John A. Clark

According to our database1, John A. Clark authored at least 115 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Optimising trotter-suzuki decompositions for quantum simulation using evolutionary strategies.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019

2018
Evaluation of Mutation Testing in a Nuclear Industry Case Study.
IEEE Trans. Reliability, 2018

Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Dependent input sampling strategies: using metaheuristics for generating parameterised random sampling regimes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2018

Search-Based Temporal Testing in an Embedded Multicore Platform.
Proceedings of the Applications of Evolutionary Computation, 2018

2017
SAFEDroid: Using Structural Features for Detecting Android Malwares.
Proceedings of the Security and Privacy in Communication Networks, 2017

2015
Subdomain-based test data generation.
Journal of Systems and Software, 2015

2014
Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Computer Networks, 2014

Probability-Based Semantic Interpretation of Mutants.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

The executable experimental template pattern for the systematic comparison of metaheuristics: Extended Abstract.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

2013
An orchestrated survey of methodologies for automated software test case generation.
Journal of Systems and Software, 2013

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise.
Information Systems Frontiers, 2013

Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
IACR Cryptology ePrint Archive, 2013

Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
IACR Cryptology ePrint Archive, 2013

The placement-configuration problem for intrusion detection nodes in wireless sensor networks.
Computers & Electrical Engineering, 2013

Efficient Subdomains for Random Testing.
Proceedings of the Search Based Software Engineering - 5th International Symposium, 2013

Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Using Mutation Analysis to Evolve Subdomains for Random Testing.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Dynamic adaptive Search Based Software Engineering needs fast approximate metrics (keynote).
Proceedings of the 4th International Workshop on Emerging Trends in Software Metrics, 2013

SE and AI: A two-way street.
Proceedings of the 2nd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, 2013

The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Selecting Highly Efficient Sets of Subdomains for Mutation Adequacy.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Searching for Pareto-optimal Randomised Algorithms.
Proceedings of the Search Based Software Engineering - 4th International Symposium, 2012

The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper).
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

MESSI: Mutant Evaluation by Static Semantic Interpretation.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Dynamic adaptive search based software engineering.
Proceedings of the 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2012

2011
Evolutionary Improvement of Programs.
IEEE Trans. Evolutionary Computation, 2011

Masquerade mimicry attack detection: A randomised approach.
Computers & Security, 2011

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks.
Computer Networks, 2011

Applications of Model Reuse When Using Estimation of Distribution Algorithms to Test Concurrent Software.
Proceedings of the Search Based Software Engineering - Third International Symposium, 2011

Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

A Principled Evaluation of the Effect of Directed Mutation on Search-Based Statistical Testing.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Segmentation and Normalisation in Grapheme Codebooks.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Finding short counterexamples in promela models using estimation of distribution algorithms.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

Searching for invariants using genetic programming and mutation testing.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

F for fake: four studies on how we fall for phish.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Efficient Software Verification: Statistical Testing Using Automated Search.
IEEE Trans. Software Eng., 2010

Defending the weakest link: phishing websites detection by analysing user behaviours.
Telecommunication Systems, 2010

Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010

Information-Theoretic Detection of Masquerade Mimicry Attacks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Searching for Safety Violations Using Estimation of Distribution Algorithms.
Proceedings of the Third International Conference on Software Testing, 2010

Semantic Mutation Testing.
Proceedings of the Third International Conference on Software Testing, 2010

Scribe Identification in Medieval English Manuscripts.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Modelling Uncertain and Time-Dependent Security Labels in MLS Systems.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Fine-Grained Timing Using Genetic Programming.
Proceedings of the Genetic Programming, 13th European Conference, 2010

Learning Autonomic Security Reconfiguration Policies.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Optimising IDS Sensor Placement.
Proceedings of the ARES 2010, 2010

2009
Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

TAIC PART 2007 and Mutation 2007 special issue editorial.
Journal of Systems and Software, 2009

Risk profiles and distributed risk assessment.
Computers & Security, 2009

A grammatical evolution approach to intrusion detection on mobile ad hoc networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

A Deployment Value Model for Intrusion Detection Sensors.
Proceedings of the Advances in Information Security and Assurance, 2009

Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Automatic Test Data Generation for Multiple Condition and MCDC Coverage.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

Using automated search to generate test data for matlab.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

A Multi-objective Optimisation Approach to IDS Sensor Placement.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

Comparing algorithms for search-based test data generation of Matlab® Simulink® models.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

Power-Aware Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
A search-based framework for automatic testing of MATLAB/Simulink models.
Journal of Systems and Software, 2008

The certification of the Mondex electronic purse to ITSEC Level E6.
Formal Asp. Comput., 2008

Policy Evolution with Grammatical Evolution.
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008

Multi-objective Improvement of Software Using Co-evolution and Smart Seeding.
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008

Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

User behaviour based phishing websites detection.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

Strengthening Inferred Specifications using Search Based Testing.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Threat Modelling in User Performed Authentication.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Searching for resource-efficient programs: low-power pseudorandom number generators.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

MLS security policy evolution with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Policy evolution with Genetic Programming: A comparison of three approaches.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2007
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes.
Proceedings of the Cryptography and Coding, 2007

An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Heuristic search for non-linear cryptanalytic approximations.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Journeys in non-classical computation II: initial journeys and waypoints.
IJPEDS, 2006

Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming.
Evolutionary Computation, 2006

The state problem for test generation in Simulink.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Human competitive security protocols synthesis.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Deviational Analyses for Validating Regulations on Real Systems.
Proceedings of the CAISE*06 Workshop on Regulations Modelling and their Validation and Verification ReMo2V '06, 2006

2005
Journeys in non-classical computation I: A grand challenge for computing research.
Parallel Algorithms Appl., 2005

Synthesising Efficient and Effective Security Protocols.
Electr. Notes Theor. Comput. Sci., 2005

Breaking the Model: Finalisation and a Taxonomy of Security Attacks.
Electr. Notes Theor. Comput. Sci., 2005

"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Search-based mutation testing for Simulink models.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Evolution of a human-competitive quantum fourier transform algorithm using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

2004
Editorial: Software testing in the United Kingdom.
Softw. Test., Verif. Reliab., 2004

Playing the game: cheating, loopholes, and virtual identity.
SIGCAS Computers and Society, 2004

Smart dust, friend or foe?--Replacing identity with configuration trust.
Computer Networks, 2004

Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion.
Computational Intelligence, 2004

Automated Design of Security Protocols.
Computational Intelligence, 2004

Metrics Are Fitness Functions Too.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

Effective Security Requirements Analysis: HAZOP and Use Cases.
Proceedings of the Information Security, 7th International Conference, 2004

Search Based Automatic Test-Data Generation at an Architectural Level.
Proceedings of the Genetic and Evolutionary Computation, 2004

Evolving Quantum Circuits and Programs Through Genetic Programming.
Proceedings of the Genetic and Evolutionary Computation, 2004

Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

The design of s-boxes by simulated annealing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Searching for cost functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Formulating software engineering as a search problem.
IEE Proceedings - Software, 2003

Smart Devices and Software Agents: The Basics of Good Behaviour.
Proceedings of the Security in Pervasive Computing, 2003

Artificial Immune Systems and the Grand Challenge for Non-classical Computation.
Proceedings of the Artificial Immune Systems, Second International Conference, 2003

Using Ants to Attack a Classical Cipher.
Proceedings of the Genetic and Evolutionary Computation, 2003

Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It.
Proceedings of the Genetic and Evolutionary Computation, 2003

Challenging Formal Specifications by Mutation: a CSP security example.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Evolving Boolean Functions Satisfying Multiple Criteria.
Proceedings of the Progress in Cryptology, 2002

Fault Injection and a Timing Channel on an Analysis Technique.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

FORTEST: Formal Methods and Testing.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Investigating the effectiveness of object-oriented testing strategies using the mutation method.
Softw. Test., Verif. Reliab., 2001

Protocols are programs too: the meta-heuristic search for security protocols.
Information & Software Technology, 2001

2000
Automated test-data generation for exception conditions.
Softw., Pract. Exper., 2000

Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Two-Stage Optimisation in the Design of Boolean Functions.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
CONVERSE: A change-oriented process for engine controllers.
IEE Proceedings - Software, 1999

1998
An Automated Framework for Structural Test-Data Generation.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

Automated Program Flaw Finding Using Simulated Annealing.
Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis, 1998

Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap.
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998

1995
On the Security of Recent Protocols.
Inf. Process. Lett., 1995


  Loading...