Chris Hankin

Orcid: 0000-0001-9149-8577

Affiliations:
  • Imperial College London, UK


According to our database1, Chris Hankin authored at least 125 papers between 1982 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems.
Comput. Secur., September, 2023

2022
Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool.
CoRR, 2022

Decision support for healthcare cyber security.
Comput. Secur., 2022

Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases.
Comput. Secur., 2022

Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

2021
Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT.
ACM Trans. Cyber Phys. Syst., 2021

Certified Federated Adversarial Training.
CoRR, 2021

2020
Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies.
J. Inf. Secur. Appl., 2020

MaxSAT Evaluation 2020 - Benchmark: Identifying Maximum Probability Minimal Cut Sets in Fault Trees.
CoRR, 2020

CyRes - Avoiding Catastrophic Failure in Connected and Autonomous Vehicles (Extended Abstract).
CoRR, 2020

Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Scalable Approach to Enhancing ICS Resilience by Network Diversity.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Trustworthy Inter-connected Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2020

2019
Real-time processing of social media with SENTINEL: A syndromic surveillance system incorporating deep learning for health classification.
Inf. Process. Manag., 2019

Assessing Cyber-Physical Security in Industrial Control Systems.
CoRR, 2019

Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks.
CoRR, 2019

MaxSAT Evaluation 2019 - Benchmark: Identifying Security-Critical Cyber-Physical Components in Weighted AND/OR Graphs.
CoRR, 2019

Deep Latent Defence.
CoRR, 2019

Identifying Security-Critical Cyber-Physical Components in Industrial Control Systems.
CoRR, 2019

Welcome to the Europe region special section.
Commun. ACM, 2019

Adversarial Machine Learning Beyond the Image Domain.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Improving ICS Cyber Resilience through Optimal Diversification of Network Resources.
CoRR, 2018

Regulating automated decision making.
Commun. ACM, 2018

CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research.
Proceedings of the 24th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2018

2016
Decision support approaches for cyber security investment.
Decis. Support Syst., 2016

The early bird catches the term: combining twitter and news data for event detection and situational awareness.
J. Biomed. Semant., 2016

Modelling Cost-Effectiveness of Defenses in Industrial Control Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Defense-in-depth vs. Critical Component Defense for Industrial Control Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Efficient Numerical Frameworks for Multi-objective Cyber Security Planning.
Proceedings of the Computer Security - ESORICS 2016, 2016

Effective Defence Against Zero-Day Exploits Using Bayesian Networks.
Proceedings of the Critical Information Infrastructures Security, 2016

Game Theory and Industrial Control Systems.
Proceedings of the Semantics, Logics, and Calculi, 2016

2015
Discovery of anomalous behaviour in temporal networks.
Soc. Networks, 2015

DEFENDER: Detecting and Forecasting Epidemics using Novel Data-analytics for Enhanced Response.
CoRR, 2015

Comparing Decision Support Approaches for Cyber Security Investment.
CoRR, 2015

A Model-based Approach to Interdependency between Safety and Security in ICS.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

2014
Fast multi-scale detection of overlapping communities using local criteria.
Computing, 2014

Ranking twitter influence by combining network centrality and influence observables in an evolutionary model.
J. Complex Networks, 2014

Game Theory Meets Information Security Management.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Cybersecurity Games and Investments: A Decision Support Approach.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
Predictive access control for distributed computation.
Sci. Comput. Program., 2013

Multi-scale community detection using stability optimisation.
Int. J. Web Based Communities, 2013

Fast Multi-Scale Community Detection based on Local Criteria within a Multi-Threaded Algorithm
CoRR, 2013

A short note on Simulation and Abstraction.
Proceedings of the Semantics, 2013

Fast Multi-Scale Detection of Relevant Communities in Large-Scale Networks.
Comput. J., 2013

Payoffs, Intensionality and Abstraction in Games.
Proceedings of the Computation, Logic, Games, and Quantum Foundations. The Many Facets of Samson Abramsky, 2013

2012
Fast Multi-Scale Detection of Relevant Communities
CoRR, 2012

Secondary use of data in EHR systems
CoRR, 2012

Multi-scale Community Detection using Stability Optimisation within Greedy Algorithms
CoRR, 2012

2011
Probabilistic timing covert channels: to close or not to close?
Int. J. Inf. Sec., 2011

Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm.
Proceedings of the KDIR 2011, 2011

2010
Program Analysis Probably Counts.
Comput. J., 2010

Probabilistic Aspects: Checking Security in an Imperfect World.
Proceedings of the Trustworthly Global Computing - 5th International Symposium, 2010

Probabilistic Semantics and Program Analysis.
Proceedings of the Formal Methods for Quantitative Aspects of Programming Languages, 2010

2009
Advice from Belnap Policies.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Quantifying Timing Leaks and Cost Optimisation.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Advice for Coordination.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

2007
Efficient field-sensitive pointer analysis of C.
ACM Trans. Program. Lang. Syst., 2007

Tempus fugit: How to plug it.
J. Log. Algebraic Methods Program., 2007

On Probabilistic Techniques for Data Flow Analysis.
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages, 2007

A Systematic Approach to Probabilistic Pointer Analysis.
Proceedings of the Programming Languages and Systems, 5th Asian Symposium, 2007

2006
A framework for security analysis of mobile wireless networks.
Theor. Comput. Sci., 2006

Abstract Interpretation for Worst and Average Case Analysis.
Proceedings of the Program Analysis and Compilation, 2006

2005
Measuring the confinement of probabilistic systems.
Theor. Comput. Sci., 2005

Probabilistic /lambda-calculus and Quantitative Program Analysis.
J. Log. Comput., 2005

Quantitative static analysis of distributed systems.
J. Funct. Program., 2005

On Reversible Combinatory Logic.
Proceedings of the First International Workshop on Developments in Computational Models, 2005

On a Probabilistic Chemical Abstract Machine and the Expressiveness of Linda Languages.
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005

2004
Online Cycle Detection and Difference Propagation: Applications to Pointer Analysis.
Softw. Qual. J., 2004

Approximate Non-interference.
J. Comput. Secur., 2004

Continuous-Time Probabilistic KLAIM.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004

Formal Security Analysis for Ad-Hoc Networks.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

lambda-calculus and Quantitative Program Analysis: (Extended Abstract).
Proceedings of the Second Workshop on Quantitative Aspects of Programming Languages, 2004

Probabilistic Linda-Based Coordination Languages.
Proceedings of the Formal Methods for Components and Objects, 2004

Probabilistic KLAIM.
Proceedings of the Coordination Models and Languages, 6th International Conference, 2004

2003
Online Cycle Detection and Difference Propagation for Pointer Analysis.
Proceedings of the 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 2003

Quantitative Relations and Approximate Process Equivalences.
Proceedings of the CONCUR 2003, 2003

2002
Information flow for Algol-like languages.
Comput. Lang. Syst. Struct., 2002

Analysing Approximate Confinement under Uniform Attacks.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Two Formal Approaches for Approximating Noninterference Properties.
Proceedings of the Foundations of Security Analysis and Design II, 2002

Flow Analysis: Games and Nets.
Proceedings of the Essence of Computation, Complexity, Analysis, 2002

2001
Probabilistic confinement in a declarative framework.
Proceedings of the Declarative Programming, 2001

2000
Safety of Strictness Analysis via Term Graph Rewriting.
Proceedings of the Static Analysis, 7th International Symposium, 2000

1999
Program Analysis Games.
ACM Comput. Surv., 1999

Non-Deterministic Games and Program Analysis: An Application to Security.
Proceedings of the 14th Annual IEEE Symposium on Logic in Computer Science, 1999

Principles of program analysis.
Springer, ISBN: 978-3-540-65410-0, 1999

1998
Refining Multiset Tranformers.
Theor. Comput. Sci., 1998

Foreword: Theoretical Aspects of Coordination Languages.
Theor. Comput. Sci., 1998

Program Analysis Tools.
Int. J. Softw. Tools Technol. Transf., 1998

Coordination Languages for Parallel Programming.
Parallel Comput., 1998

Guest Editor's Foreword.
Nord. J. Comput., 1998

Generalised Flowcharts and Games.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

A New Approach to Control Flow Analysis.
Proceedings of the Compiler Construction, 7th International Conference, 1998

1997
Position Statements on Strategic Directions for Research on Programming Languages.
ACM SIGPLAN Notices, 1997

1996
Strategic Directions in Research on Programming Languages.
ACM Comput. Surv., 1996

Computing Surveys Symposium on Models of Programming Languages and Compuation.
ACM Comput. Surv., 1996

1995
Lazy Type Inference and Program Analysis.
Sci. Comput. Program., 1995

1994
Approximate Fixed Points in Abstract Interpretation.
Sci. Comput. Program., 1994

A Type-based Framework for Program Analysis.
Proceedings of the Static Analysis, First International Static Analysis Symposium, 1994

Deriving Algorithms From Type Inference Systems: Application to Strictness Analysis.
Proceedings of the Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1994

Preface.
Proceedings of the Proceedings for the Second Imperial College Department of Computing Workshop on Theory and Formal Methods, 1994

Static Analysis of Value-Passing Process Calculi.
Proceedings of the Proceedings for the Second Imperial College Department of Computing Workshop on Theory and Formal Methods, 1994

Lazy Type Inference for the Strictness Analysis of Lists.
Proceedings of the Programming Languages and Systems, 1994

1993
Editorial: Logic in Abstract Interpretation.
J. Log. Comput., 1993

A Congruence for Gamma Programs.
Proceedings of the Static Analysis, Third International Workshop, 1993

A Lattice of Abstract Graphs.
Proceedings of the Programming Language Implementation and Logic Programming, 1993

A Parallel Programming Style and Its Algebra of Programs.
Proceedings of the PARLE '93, 1993

Graph Rewriting Systems and Abstract Interpretation.
Proceedings of the Theory and Formal Methods 1993, 1993

Reasoning About Gamma Programs.
Proceedings of the Theory and Formal Methods 1993, 1993

1992
Editorial.
J. Log. Comput., 1992

Transformation of Gamma Programs.
Proceedings of the Actes WSA'92 Workshop on Static Analysis (Bordeaux, 1992

A Calculus of Gamma Programs.
Proceedings of the Languages and Compilers for Parallel Computing, 1992

1991
Fixed Points and Frontiers: A New Perspective.
J. Funct. Program., 1991

Static Analysis of Term Graph Rewriting Systems.
Proceedings of the PARLE '91: Parallel Architectures and Languages Europe, 1991

1990
Parallel object-oriented descriptions of graph reduction machines.
Future Gener. Comput. Syst., 1990

Abstract Interpretation of Term Graph Rewriting Systems.
Proceedings of the 1990 Glasgow Workshop on Functional Programming, 1990

1989
Parallel Object-Oriented Descriptions of Graph Reduction Machines (extended abstract).
Proceedings of the PARLE '89: Parallel Architectures and Languages Europe, 1989

1988
A Safe Approach to Parallel Combinator Reduction.
Theor. Comput. Sci., 1988

1987
COBWEB-2: Structured Specification of a Wafer-Scale Supercomputer.
Proceedings of the PARLE, 1987

Finding fixed points in finite lattices.
Proceedings of the Functional Programming Languages and Computer Architecture, 1987

1986
Strictness Analysis for Higher-Order Functions.
Sci. Comput. Program., 1986

A Safe Approach to Parallel Combinator Reduction (Extended Abstract).
Proceedings of the ESOP 86, 1986

1985
The theory of strictness analysis for higher order functions.
Proceedings of the Programs as Data Objects, 1985

COBWEB - A Combinator Reduction Architecture.
Proceedings of the Functional Programming Languages and Computer Architecture, 1985

1982
Structured Data Flow Programming.
ACM SIGPLAN Notices, 1982


  Loading...