Colin J. Fidge

Orcid: 0000-0002-9410-7217

Affiliations:
  • Queensland University of Technology, Brisbane, Australia


According to our database1, Colin J. Fidge authored at least 152 papers between 1983 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Discovering a data interpreted petri net model of industrial control systems for anomaly detection.
Expert Syst. Appl., November, 2023

Optimization of Airborne Scatterometer NRCS Semicircular Sampling for Sea Wind Retrieval.
Remote. Sens., March, 2023

Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode.
Sensors, February, 2023

Jump-Starting Software Engineering Careers.
IEEE Softw., 2023

2022
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control.
IEEE Trans. Ind. Informatics, 2022

A Review of Emerging Technologies for IoT-Based Smart Cities.
Sensors, 2022

Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems.
IEEE Access, 2022

2021
A scheduling-based dynamic fog computing framework for augmenting resource utilization.
Simul. Model. Pract. Theory, 2021

Specific Resonant Properties of Non-Symmetrical Microwave Antennas.
Sensors, 2021

An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes.
Sensors, 2021

A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes.
Sensors, 2021

HIBAF: A data security scheme for fog computing.
J. High Speed Networks, 2021

BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture.
IEEE Access, 2021

Microservice Remodularisation of Monolithic Enterprise Systems for Embedding in Industrial IoT Networks.
Proceedings of the Advanced Information Systems Engineering, 2021

A Resilient Fog-IoT Framework for Seamless Microservice Execution.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
A Simple High-Precision 2-Port Vector Analyzer.
IEEE Access, 2020

Securing Manufacturing Using Blockchain.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Remodularization Analysis for Microservice Discovery Using Syntactic and Semantic Clustering.
Proceedings of the Advanced Information Systems Engineering, 2020

Design Guidelines for Effective Occupation-Based Personal Health Records.
Proceedings of the Australasian Computer Science Week, 2020

2019
Availability and Scalability Optimized Microservice Discovery from Enterprise Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Conferences, 2019

Business Object Centric Microservices Patterns.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Conferences, 2019

Generating Log Requirements for Checking Conformance against Healthcare Standards using Workflow Modelling.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

An Overall Health and Well-Being Data Model for Employer-Sponsored Personal Health Records.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

2018
Migrating Enterprise Legacy Source Code to Microservices: On Multitenancy, Statefulness, and Data Consistency.
IEEE Softw., 2018

A practical approach for detecting multi-tenancy data interference.
Sci. Comput. Program., 2018

Discovering Microservices in Enterprise Systems Using a Business Object Containment Heuristic.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

Function-Splitting Heuristics for Discovery of Microservices in Enterprise Systems.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

Employees' perceptions of sharing employer-sponsored personal health records.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Mining Resource Profiles from Event Logs.
ACM Trans. Manag. Inf. Syst., 2017

Scalable and efficient data distribution for distributed computing of all-to-all comparison problems.
Future Gener. Comput. Syst., 2017

A Comparison of Supervised Machine Learning Algorithms for Classification of Communications Network Traffic.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Challenges for Log Based Detection of Privacy Violations during Healthcare Emergencies.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Authenticated encryption for time-sensitive critical infrastructure.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems.
J. Parallel Distributed Comput., 2016

Evaluating and predicting overall process risk using event logs.
Inf. Sci., 2016

A Bayesian Network-based customer satisfaction model: a tool for management decisions in railway transport.
Decis. Anal., 2016

Personal health records as sources of productivity evidence.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Anatomy of log files: Implications for information accountability measures.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Combining unsupervised and invigilated assessment of introductory programming.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

A network forensics tool for precise data packet capture and replay in cyber-physical systems.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
LibVM: an architecture for shared library sandboxing.
Softw. Pract. Exp., 2015

Planting Bugs: A System for Testing Students' Unit Tests.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015

Distributed computing of all-to-all comparison problems in heterogeneous systems.
Proceedings of the IECON 2015, 2015

Application of Simulated Annealing to Data Distribution for All-to-All Comparison Problems in Homogeneous Systems.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Component Modeling for SCADA Network Mapping.
Proceedings of the 38th Australasian Computer Science Conference, 2015

2014
Domain-specific application analysis for customized instruction identification.
Microprocess. Microsystems, 2014

Precise relative clock synchronization for distributed control using TSC registers.
J. Netw. Comput. Appl., 2014

Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis.
Commun. Assoc. Inf. Syst., 2014

A distributed computing framework for All-to-All comparison problems.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

An Extensible Framework for Analysing Resource Behaviour Using Event Logs.
Proceedings of the Advanced Information Systems Engineering, 2014

2013
Security Metrics for Java Bytecode Programs (S).
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013

Algorithm clustering for multi-algorithm processor design.
Proceedings of the 2013 IEEE 31st International Conference on Computer Design, 2013

Intrusion detection in distributed systems, an approach based on taint marking.
Proceedings of IEEE International Conference on Communications, 2013

Profiling Event Logs to Configure Risk Indicators for Process Delays.
Proceedings of the Advanced Information Systems Engineering, 2013

What vs. how: comparing students' testing and coding skills.
Proceedings of the Fifteenth Australasian Computing Education Conference, 2013

Privacy-Aware Workflow Management.
Proceedings of the Business Process Management - Theory and Applications, 2013

2012
A Hardware Virtualization Based Component Sandboxing Architecture.
J. Softw., 2012

Predicting Deadline Transgressions Using Event Logs.
Proceedings of the Business Process Management Workshops, 2012

Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device.
Proceedings of the Tenth Australasian Information Security Conference, 2012

A taint marking approach to confidentiality violation detection.
Proceedings of the Tenth Australasian Information Security Conference, 2012

Data Flow Analysis of Embedded Program Expressions.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
Partitioning composite web services for decentralized execution using a genetic algorithm.
Future Gener. Comput. Syst., 2011

Data and process requirements for product recall coordination.
Comput. Ind., 2011

A Hierarchical Security Assessment Model for Object-Oriented Programs.
Proceedings of the 11th International Conference on Quality Software, 2011

A conditional retransmission enabled transport protocol for real-time networked control systems.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Resource Allocation and Scheduling of Multiple Composite Web Services in Cloud Computing Using Cooperative Coevolution Genetic Algorithm.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Workflow support for scheduling in surgical care processes.
Proceedings of the 19th European Conference on Information Systems, 2011

2010
Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance.
Int. J. Inf. Secur. Priv., 2010

QoS-oriented Resource Allocation and Scheduling of Multiple CompositeWeb Services in a Hybrid Cloud Using a Random-Key Genetic Algorithm.
Aust. J. Intell. Inf. Process. Syst., 2010

Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Performance analysis of IEEE 802.11 DCF based WNCS networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A Secure Framework and Related Protocols for Ubiquitous Access to Electronic Health Records Using Java SIM Cards.
Proceedings of the E-Health - First IMIA/IFIP Joint Symposium, 2010

Reconstruction of Falsified Computer Logs for Digital Forensics Investigations.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

Security Metrics for Object-Oriented Designs.
Proceedings of the 21st Australian Software Engineering Conference (ASWEC 2010), 2010

Assessing the Impact of Refactoring on Security-Critical Object-Oriented Designs.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

Process Mining and Simulation.
Proceedings of the Modern Business Process Automation - YAWL and its Support Environment, 2010

2009
A Medical Data Reliability Assessment Model.
J. Theor. Appl. Electron. Commer. Res., 2009

Workflow simulation for operational decision support.
Data Knowl. Eng., 2009

Security Metrics for Object-Oriented Class Designs.
Proceedings of the Ninth International Conference on Quality Software, 2009

Hybrid system simulation of computer control applications over communication networks.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

Integrating hardware and software information flow analyses.
Proceedings of the 2009 ACM SIGPLAN/SIGBED conference on Languages, 2009

Further evidence of a relationship between explaining, tracing and writing skills in introductory programming.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

2008
High-Precision Relative Clock Synchronization Using Time Stamp Counters.
Proceedings of the 13th International Conference on Engineering of Complex Computer Systems (ICECCS 2008), March 31 2008, 2008

Workflow Simulation for Operational Decision Support Using Design, Historic and State Information.
Proceedings of the Business Process Management, 6th International Conference, 2008

Product flow analysis in distribution networks with a fixed time horizon.
Proceedings of the Computer Science 2008, 2008

Relative simulation and model checking of real-time processes.
Proceedings of the Computer Science 2008, 2008

2007
Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems.
Proceedings of the 2007 International Conference on Embedded Systems & Applications, 2007

Business Process Simulation for Operational Decision Support.
Proceedings of the Business Process Management Workshops, 2007

Access Control Requirements for Processing Electronic Health Records.
Proceedings of the Business Process Management Workshops, 2007

Cross-Layer Verification of Type Flaw Attacks on Security Protocols.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007

2006
Formal change impact analyses for emulated control software.
Int. J. Softw. Tools Technol. Transf., 2006

Procedure compilation in the refinement calculus.
Formal Aspects Comput., 2006

Fault Evaluation for Security-Critical Communications Devices.
Computer, 2006

Functional Analysis of a Real-Time Protocol for Networked Control Systems.
Proceedings of the Automated Technology for Verification and Analysis, 2006

Formally Analysing a Security Protocol for Replay Attacks.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

Well-Measuring Programs.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

Tracing secure information flow through mode changes.
Proceedings of the Computer Science 2006, 2006

2005
A theory for execution-time derivation in real-time programs.
Theor. Comput. Sci., 2005

Information Flow Analysis for Fail-Secure Devices.
Comput. J., 2005

Identifying Critical Components During Information Security Evaluations.
J. Res. Pract. Inf. Technol., 2005

Refinement Laws for Verifying Library Subroutine Adaptation.
Proceedings of the 16th Australian Software Engineering Conference (ASWEC 2005), 31 March, 2005

Model Checking Interrupt-Dependent Software.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

2003
Foreword.
Theor. Comput. Sci., 2003

The Variety of Variables in Automated Real-Time Refinement.
Formal Aspects Comput., 2003

Linear Approximation of Execution-Time Constraints.
Formal Aspects Comput., 2003

But What if I Don't Want to Wait Forever?
Formal Aspects Comput., 2003

Formal Semantics for Program Paths.
Proceedings of the Computing: the Australasian Theory Symposiumm, 2003

A Partial-Correctness Semantics for Modelling Assembler Programs.
Proceedings of the 1st International Conference on Software Engineering and Formal Methods (SEFM 2003), 2003

A Z Based Approach to Verifying Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2003

Verifying Emulation of Legacy Mission Computer Systems.
Proceedings of the FME 2003: Formal Methods, 2003

2002
A formal model of real-time program compilation.
Theor. Comput. Sci., 2002

The variety of variables in computer-aided real-time programming.
Proceedings of the BCS FACS Refinement Workshop 2002, 2002

Timing Analysis of Assembler Code Control-Flow Paths.
Proceedings of the FME 2002: Formal Methods, 2002

Animation of Data Refinements.
Proceedings of the 9th Asia-Pacific Software Engineering Conference (APSEC 2002), 2002

Contextual Matching of Software Library Components.
Proceedings of the 9th Asia-Pacific Software Engineering Conference (APSEC 2002), 2002

2001
Lifting in Z.
Proceedings of the Computing: The Australasian Theory Symposium, 2001

Preface.
Proceedings of the Computing: The Australasian Theory Symposium, 2001

Semantic characterisation of dead control-flow paths.
IEE Proc. Softw., 2001

Visualisation of Refinements.
Proceedings of the 13th Australian Software Engineering Conference (ASWEC 2001), 2001

Compilation of Specifications.
Proceedings of the 8th Asia-Pacific Software Engineering Conference (APSEC 2001), 2001

2000
Computer-aided development of a real-time program.
Softw. Concepts Tools, 2000

Incremental Development of Real-Time Requirements: The Light Control Case Study.
J. Univers. Comput. Sci., 2000

The Algebra of Multi-tasking.
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000

1999
The deadline command.
IEE Proc. Softw., 1999

Modelling Discrete Behaviour in a Continuous-Time Formalism.
Proceedings of the Integrated Formal Methods, 1999

1998
Real-Time Schedulability Tests for Preemptive Multitasking.
Real Time Syst., 1998

A Limitation of Vector Timestamps for Reconstructing Distributed Computations.
Inf. Process. Lett., 1998

A Set-Theoretic Model for Real-Time Specification and Reasoning.
Proceedings of the Mathematics of Program Construction, 1998

Defining Differentiation and Integration in Z.
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998

1997
A Formal Method for Building Concurrent Real-Time Software.
IEEE Softw., 1997

An Action-Based Formal Model for Concurrent Real-Time Systems.
Formal Aspects Comput., 1997

A Methodology for Compilation of High-Integrity Real-Time Programs.
Proceedings of the Euro-Par '97 Parallel Processing, 1997

Refinement Rules for Real-Time Multi-tasking Programs.
Proceedings of the Algebraic Methodology and Software Technology, 1997

1996
Fundamentals of Distributed System Observation.
IEEE Softw., 1996

It's now or never.
XRDS, 1996

Integrating Real-Time Scheduling Theory and Program Refinement.
Proceedings of the FME '96: Industrial Benefit and Advances in Formal Methods, 1996

1995
Interactively Verifying a Simple Real-time Scheduler.
Proceedings of the Computer Aided Verification, 1995

1994
Proof Obligations for Real-Time Refinement.
Proceedings of the 6th Refinement Workshop, 1994

Adding Real Time to Formal Program Development.
Proceedings of the FME '94: Industrial Benefit of Formal Methods, 1994

1993
A Formal Definition of Priority in CSP.
ACM Trans. Program. Lang. Syst., 1993

Real-Time Refinement.
Proceedings of the FME '93: Industrial-Strength Formal Methods, 1993

1992
Disciplined approach to real-time systems design.
Inf. Softw. Technol., 1992

Specification and Verification of Real-Time Behaviour Using Z and RTL.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1992

A constraint-oriented real-time process calculus.
Proceedings of the Formal Description Techniques, 1992

1991
Logical Time in Distributed Computing Systems.
Computer, 1991

Process Algebra Traces Augmented with Causal Relationships.
Proceedings of the Formal Description Techniques, 1991

1990
A LOTOS Interpreter for Simulating Real-Time Behaviour.
Proceedings of the Formal Description Techniques, 1990

1988
A LISP Implementation of the Model for 'Communicating Sequential Processes'.
Softw. Pract. Exp., 1988

Partial Orders for Parallel Debugging.
Proceedings of the ACM SIGPLAN and SIGOPS Workshop on Parallel and Distributed Debugging, 1988

1987
Reproducible Tests in CSP.
Aust. Comput. J., 1987

1983
A Comparison of the Concurrency Constructs and Module Facilities of CHILL and Ada.
Aust. Comput. J., 1983


  Loading...