Phillip J. Brooke

According to our database1, Phillip J. Brooke authored at least 43 papers between 2000 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules.
Proceedings of the Integrated Formal Methods - 13th International Conference, 2017

2015
User-visible cryptography in email and web scenarios.
Inf. Comput. Secur., 2015

Denotational semantics and its algebraic derivation for an event-driven system-level language.
Formal Aspects Comput., 2015

2013
The Value of User-Visible Internet Cryptography
CoRR, 2013

Linking Algebraic Semantics and Operational Semantics for Web Services Using Maude.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Linking the Semantics of BPEL Using Maude.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Approaches to Modelling Security Scenarios with Domain-Specific Languages.
Proceedings of the Security Protocols XX, 2012

Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Revealing Complexity through Domain-Specific Modelling and Analysis.
Proceedings of the Large-Scale Complex IT Systems. Development, Operation and Management, 2012

Behaviour-Based Cheat Detection in Multiplayer Games with Event-B.
Proceedings of the Integrated Formal Methods - 9th International Conference, 2012

2011
High-integrity agile processes for the development of safety critical software.
Int. J. Crit. Comput. Based Syst., 2011

2010
Programming Phase: Formal Methods.
Proceedings of the Encyclopedia of Software Engineering, 2010

Document-centric XML workflows with fragment digital signatures.
Softw. Pract. Exp., 2010

2009
Editorial.
Formal Aspects Comput., 2009

Cameo: an alternative model of concurrency for Eiffel.
Formal Aspects Comput., 2009

2008
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks, 2008

Towards Agile Engineering of High-Integrity Systems.
Proceedings of the Computer Safety, 2008

FPTC: Automated Safety Analysis for Domain-Specific Languages.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MODELS 2008, Toulouse, France, September 28, 2008

2007
Practical Distributed Processing.
Undergraduate Topics in Computer Science, Springer, ISBN: 978-1-84628-841-8, 2007

Metamodel-based model conformance and multiview consistency checking.
ACM Trans. Softw. Eng. Methodol., 2007

Exceptions in Concurrent Eiffel.
J. Object Technol., 2007

A new taxonomy for comparing intrusion detection systems.
Internet Res., 2007

A CSP model of Eiffel's SCOOP.
Formal Aspects Comput., 2007

Extreme Programming Security Practices.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

Lazy Exploration and Checking of CSP Models with CSPsim.
Proceedings of the 30th Communicating Process Architectures Conference, 2007

A Novel Approach to the Detection of Cheating in Multiplayer Online Games.
Proceedings of the 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 2007

Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, 2007

2006
Game Development Using Design-by-Contract.
J. Object Technol., 2006

Towards an insider threat prediction specification language.
Inf. Manag. Comput. Secur., 2006

Towards an Agile Process for Building Software Product Lines.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

Security Planning and Refactoring in Extreme Programming.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
Proceedings of the Intelligence and Security Informatics, 2006

Agile development of secure web applications.
Proceedings of the 6th International Conference on Web Engineering, 2006

2005
E-Tester: a Contract-Aware and Agent-Based Unit Testing Framework for Eiffel.
J. Object Technol., 2005

Agile Formal Method Engineering.
Proceedings of the Integrated Formal Methods, 5th International Conference, 2005

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

2004
Playing the game: cheating, loopholes, and virtual identity.
SIGCAS Comput. Soc., 2004

Integrating BON and Object-Z.
J. Object Technol., 2004

2003
Fault trees for security system design and analysis.
Comput. Secur., 2003

Theorem Proving Support for View Consistency Checking.
Obj. Logiciel Base données Réseaux, 2003

Combining Agile Practices with UML and EJB: A Case Study in Agile Development.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2003

2002
The Design of a Tool-Supported Graphical Notation for Timed CSP.
Proceedings of the Integrated Formal Methods, Third International Conference, 2002

2000
Principles for modeling language design.
Inf. Softw. Technol., 2000


  Loading...