The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John A. Clark: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John A. Clark, Jeremy Jacob
    Two-Stage Optimisation in the Design of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:242-254 [Conf]
  2. Thitima Srivatanakul, John A. Clark, Susan Stepney, Fiona Polack
    Challenging Formal Specifications by Mutation: a CSP security example. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:340-0 [Conf]
  3. Jonathan P. Bowen, Kirill Bogdanov, John A. Clark, Mark Harman, Robert M. Hierons, Paul Krause
    FORTEST: Formal Methods and Testing. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:91-104 [Conf]
  4. John A. Clark, Jeremy L. Jacob
    Fault Injection and a Timing Channel on an Analysis Technique. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:181-196 [Conf]
  5. Pantelimon Stanica, Subhamoy Maitra, John A. Clark
    Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:161-177 [Conf]
  6. Hao Chen, John Clark, Jeremy Jacob
    Human competitive security protocols synthesis. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:1855-1856 [Conf]
  7. John A. Clark, Jeremy L. Jacob, Susan Stepney
    Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It. [Citation Graph (0, 0)][DBLP]
    GECCO, 2003, pp:2022-2033 [Conf]
  8. Paul Massey, John A. Clark, Susan Stepney
    Evolving Quantum Circuits and Programs Through Genetic Programming. [Citation Graph (0, 0)][DBLP]
    GECCO (2), 2004, pp:569-580 [Conf]
  9. Paul Massey, John A. Clark, Susan Stepney
    Evolution of a human-competitive quantum fourier transform algorithm using genetic programming. [Citation Graph (0, 0)][DBLP]
    GECCO, 2005, pp:1657-1663 [Conf]
  10. Matthew Russell, John A. Clark, Susan Stepney
    Using Ants to Attack a Classical Cipher. [Citation Graph (0, 0)][DBLP]
    GECCO, 2003, pp:146-147 [Conf]
  11. Yuan Zhan, John A. Clark
    Search Based Automatic Test-Data Generation at an Architectural Level. [Citation Graph (0, 0)][DBLP]
    GECCO (2), 2004, pp:1413-1424 [Conf]
  12. Yuan Zhan, John A. Clark
    Search-based mutation testing for Simulink models. [Citation Graph (0, 0)][DBLP]
    GECCO, 2005, pp:1061-1068 [Conf]
  13. Yuan Zhan, John A. Clark
    The state problem for test generation in Simulink. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:1941-1948 [Conf]
  14. Susan Stepney, John A. Clark, Colin G. Johnson, Derek Partridge, Robert E. Smith
    Artificial Immune Systems and the Grand Challenge for Non-classical Computation. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2003, pp:204-216 [Conf]
  15. John A. McDermid, Andy Galloway, Simon Burton, John A. Clark, Ian Toyn, Nigel Tracey, Samuel H. Valentine
    Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1998, pp:76-0 [Conf]
  16. John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan
    Evolving Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:246-259 [Conf]
  17. Nigel Tracey, John A. Clark, Keith Mander
    Automated Program Flaw Finding Using Simulated Annealing. [Citation Graph (0, 0)][DBLP]
    ISSTA, 1998, pp:73-81 [Conf]
  18. Thitima Srivatanakul, John A. Clark, Fiona Polack
    Effective Security Requirements Analysis: HAZOP and Use Cases. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:416-427 [Conf]
  19. Nigel Tracey, John A. Clark, Keith Mander, John A. McDermid
    An Automated Framework for Structural Test-Data Generation. [Citation Graph (0, 0)][DBLP]
    ASE, 1998, pp:285-288 [Conf]
  20. Mark Harman, John A. Clark
    Metrics Are Fitness Functions Too. [Citation Graph (0, 0)][DBLP]
    IEEE METRICS, 2004, pp:58-69 [Conf]
  21. John A. Clark, Jeremy L. Jacob
    Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:82-95 [Conf]
  22. Howard Chivers, John A. Clark, Susan Stepney
    Smart Devices and Software Agents: The Basics of Good Behaviour. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:39-52 [Conf]
  23. Yang Liu, John A. Clark, Susan Stepney
    "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:31-45 [Conf]
  24. Howard Chivers, John A. Clark
    Smart dust, friend or foe?--Replacing identity with configuration trust. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:5, pp:723-740 [Journal]
  25. Paul Massey, John A. Clark, Susan Stepney
    Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming. [Citation Graph (0, 0)][DBLP]
    Evolutionary Computation, 2006, v:14, n:1, pp:21-40 [Journal]
  26. John A. Clark, Susan Stepney, Howard Chivers
    Breaking the Model: Finalisation and a Taxonomy of Security Attacks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:2, pp:225-242 [Journal]
  27. Chen Hao, John A. Clark, Jeremy L. Jacob
    Synthesising Efficient and Effective Security Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:25-41 [Journal]
  28. Darren L. Buttle, John A. Clark, John A. McDermid, Alan Stephenson, Nigel J. Tracey
    CONVERSE: A change-oriented process for engine controllers. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 1999, v:146, n:3, pp:130-136 [Journal]
  29. John A. Clark, José Javier Dolado, Mark Harman, Robert M. Hierons, B. Jones, M. Lumkin, Brian S. Mitchell, Spiros Mancoridis, K. Rees, Marc Roper, Martin J. Shepperd
    Formulating software engineering as a search problem. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 2003, v:150, n:3, pp:161-175 [Journal]
  30. John A. Clark, Jeremy L. Jacob
    Protocols are programs too: the meta-heuristic search for security protocols. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2001, v:43, n:14, pp:891-904 [Journal]
  31. John A. Clark, Jeremy Jacob
    On the Security of Recent Protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:56, n:3, pp:151-155 [Journal]
  32. Susan Stepney, Samuel L. Braunstein, John A. Clark, Andrew M. Tyrrell, Andrew Adamatzky, Robert E. Smith, Thomas R. Addis, Colin G. Johnson, Jonathan Timmis, Peter H. Welch, Robin Milner, Derek Partridge
    Journeys in non-classical computation II: initial journeys and waypoints. [Citation Graph (0, 0)][DBLP]
    Parallel Algorithms Appl., 2006, v:21, n:2, pp:97-125 [Journal]
  33. Susan Stepney, Samuel L. Braunstein, John A. Clark, Andrew M. Tyrrell, Andrew Adamatzky, Robert E. Smith, Tom Addis, Colin G. Johnson, Jonathan Timmis, Peter H. Welch, Robin Milner, Derek Partridge
    Journeys in non-classical computation I: A grand challenge for computing research. [Citation Graph (0, 0)][DBLP]
    Parallel Algorithms Appl., 2005, v:20, n:1, pp:5-19 [Journal]
  34. Nigel Tracey, John A. Clark, Keith Mander, John A. McDermid
    Automated test-data generation for exception conditions. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2000, v:30, n:1, pp:61-79 [Journal]
  35. John A. Clark, Mark Harman, Robert M. Hierons
    Editorial: Software testing in the United Kingdom. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 2004, v:14, n:3, pp:165-166 [Journal]
  36. Sun-Woo Kim, John A. Clark, John A. McDermid
    Investigating the effectiveness of object-oriented testing strategies using the mutation method. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 2001, v:11, n:3, pp:207-225 [Journal]

  37. Optimising IDS Sensor Placement. [Citation Graph (, )][DBLP]


  38. Learning Autonomic Security Reconfiguration Policies. [Citation Graph (, )][DBLP]


  39. Deviational Analyses for Validating Regulations on Real Systems. [Citation Graph (, )][DBLP]


  40. Fine-Grained Timing Using Genetic Programming. [Citation Graph (, )][DBLP]


  41. Searching for resource-efficient programs: low-power pseudorandom number generators. [Citation Graph (, )][DBLP]


  42. Using automated search to generate test data for matlab. [Citation Graph (, )][DBLP]


  43. An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms. [Citation Graph (, )][DBLP]


  44. Threat Modelling in User Performed Authentication. [Citation Graph (, )][DBLP]


  45. Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. [Citation Graph (, )][DBLP]


  46. Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. [Citation Graph (, )][DBLP]


  47. Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  48. Multi-objective Improvement of Software Using Co-evolution and Smart Seeding. [Citation Graph (, )][DBLP]


  49. Automatic Test Data Generation for Multiple Condition and MCDC Coverage. [Citation Graph (, )][DBLP]


  50. Heuristic search for non-linear cryptanalytic approximations. [Citation Graph (, )][DBLP]


  51. Comparing algorithms for search-based test data generation of Matlab® Simulink® models. [Citation Graph (, )][DBLP]


  52. A Deployment Value Model for Intrusion Detection Sensors. [Citation Graph (, )][DBLP]


  53. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  54. User behaviour based phishing websites detection. [Citation Graph (, )][DBLP]


  55. Automated Design of Security Protocols. [Citation Graph (, )][DBLP]


  56. Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion. [Citation Graph (, )][DBLP]


  57. Risk profiles and distributed risk assessment. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002