John A. Clark

Orcid: 0000-0002-9230-9739

Affiliations:
  • University of Sheffield, UK
  • University of York, UK (PhD 2001)


According to our database1, John A. Clark authored at least 147 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks.
IEEE/ACM Trans. Netw., April, 2024

2023
Incremental hybrid intrusion detection for 6LoWPAN.
Comput. Secur., December, 2023

A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids.
CoRR, 2023

Privacy Awareness Among Users of Digital Healthcare Services in Saudi Arabia.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023

2022
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN.
IEEE Trans. Inf. Forensics Secur., 2022

Adaptive Hybrid Heterogeneous IDS for 6LoWPAN.
CoRR, 2022

Enhanced Scanning in SDN Networks and its Detection using Machine Learning.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

On Optimal Configuration of IDS for RPL Resource-Constrained Networks Using Evolutionary Algorithm.
Proceedings of the Future Technologies Conference, 2022

Neural Network Approximation of Simulation-based IDS Fitness Evaluation.
Proceedings of the 25th IEEE International Conference on Computational Science and Engineering, 2022

Transfer Learning Approach to Discover IDS Configurations Using Deep Neural Networks.
Proceedings of the International Conference on Communications, 2022

2021
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems.
Secur. Priv., 2021

Reinforcement-Learning-based IDS for 6LoWPAN.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based Multi-feature Detection Model.
Proceedings of the IEEE International Conference on Communications, 2021

Bayesian Hyper-Parameter Optimization for Malware Detection.
Proceedings of the Workshop on AI and Cybersecurity (AI-Cybersec 2021) co-located with 41st SGAI International Conference on Artificial Intelligence (SGAI 2021), 2021

Grammatical Evolution for Detecting Cyberattacks in Internet of Things Environments.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Using Genetic Improvement to Retarget quantum Software on Differing Hardware.
Proceedings of the 10th IEEE/ACM International Workshop on Genetic Improvement, 2021

Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

Continuous User Authentication for Human-Robot Collaboration.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots.
CoRR, 2020

Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

2019
Efficient Evolutionary Fuzzing for Android Application Installation Process.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Optimising trotter-suzuki decompositions for quantum simulation using evolutionary strategies.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019

2018
Evaluation of Mutation Testing in a Nuclear Industry Case Study.
IEEE Trans. Reliab., 2018

Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Applying Cartesian Genetic Programming to Evolve Rules for Intrusion Detection System.
Proceedings of the 10th International Joint Conference on Computational Intelligence, 2018

Dependent input sampling strategies: using metaheuristics for generating parameterised random sampling regimes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2018

Search-Based Temporal Testing in an Embedded Multicore Platform.
Proceedings of the Applications of Evolutionary Computation, 2018

2017
Data-Driven Search-Based Software Engineering (NII Shonan Meeting 2017-19).
NII Shonan Meet. Rep., 2017

SAFEDroid: Using Structural Features for Detecting Android Malwares.
Proceedings of the Security and Privacy in Communication Networks, 2017

2015
The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing.
J. Syst. Softw., 2015

Subdomain-based test data generation.
J. Syst. Softw., 2015

2014
Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Comput. Networks, 2014

Probability-Based Semantic Interpretation of Mutants.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

The executable experimental template pattern for the systematic comparison of metaheuristics: Extended Abstract.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Mutation Testing for Jason Agents.
Proceedings of the Engineering Multi-Agent Systems - Second International Workshop, 2014

2013
Semantic mutation testing.
Sci. Comput. Program., 2013

An orchestrated survey of methodologies for automated software test case generation.
J. Syst. Softw., 2013

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise.
Inf. Syst. Frontiers, 2013

Guest Editorial: Special section of the best papers from the 2nd International Symposium on Search Based Software Engineering 2010.
Inf. Softw. Technol., 2013

Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
IACR Cryptol. ePrint Arch., 2013

Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
IACR Cryptol. ePrint Arch., 2013

Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
IACR Cryptol. ePrint Arch., 2013

Using evolutionary computation to create vectorial Boolean functions with low differential uniformity and high nonlinearity
CoRR, 2013

Genetic algorithms and solid state NMR pulse sequences.
CoRR, 2013

The placement-configuration problem for intrusion detection nodes in wireless sensor networks.
Comput. Electr. Eng., 2013

Efficient Subdomains for Random Testing.
Proceedings of the Search Based Software Engineering - 5th International Symposium, 2013

Using Mutation Analysis to Evolve Subdomains for Random Testing.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Dynamic adaptive Search Based Software Engineering needs fast approximate metrics (keynote).
Proceedings of the 4th International Workshop on Emerging Trends in Software Metrics, 2013

SE and AI: A two-way street.
Proceedings of the 2nd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, 2013

Selecting Highly Efficient Sets of Subdomains for Mutation Adequacy.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012

Searching for Pareto-optimal Randomised Algorithms.
Proceedings of the Search Based Software Engineering - 4th International Symposium, 2012

The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper).
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

MESSI: Mutant Evaluation by Static Semantic Interpretation.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Dynamic adaptive search based software engineering.
Proceedings of the 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2012

2011
Evolutionary Improvement of Programs.
IEEE Trans. Evol. Comput., 2011

Cryptanalysis of Song's advanced smart card based password authentication protocol
CoRR, 2011

Masquerade mimicry attack detection: A randomised approach.
Comput. Secur., 2011

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks.
Comput. Networks, 2011

Applications of Model Reuse When Using Estimation of Distribution Algorithms to Test Concurrent Software.
Proceedings of the Search Based Software Engineering - Third International Symposium, 2011

Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

A Principled Evaluation of the Effect of Directed Mutation on Search-Based Statistical Testing.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Segmentation and Normalisation in Grapheme Codebooks.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Finding short counterexamples in promela models using estimation of distribution algorithms.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

Searching for invariants using genetic programming and mutation testing.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

F for fake: four studies on how we fall for phish.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Efficient Software Verification: Statistical Testing Using Automated Search.
IEEE Trans. Software Eng., 2010

Defending the weakest link: phishing websites detection by analysing user behaviours.
Telecommun. Syst., 2010

Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010

Information-Theoretic Detection of Masquerade Mimicry Attacks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Searching for Safety Violations Using Estimation of Distribution Algorithms.
Proceedings of the Third International Conference on Software Testing, 2010

Scribe Identification in Medieval English Manuscripts.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Modelling Uncertain and Time-Dependent Security Labels in MLS Systems.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Fine-Grained Timing Using Genetic Programming.
Proceedings of the Genetic Programming, 13th European Conference, 2010

Learning Autonomic Security Reconfiguration Policies.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Optimising IDS Sensor Placement.
Proceedings of the ARES 2010, 2010

2009
Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

TAIC PART 2007 and Mutation 2007 special issue editorial.
J. Syst. Softw., 2009

Risk profiles and distributed risk assessment.
Comput. Secur., 2009

A grammatical evolution approach to intrusion detection on mobile ad hoc networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

A Deployment Value Model for Intrusion Detection Sensors.
Proceedings of the Advances in Information Security and Assurance, 2009

Automatic Test Data Generation for Multiple Condition and MCDC Coverage.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

Using automated search to generate test data for matlab.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

A Multi-objective Optimisation Approach to IDS Sensor Placement.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

Comparing algorithms for search-based test data generation of Matlab® Simulink® models.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

Power-Aware Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
A search-based framework for automatic testing of MATLAB/Simulink models.
J. Syst. Softw., 2008

The certification of the Mondex electronic purse to ITSEC Level E6.
Formal Aspects Comput., 2008

Policy Evolution with Grammatical Evolution.
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008

Multi-objective Improvement of Software Using Co-evolution and Smart Seeding.
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008

Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

User behaviour based phishing websites detection.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

Strengthening Inferred Specifications using Search Based Testing.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Threat Modelling in User Performed Authentication.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Searching for resource-efficient programs: low-power pseudorandom number generators.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

MLS security policy evolution with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Policy evolution with Genetic Programming: A comparison of three approaches.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2007
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes.
Proceedings of the Cryptography and Coding, 2007

An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Heuristic search for non-linear cryptanalytic approximations.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Journeys in non-classical computation II: initial journeys and waypoints.
Int. J. Parallel Emergent Distributed Syst., 2006

Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming.
Evol. Comput., 2006

The state problem for test generation in Simulink.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Human competitive security protocols synthesis.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

Deviational Analyses for Validating Regulations on Real Systems.
Proceedings of the CAISE*06 Workshop on Regulations Modelling and their Validation and Verification ReMo2V '06, 2006

2005
Journeys in non-classical computation I: A grand challenge for computing research.
Parallel Algorithms Appl., 2005

The Design of S-Boxes by Simulated Annealing.
New Gener. Comput., 2005

Breaking the Model: Finalisation and a Taxonomy of Security Attacks.
Proceedings of the REFINE 2005 Workshop, 2005

"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Search-based mutation testing for <i>Simulink</i> models.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Evolution of a human-competitive quantum fourier transform algorithm using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

2004
Editorial: Software testing in the United Kingdom.
Softw. Test. Verification Reliab., 2004

Playing the game: cheating, loopholes, and virtual identity.
SIGCAS Comput. Soc., 2004

Synthesising Efficient and Effective Security Protocols.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Smart dust, friend or foe?--Replacing identity with configuration trust.
Comput. Networks, 2004

Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion.
Comput. Intell., 2004

Automated Design of Security Protocols.
Comput. Intell., 2004

Metrics Are Fitness Functions Too.
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004

Effective Security Requirements Analysis: HAZOP and Use Cases.
Proceedings of the Information Security, 7th International Conference, 2004

Search Based Automatic Test-Data Generation at an Architectural Level.
Proceedings of the Genetic and Evolutionary Computation, 2004

Evolving Quantum Circuits and Programs Through Genetic Programming.
Proceedings of the Genetic and Evolutionary Computation, 2004

Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Searching for cost functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Formulating software engineering as a search problem.
IEE Proc. Softw., 2003

Smart Devices and Software Agents: The Basics of Good Behaviour.
Proceedings of the Security in Pervasive Computing, 2003

Artificial Immune Systems and the Grand Challenge for Non-classical Computation.
Proceedings of the Artificial Immune Systems, Second International Conference, 2003

Using Ants to Attack a Classical Cipher.
Proceedings of the Genetic and Evolutionary Computation, 2003

Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It.
Proceedings of the Genetic and Evolutionary Computation, 2003

Making the most of two heuristics: breaking transposition ciphers with ants.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003

Nature-inspired cryptography: past, present and future.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003

Challenging Formal Specifications by Mutation: a CSP security example.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Evolving Boolean Functions Satisfying Multiple Criteria.
Proceedings of the Progress in Cryptology, 2002

Fault Injection and a Timing Channel on an Analysis Technique.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

FORTEST: Formal Methods and Testing.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Investigating the effectiveness of object-oriented testing strategies using the mutation method.
Softw. Test. Verification Reliab., 2001

Protocols are programs too: the meta-heuristic search for security protocols.
Inf. Softw. Technol., 2001

2000
Automated test-data generation for exception conditions.
Softw. Pract. Exp., 2000

Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Two-Stage Optimisation in the Design of Boolean Functions.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
CONVERSE: A change-oriented process for engine controllers.
IEE Proc. Softw., 1999

1998
An Automated Framework for Structural Test-Data Generation.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998

Automated Program Flaw Finding Using Simulated Annealing.
Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis, 1998

Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap.
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998

1995
On the Security of Recent Protocols.
Inf. Process. Lett., 1995

1994
Holistic schedulability analysis for distributed hard real-time systems.
Microprocess. Microprogramming, 1994


  Loading...