automated Framework for Structural Test-Data Generation. [Citation Graph (0, 0)][DBLP ] ASE, 1998, pp:285-288 [Conf ] Mark Harman , John A. Clark Metrics Are Fitness Functions Too. [Citation Graph (0, 0)][DBLP ] IEEE METRICS, 2004, pp:58-69 [Conf ] John A. Clark , Jeremy L. Jacob Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:82-95 [Conf ] Howard Chivers , John A. Clark , Susan Stepney Smart Devices and Software Agents: The Basics of Good Behaviour. [Citation Graph (0, 0)][DBLP ] SPC, 2003, pp:39-52 [Conf ] Yang Liu , John A. Clark , Susan Stepney "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:31-45 [Conf ] Howard Chivers , John A. Clark Smart dust, friend or foe?--Replacing identity with configuration trust. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:5, pp:723-740 [Journal ] Paul Massey , John A. Clark , Susan Stepney Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming. [Citation Graph (0, 0)][DBLP ] Evolutionary Computation, 2006, v:14, n:1, pp:21-40 [Journal ] John A. Clark , Susan Stepney , Howard Chivers Breaking the Model: Finalisation and a Taxonomy of Security Attacks. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:225-242 [Journal ] Chen Hao , John A. Clark , Jeremy L. Jacob Synthesising Efficient and Effective Security Protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:25-41 [Journal ] Darren L. Buttle , John A. Clark , John A. McDermid , Alan Stephenson , Nigel J. Tracey CONVERSE: A change-oriented process for engine controllers. [Citation Graph (0, 0)][DBLP ] IEE Proceedings - Software, 1999, v:146, n:3, pp:130-136 [Journal ] John A. Clark , José Javier Dolado , Mark Harman , Robert M. Hierons , B. Jones , M. Lumkin , Brian S. Mitchell , Spiros Mancoridis , K. Rees , Marc Roper , Martin J. Shepperd Formulating software engineering as a search problem. [Citation Graph (0, 0)][DBLP ] IEE Proceedings - Software, 2003, v:150, n:3, pp:161-175 [Journal ] John A. Clark , Jeremy L. Jacob Protocols are programs too: the meta-heuristic search for security protocols. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2001, v:43, n:14, pp:891-904 [Journal ] John A. Clark , Jeremy Jacob On the Security of Recent Protocols. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:56, n:3, pp:151-155 [Journal ] Susan Stepney , Samuel L. Braunstein , John A. Clark , Andrew M. Tyrrell , Andrew Adamatzky , Robert E. Smith , Thomas R. Addis , Colin G. Johnson , Jonathan Timmis , Peter H. Welch , Robin Milner , Derek Partridge Journeys in non-classical computation II: initial journeys and waypoints. [Citation Graph (0, 0)][DBLP ] Parallel Algorithms Appl., 2006, v:21, n:2, pp:97-125 [Journal ] Susan Stepney , Samuel L. Braunstein , John A. Clark , Andrew M. Tyrrell , Andrew Adamatzky , Robert E. Smith , Tom Addis , Colin G. Johnson , Jonathan Timmis , Peter H. Welch , Robin Milner , Derek Partridge Journeys in non-classical computation I: A grand challenge for computing research. [Citation Graph (0, 0)][DBLP ] Parallel Algorithms Appl., 2005, v:20, n:1, pp:5-19 [Journal ] Nigel Tracey , John A. Clark , Keith Mander , John A. McDermid Automated test-data generation for exception conditions. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2000, v:30, n:1, pp:61-79 [Journal ] John A. Clark , Mark Harman , Robert M. Hierons Editorial: Software testing in the United Kingdom. [Citation Graph (0, 0)][DBLP ] Softw. Test., Verif. Reliab., 2004, v:14, n:3, pp:165-166 [Journal ] Sun-Woo Kim , John A. Clark , John A. McDermid Investigating the effectiveness of object-oriented testing strategies using the mutation method. [Citation Graph (0, 0)][DBLP ] Softw. Test., Verif. Reliab., 2001, v:11, n:3, pp:207-225 [Journal ] Optimising IDS Sensor Placement. [Citation Graph (, )][DBLP ] Learning Autonomic Security Reconfiguration Policies. [Citation Graph (, )][DBLP ] Deviational Analyses for Validating Regulations on Real Systems. [Citation Graph (, )][DBLP ] Fine-Grained Timing Using Genetic Programming. [Citation Graph (, )][DBLP ] Searching for resource-efficient programs: low-power pseudorandom number generators. [Citation Graph (, )][DBLP ] Using automated search to generate test data for matlab. [Citation Graph (, )][DBLP ] An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms. [Citation Graph (, )][DBLP ] Threat Modelling in User Performed Authentication. [Citation Graph (, )][DBLP ] Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. [Citation Graph (, )][DBLP ] Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. [Citation Graph (, )][DBLP ] Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Multi-objective Improvement of Software Using Co-evolution and Smart Seeding. [Citation Graph (, )][DBLP ] Automatic Test Data Generation for Multiple Condition and MCDC Coverage. [Citation Graph (, )][DBLP ] Heuristic search for non-linear cryptanalytic approximations. [Citation Graph (, )][DBLP ] Comparing algorithms for search-based test data generation of Matlab® Simulink® models. [Citation Graph (, )][DBLP ] A Deployment Value Model for Intrusion Detection Sensors. [Citation Graph (, )][DBLP ] Power-Aware Intrusion Detection in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] User behaviour based phishing websites detection. [Citation Graph (, )][DBLP ] Automated Design of Security Protocols. [Citation Graph (, )][DBLP ] Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion. [Citation Graph (, )][DBLP ] Risk profiles and distributed risk assessment. [Citation Graph (, )][DBLP ] Search in 0.042secs, Finished in 0.044secs