Thomas Given-Wilson

Orcid: 0000-0001-8700-2671

According to our database1, Thomas Given-Wilson authored at least 42 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Packer classification based on association rule mining.
Appl. Soft Comput., 2022

Automated Repair of Security Errors in C Programs via Statistical Model Checking: A Proof of Concept.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles, 2022

2021
Analysis of Machine Learning Approaches to Packing Detection.
CoRR, 2021

Chaos Duck: A Tool for Automatic IoT Software Fault-Tolerance Analysis.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

C-SMC: A Hybrid Statistical Model Checking and Concrete Runtime Engine for Analyzing C Programs.
Proceedings of the Model Checking Software - 27th International Symposium, 2021

Unsupervised behavioural mining and clustering for malware family identification.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

A Secure User-Centred Healthcare System: Design and Verification.
Proceedings of the From Data to Models and Back, 2021

2020
Expressiveness of concurrent intensionality.
Theor. Comput. Sci., 2020

Introduction to the special issue for SPIN 2019.
Int. J. Softw. Tools Technol. Transf., 2020

Combined software and hardware fault injection vulnerability detection.
Innov. Syst. Softw. Eng., 2020

Optimizing symbolic execution for malware behavior classification.
Comput. Secur., 2020

Brief Announcement: Effectiveness of Code Hardening for Fault-Tolerant IoT Software.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

Improving Secure and Robust Patient Service Delivery.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles, 2020

Building User Trust of Critical Digital Technologies.
Proceedings of the 2020 IEEE International Conference on Industrial Technology, 2020

Formalising fault injection and countermeasures.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries.
Concurr. Comput. Pract. Exp., 2019

Effective, efficient, and robust packing detection and classification.
Comput. Secur., 2019

Pluginizing QUIC.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

The SERUMS tool-chain: Ensuring Security and Privacy of Medical Data in Smart Patient-Centric Healthcare Systems.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Group abstraction for assisted navigation of social activities in intelligent environments.
J. Reliab. Intell. Environ., 2018

The State of Fault Injection Vulnerability Detection.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2018

Universal Optimality of Apollonian Cell Encoders.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Detection of Mirai by Syntactic and Behavioral Analysis.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

X-by-C: Non-functional Security Challenges.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Modeling, 2018

Tutorial: An Overview of Malware Detection and Evasion Techniques.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Modeling, 2018

On the Expressiveness of Joining and Splitting.
Proceedings of the Models, Mindsets, 2018

2017
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Information Security, Privacy, and Trust in Social Robotic Assistants for Older Adults.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Information Leakage as a Scheduling Resource.
Proceedings of the Critical Systems: Formal Methods and Automated Verification - Joint 22nd International Workshop on Formal Methods for Industrial Critical Systems - and, 2017

2016
Attainable unconditional security for shared-key cryptosystems.
Inf. Sci., 2016

On the Expressiveness of Symmetric Communication.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2016, 2016

2015
Quantitative Information Flow for Scheduler-Dependent Systems.
Proceedings of the Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, 2015

On the Expressiveness of Joining.
Proceedings of the Proceedings 8th Interaction and Concurrency Experience, 2015

2014
A Concurrent Pattern Calculus.
Log. Methods Comput. Sci., 2014

On the Expressiveness of Intensional Communication.
Proceedings of the Proceedings Combined 21st International Workshop on Expressiveness in Concurrency, 2014

An Intensional Concurrent Faithful Encoding of Turing Machines.
Proceedings of the Proceedings 7th Interaction and Concurrency Experience, 2014

Expressiveness via Intensionality and Concurrency.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014

2013
Multi-polymorphic programming in bondi.
Proceedings of the 9th ACM SIGPLAN workshop on Generic programming, 2013

Pattern Matching and Bisimulation.
Proceedings of the Coordination Models and Languages, 15th International Conference, 2013

2012
Concurrent pattern unification
PhD thesis, 2012

High Performance Static Analysis for Industry.
Proceedings of the Third Workshop on Tools for Automatic Program Analysis, 2012

2011
A combinatory account of internal structure.
J. Symb. Log., 2011


  Loading...