Chris Hankin

According to our database1, Chris Hankin
  • authored at least 106 papers between 1982 and 2016.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2016
Decision support approaches for cyber security investment.
Decision Support Systems, 2016

The early bird catches the term: combining twitter and news data for event detection and situational awareness.
J. Biomedical Semantics, 2016

Modelling Cost-Effectiveness of Defenses in Industrial Control Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Defense-in-depth vs. Critical Component Defense for Industrial Control Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Efficient Numerical Frameworks for Multi-objective Cyber Security Planning.
Proceedings of the Computer Security - ESORICS 2016, 2016

Effective Defence Against Zero-Day Exploits Using Bayesian Networks.
Proceedings of the Critical Information Infrastructures Security, 2016

Game Theory and Industrial Control Systems.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
Discovery of anomalous behaviour in temporal networks.
Social Networks, 2015

The Early Bird Catches The Term: Combining Twitter and News Data For Event Detection and Situational Awareness.
CoRR, 2015

DEFENDER: Detecting and Forecasting Epidemics using Novel Data-analytics for Enhanced Response.
CoRR, 2015

Comparing Decision Support Approaches for Cyber Security Investment.
CoRR, 2015

A Model-based Approach to Interdependency between Safety and Security in ICS.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

2014
Fast multi-scale detection of overlapping communities using local criteria.
Computing, 2014

Ranking twitter influence by combining network centrality and influence observables in an evolutionary model.
J. Complex Networks, 2014

Game Theory Meets Information Security Management.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Cybersecurity Games and Investments: A Decision Support Approach.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
Predictive access control for distributed computation.
Sci. Comput. Program., 2013

Multi-scale community detection using stability optimisation.
IJWBC, 2013

Fast Multi-Scale Community Detection based on Local Criteria within a Multi-Threaded Algorithm
CoRR, 2013

A short note on Simulation and Abstraction.
Proceedings of the Semantics, 2013

Fast Multi-Scale Detection of Relevant Communities in Large-Scale Networks.
Comput. J., 2013

Ranking Twitter Influence by Combining Network Centrality and Influence Observables in an Evolutionary Model.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Payoffs, Intensionality and Abstraction in Games.
Proceedings of the Computation, Logic, Games, and Quantum Foundations. The Many Facets of Samson Abramsky, 2013

2012
Fast Multi-Scale Detection of Relevant Communities
CoRR, 2012

Secondary use of data in EHR systems
CoRR, 2012

Multi-scale Community Detection using Stability Optimisation within Greedy Algorithms
CoRR, 2012

2011
Probabilistic timing covert channels: to close or not to close?
Int. J. Inf. Sec., 2011

Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm.
Proceedings of the KDIR 2011, 2011

2010
Program Analysis Probably Counts.
Comput. J., 2010

Probabilistic Aspects: Checking Security in an Imperfect World.
Proceedings of the Trustworthly Global Computing - 5th International Symposium, 2010

Probabilistic Semantics and Program Analysis.
Proceedings of the Formal Methods for Quantitative Aspects of Programming Languages, 2010

2009
Advice from Belnap Policies.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Quantifying Timing Leaks and Cost Optimisation
CoRR, 2008

Quantifying Timing Leaks and Cost Optimisation.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Advice for Coordination.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

2007
Efficient field-sensitive pointer analysis of C.
ACM Trans. Program. Lang. Syst., 2007

Tempus fugit: How to plug it.
J. Log. Algebr. Program., 2007

On Probabilistic Techniques for Data Flow Analysis.
Electr. Notes Theor. Comput. Sci., 2007

A Systematic Approach to Probabilistic Pointer Analysis.
Proceedings of the Programming Languages and Systems, 5th Asian Symposium, 2007

2006
A framework for security analysis of mobile wireless networks.
Theor. Comput. Sci., 2006

Reversible combinatory logic.
Mathematical Structures in Computer Science, 2006

On Reversible Combinatory Logic.
Electr. Notes Theor. Comput. Sci., 2006

Formal Security Analysis for Ad-Hoc Networks.
Electr. Notes Theor. Comput. Sci., 2006

Abstract Interpretation for Worst and Average Case Analysis.
Proceedings of the Program Analysis and Compilation, 2006

2005
Measuring the confinement of probabilistic systems.
Theor. Comput. Sci., 2005

Probabilistic /lambda-calculus and Quantitative Program Analysis.
J. Log. Comput., 2005

Quantitative static analysis of distributed systems.
J. Funct. Program., 2005

Continuous-Time Probabilistic KLAIM.
Electr. Notes Theor. Comput. Sci., 2005

lambda-calculus and Quantitative Program Analysis: (Extended Abstract).
Electr. Notes Theor. Comput. Sci., 2005

On a Probabilistic Chemical Abstract Machine and the Expressiveness of Linda Languages.
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005

2004
Online Cycle Detection and Difference Propagation: Applications to Pointer Analysis.
Software Quality Journal, 2004

Approximate Non-interference.
Journal of Computer Security, 2004

Efficient field-sensitive pointer analysis for C.
Proceedings of the 2004 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, 2004

Probabilistic Linda-Based Coordination Languages.
Proceedings of the Formal Methods for Components and Objects, 2004

Probabilistic KLAIM.
Proceedings of the Coordination Models and Languages, 6th International Conference, 2004

2003
Online Cycle Detection and Difference Propagation for Pointer Analysis.
Proceedings of the 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 2003

Quantitative Relations and Approximate Process Equivalences.
Proceedings of the CONCUR 2003, 2003

2002
Information flow for Algol-like languages.
Comput. Lang., 2002

Analysing Approximate Confinement under Uniform Attacks.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Two Formal Approaches for Approximating Noninterference Properties.
Proceedings of the Foundations of Security Analysis and Design II, 2002

Approximate Non-Interference.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

Flow Analysis: Games and Nets.
Proceedings of the Essence of Computation, Complexity, Analysis, 2002

2001
Probabilistic confinement in a declarative framework.
Electr. Notes Theor. Comput. Sci., 2001

2000
Safety of Strictness Analysis via Term Graph Rewriting.
Proceedings of the Static Analysis, 7th International Symposium, 2000

1999
Program Analysis Games.
ACM Comput. Surv., 1999

Non-Deterministic Games and Program Analysis: An Application to Security.
Proceedings of the 14th Annual IEEE Symposium on Logic in Computer Science, 1999

Principles of program analysis.
Springer, ISBN: 978-3-540-65410-0, 1999

1998
Refining Multiset Tranformers.
Theor. Comput. Sci., 1998

Foreword: Theoretical Aspects of Coordination Languages.
Theor. Comput. Sci., 1998

Program Analysis Tools.
STTT, 1998

Coordination Languages for Parallel Programming.
Parallel Computing, 1998

Guest Editor's Foreword.
Nord. J. Comput., 1998

Generalised Flowcharts and Games.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

A New Approach to Control Flow Analysis.
Proceedings of the Compiler Construction, 7th International Conference, 1998

1997
Position Statements on Strategic Directions for Research on Programming Languages.
SIGPLAN Notices, 1997

1996
Strategic Directions in Research on Programming Languages.
ACM Comput. Surv., 1996

Computing Surveys Symposium on Models of Programming Languages and Compuation.
ACM Comput. Surv., 1996

1995
Lazy Type Inference and Program Analysis.
Sci. Comput. Program., 1995

1994
Approximate Fixed Points in Abstract Interpretation.
Sci. Comput. Program., 1994

A Type-based Framework for Program Analysis.
SAS, 1994

Deriving Algorithms From Type Inference Systems: Application to Strictness Analysis.
Proceedings of the Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1994

Preface.
Proceedings of the Proceedings for the Second Imperial College Department of Computing Workshop on Theory and Formal Methods, 1994

Static Analysis of Value-Passing Process Calculi.
Proceedings of the Proceedings for the Second Imperial College Department of Computing Workshop on Theory and Formal Methods, 1994

Lazy Type Inference for the Strictness Analysis of Lists.
Proceedings of the Programming Languages and Systems, 1994

1993
Editorial: Logic in Abstract Interpretation.
J. Log. Comput., 1993

A Congruence for Gamma Programs.
Proceedings of the Static Analysis, Third International Workshop, 1993

A Lattice of Abstract Graphs.
Proceedings of the Programming Language Implementation and Logic Programming, 1993

A Parallel Programming Style and Its Algebra of Programs.
Proceedings of the PARLE '93, 1993

Graph Rewriting Systems and Abstract Interpretation.
Proceedings of the Theory and Formal Methods 1993, 1993

Reasoning About Gamma Programs.
Proceedings of the Theory and Formal Methods 1993, 1993

1992
Editorial.
J. Log. Comput., 1992

Transformation of Gamma Programs.
Proceedings of the Actes WSA'92 Workshop on Static Analysis (Bordeaux), 1992

A Calculus of Gamma Programs.
Proceedings of the Languages and Compilers for Parallel Computing, 1992

Approximate Fixed Points in Abstract Interpretation.
Proceedings of the ESOP '92, 1992

1991
Fixed Points and Frontiers: A New Perspective.
J. Funct. Program., 1991

Static Analysis of Term Graph Rewriting Systems.
Proceedings of the PARLE '91: Parallel Architectures and Languages Europe, 1991

1990
Parallel object-oriented descriptions of graph reduction machines.
Future Generation Comp. Syst., 1990

1989
Parallel Object-Oriented Descriptions of Graph Reduction Machines (extended abstract).
Proceedings of the PARLE '89: Parallel Architectures and Languages Europe, 1989

1988
A Safe Approach to Parallel Combinator Reduction.
Theor. Comput. Sci., 1988

1987
COBWEB-2: Structured Specification of a Wafer-Scale Supercomputer.
Proceedings of the PARLE, 1987

Finding fixed points in finite lattices.
Proceedings of the Functional Programming Languages and Computer Architecture, 1987

1986
Strictness Analysis for Higher-Order Functions.
Sci. Comput. Program., 1986

A Safe Approach to Parallel Combinator Reduction (Extended Abstract).
Proceedings of the ESOP 86, 1986

1985
The theory of strictness analysis for higher order functions.
Proceedings of the Programs as Data Objects, 1985

COBWEB - A Combinator Reduction Architecture.
Proceedings of the Functional Programming Languages and Computer Architecture, 1985

1982
Structured Data Flow Programming.
SIGPLAN Notices, 1982


  Loading...