John Andrew Clark
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
49 | EE | Sevil Sen, John Andrew Clark: A grammatical evolution approach to intrusion detection on mobile ad hoc networks. WISEC 2009: 95-102 |
2008 | ||
48 | EE | Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John Andrew Clark: MLS security policy evolution with genetic programming. GECCO 2008: 1571-1578 |
47 | EE | Xun Dong, John A. Clark, Jeremy L. Jacob: Threat Modelling in User Performed Authentication. ICICS 2008: 49-64 |
46 | EE | Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pankaj Rohatgi: Policy evolution with Genetic Programming: A comparison of three approaches. IEEE Congress on Evolutionary Computation 2008: 1792-1800 |
45 | EE | Sevil Sen, John A. Clark: Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks. PRICAI 2008: 1053-1058 |
44 | EE | Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pankaj Rohatgi: Policy Evolution with Grammatical Evolution. SEAL 2008: 71-80 |
43 | EE | Jim Woodcock, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob: The certification of the Mondex electronic purse to ITSEC Level E6. Formal Asp. Comput. 20(1): 5-19 (2008) |
42 | EE | Yuan Zhan, John A. Clark: A search-based framework for automatic testing of MATLAB/Simulink models. Journal of Systems and Software 81(2): 262-285 (2008) |
2007 | ||
41 | EE | Juan M. Estévez-Tapiador, Julio César Hernández Castro, John A. Clark: Heuristic search for non-linear cryptanalytic approximations. IEEE Congress on Evolutionary Computation 2007: 3561-3568 |
40 | EE | Juan M. Estévez-Tapiador, John A. Clark, Julio César Hernández Castro: Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. IMA Int. Conf. 2007: 99-117 |
2006 | ||
39 | John A. Clark, Richard F. Paige, Fiona Polack, Phillip J. Brooke: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings Springer 2006 | |
38 | EE | Hao Chen, John A. Clark, Jeremy Jacob: Human competitive security protocols synthesis. GECCO 2006: 1855-1856 |
37 | EE | Yuan Zhan, John A. Clark: The state problem for test generation in Simulink. GECCO 2006: 1941-1948 |
36 | EE | Fiona Polack, Thitima Srivatanakul, Tim Kelly, John A. Clark: Deviational Analyses for Validating Regulations on Real Systems. ReMo2V 2006 |
35 | EE | Paul Massey, John A. Clark, Susan Stepney: Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming. Evolutionary Computation 14(1): 21-40 (2006) |
34 | EE | Susan Stepney, Samuel L. Braunstein, John A. Clark, Andrew M. Tyrrell, Andrew Adamatzky, Robert E. Smith, Thomas R. Addis, Colin G. Johnson, Jonathan Timmis, Peter H. Welch, Robin Milner, Derek Partridge: Journeys in non-classical computation II: initial journeys and waypoints. IJPEDS 21(2): 97-125 (2006) |
2005 | ||
33 | EE | Yuan Zhan, John A. Clark: Search-based mutation testing for Simulink models. GECCO 2005: 1061-1068 |
32 | EE | Paul Massey, John A. Clark, Susan Stepney: Evolution of a human-competitive quantum fourier transform algorithm using genetic programming. GECCO 2005: 1657-1663 |
31 | EE | Yang Liu, John A. Clark, Susan Stepney: "Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. SPC 2005: 31-45 |
30 | EE | Hao Chen, John A. Clark, Jeremy L. Jacob: Synthesising Efficient and Effective Security Protocols. Electr. Notes Theor. Comput. Sci. 125(1): 25-41 (2005) |
29 | EE | John A. Clark, Susan Stepney, Howard Chivers: Breaking the Model: Finalisation and a Taxonomy of Security Attacks. Electr. Notes Theor. Comput. Sci. 137(2): 225-242 (2005) |
28 | EE | John A. Clark, Jeremy L. Jacob, Susan Stepney: The Design of S-Boxes by Simulated Annealing. New Generation Comput. 23(3): (2005) |
27 | EE | Susan Stepney, Samuel L. Braunstein, John A. Clark, Andrew M. Tyrrell, Andrew Adamatzky, Robert E. Smith, Tom Addis, Colin G. Johnson, Jonathan Timmis, Peter H. Welch, Robin Milner, Derek Partridge: Journeys in non-classical computation I: A grand challenge for computing research. Parallel Algorithms Appl. 20(1): 5-19 (2005) |
2004 | ||
26 | EE | Pantelimon Stanica, Subhamoy Maitra, John A. Clark: Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. FSE 2004: 161-177 |
25 | EE | Yuan Zhan, John A. Clark: Search Based Automatic Test-Data Generation at an Architectural Level. GECCO (2) 2004: 1413-1424 |
24 | EE | Paul Massey, John A. Clark, Susan Stepney: Evolving Quantum Circuits and Programs Through Genetic Programming. GECCO (2) 2004: 569-580 |
23 | EE | Mark Harman, John A. Clark: Metrics Are Fitness Functions Too. IEEE METRICS 2004: 58-69 |
22 | EE | Thitima Srivatanakul, John A. Clark, Fiona Polack: Effective Security Requirements Analysis: HAZOP and Use Cases. ISC 2004: 416-427 |
21 | EE | Howard Chivers, John A. Clark: Smart dust, friend or foe?--Replacing identity with configuration trust. Computer Networks 46(5): 723-740 (2004) |
20 | EE | John A. Clark, Mark Harman, Robert M. Hierons: Editorial: Software testing in the United Kingdom. Softw. Test., Verif. Reliab. 14(3): 165-166 (2004) |
2003 | ||
19 | EE | Thitima Srivatanakul, John A. Clark, Susan Stepney, Fiona Polack: Challenging Formal Specifications by Mutation: a CSP security example. APSEC 2003: 340- |
18 | EE | Matthew Russell, John A. Clark, Susan Stepney: Using Ants to Attack a Classical Cipher. GECCO 2003: 146-147 |
17 | EE | John A. Clark, Jeremy L. Jacob, Susan Stepney: Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It. GECCO 2003: 2022-2033 |
16 | EE | Susan Stepney, John A. Clark, Colin G. Johnson, Derek Partridge, Robert E. Smith: Artificial Immune Systems and the Grand Challenge for Non-classical Computation. ICARIS 2003: 204-216 |
15 | EE | Howard Chivers, John A. Clark, Susan Stepney: Smart Devices and Software Agents: The Basics of Good Behaviour. SPC 2003: 39-52 |
14 | John A. Clark, José Javier Dolado, Mark Harman, Robert M. Hierons, Bryan F. Jones, M. Lumkin, Brian S. Mitchell, Spiros Mancoridis, K. Rees, Marc Roper, Martin J. Shepperd: Formulating software engineering as a search problem. IEE Proceedings - Software 150(3): 161-175 (2003) | |
2002 | ||
13 | EE | Jonathan P. Bowen, Kirill Bogdanov, John A. Clark, Mark Harman, Robert M. Hierons, Paul Krause: FORTEST: Formal Methods and Testing. COMPSAC 2002: 91-104 |
12 | EE | John A. Clark, Jeremy L. Jacob: Fault Injection and a Timing Channel on an Analysis Technique. EUROCRYPT 2002: 181-196 |
11 | EE | John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan: Evolving Boolean Functions Satisfying Multiple Criteria. INDOCRYPT 2002: 246-259 |
2001 | ||
10 | John A. Clark, Jeremy L. Jacob: Protocols are programs too: the meta-heuristic search for security protocols. Information & Software Technology 43(14): 891-904 (2001) | |
9 | Sun-Woo Kim, John A. Clark, John A. McDermid: Investigating the effectiveness of object-oriented testing strategies using the mutation method. Softw. Test., Verif. Reliab. 11(3): 207-225 (2001) | |
2000 | ||
8 | John A. Clark, Jeremy Jacob: Two-Stage Optimisation in the Design of Boolean Functions. ACISP 2000: 242-254 | |
7 | EE | John A. Clark, Jeremy L. Jacob: Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. IEEE Symposium on Security and Privacy 2000: 82-95 |
6 | Nigel Tracey, John A. Clark, Keith Mander, John A. McDermid: Automated test-data generation for exception conditions. Softw., Pract. Exper. 30(1): 61-79 (2000) | |
1999 | ||
5 | Darren L. Buttle, John A. Clark, John A. McDermid, Alan Stephenson, Nigel J. Tracey: CONVERSE: A change-oriented process for engine controllers. IEE Proceedings - Software 146(3): 130-136 (1999) | |
1998 | ||
4 | EE | Nigel Tracey, John A. Clark, Keith Mander, John A. McDermid: An Automated Framework for Structural Test-Data Generation. ASE 1998: 285-288 |
3 | EE | John A. McDermid, Andy Galloway, Simon Burton, John A. Clark, Ian Toyn, Nigel Tracey, Samuel H. Valentine: Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap. ICFEM 1998: 76- |
2 | EE | Nigel Tracey, John A. Clark, Keith Mander: Automated Program Flaw Finding Using Simulated Annealing. ISSTA 1998: 73-81 |
1995 | ||
1 | EE | John A. Clark, Jeremy Jacob: On the Security of Recent Protocols. Inf. Process. Lett. 56(3): 151-155 (1995) |