| 2008 |
| 15 | EE | Helen Treharne,
Edward Turner,
Steve Schneider,
Neil Evans:
Object Modelling in the SystemB Industrial Project.
ABZ 2008: 359 |
| 14 | EE | Edward Turner,
Helen Treharne,
Steve Schneider,
Neil Evans:
Automatic Generation of CSP || B Skeletons from xUML Models.
ICTAC 2008: 364-379 |
| 13 | EE | Neil Evans,
Neil Grant:
Towards the Formal Verification of a Java Processor in Event-B.
Electr. Notes Theor. Comput. Sci. 201: 45-67 (2008) |
| 12 | EE | Neil Evans:
Refinement for Pipelining in Event-B.
Electr. Notes Theor. Comput. Sci. 214: 183-202 (2008) |
| 11 | EE | Neil Evans,
Helen Treharne,
Régine Laleau,
Marc Frappier:
Applying CSP || B to information systems.
Software and System Modeling 7(1): 85-102 (2008) |
| 2007 |
| 10 | EE | Neil Evans,
Wilson Ifill:
Hardware Verification and Beyond: Using B at AWE.
B 2007: 260-261 |
| 9 | | Neil Grant,
Neil Evans:
Towards the Formal Verification of a Java Processor in Event-B.
CPA 2007: 425-442 |
| 8 | EE | Neil Evans,
Helen Treharne:
Interactive tool support for CSP || B consistency checking.
Formal Asp. Comput. 19(3): 277-302 (2007) |
| 2006 |
| 7 | EE | Neil Evans,
Michael J. Butler:
A Proposal for Records in Event-B.
FM 2006: 221-235 |
| 6 | EE | Neil Evans,
Helen Treharne:
Linking Semantic Models to Support CSP || B Consistency Checking.
Electr. Notes Theor. Comput. Sci. 145: 201-217 (2006) |
| 2005 |
| 5 | EE | Steve A. Schneider,
Helen Treharne,
Neil Evans:
Chunks: Component Verification in CSP||B.
IFM 2005: 89-108 |
| 4 | EE | Neil Evans,
Steve A. Schneider:
Verifying security protocols with PVS: widening the rank function approach.
J. Log. Algebr. Program. 64(2): 253-284 (2005) |
| 3 | EE | Neil Evans,
Helen Treharne:
Investigating a file transfer protocol using CSP and B.
Software and System Modeling 4(3): 258-276 (2005) |
| 2004 |
| 2 | EE | Neil Evans,
Helen Treharne,
Régine Laleau,
Marc Frappier:
How to Verify Dynamic Properties of Information Systems.
SEFM 2004: 416-425 |
| 2000 |
| 1 | EE | Neil Evans,
Steve Schneider:
Analysing Time Dependent Security Properties in CSP Using PVS.
ESORICS 2000: 222-237 |