Metamodel-based model conformance and multiview consistency checking RF Paige, PJ Brooke, JS Ostroff ACM Transactions on Software Engineering and Methodology (TOSEM) 16 (3), 11-es, 2007 | 215 | 2007 |
Fault trees for security system design and analysis PJ Brooke, RF Paige Computers & Security 22 (3), 256-264, 2003 | 150 | 2003 |
Principles for modeling language design RF Paige, JS Ostroff, PJ Brooke Information and Software Technology 42 (10), 665-675, 2000 | 133 | 2000 |
A novel approach to the detection of cheating in multiplayer online games P Laurens, RF Paige, PJ Brooke, H Chivers 12th IEEE International Conference on Engineering Complex Computer Systems …, 2007 | 94 | 2007 |
Agile development of secure web applications X Ge, RF Paige, FAC Polack, H Chivers, PJ Brooke Proceedings of the 6th international conference on Web engineering, 305-312, 2006 | 90 | 2006 |
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks SA Razak, SM Furnell, NL Clarke, PJ Brooke Ad Hoc Networks 6 (7), 1151-1167, 2008 | 65 | 2008 |
Towards an insider threat prediction specification language GB Magklaras, SM Furnell, PJ Brooke Information management & computer security 14 (4), 361-381, 2006 | 54 | 2006 |
Towards agile engineering of high-integrity systems RF Paige, R Charalambous, X Ge, PJ Brooke Computer Safety, Reliability, and Security: 27th International Conference …, 2008 | 52 | 2008 |
Attacks against mobile ad hoc networks routing protocol SA Razak, SM Furnell, PJ Brooke | 48 | 2004 |
A CSP model of Eiffel’s SCOOP PJ Brooke, RF Paige, JL Jacob Formal Aspects of Computing 19, 487-512, 2007 | 36 | 2007 |
Extreme programming security practices X Ge, RF Paige, F Polack, P Brooke Agile Processes in Software Engineering and Extreme Programming: 8th …, 2007 | 36 | 2007 |
A timed semantics for a hierarchical design notation PJ Brooke University of York, 1999 | 35 | 1999 |
A new taxonomy for comparing intrusion detection systems CJ Tucker, SM Furnell, BV Ghita, PJ Brooke Internet Research 17 (1), 88-98, 2007 | 34 | 2007 |
FPTC: automated safety analysis for domain-specific languages RF Paige, LM Rose, X Ge, DS Kolovos, PJ Brooke Models in Software Engineering: Workshops and Symposia at MODELS 2008 …, 2009 | 32 | 2009 |
Towards an agile process for building software product lines RF Paige, X Wang, ZR Stephenson, PJ Brooke Extreme Programming and Agile Processes in Software Engineering: 7th …, 2006 | 25 | 2006 |
A two-tier intrusion detection system for mobile ad hoc networks–a friend approach SA Razak, S Furnell, N Clarke, P Brooke Intelligence and Security Informatics: IEEE International Conference on …, 2006 | 24 | 2006 |
Security planning and refactoring in extreme programming EG Aydal, RF Paige, H Chivers, PJ Brooke Extreme Programming and Agile Processes in Software Engineering: 7th …, 2006 | 21 | 2006 |
High-integrity agile processes for the development of safety critical software RF Paige, A Galloway, R Charalambous, X Ge, PJ Brooke International Journal of Critical Computer-Based Systems 2 (2), 181-216, 2011 | 20 | 2011 |
Certified password quality: a case study using Coq and Linux pluggable authentication modules JF Ferreira, SA Johnson, A Mendes, PJ Brooke Integrated Formal Methods: 13th International Conference, IFM 2017, Turin …, 2017 | 18 | 2017 |
Denotational semantics and its algebraic derivation for an event-driven system-level language H Zhu, J He, S Qin, PJ Brooke Formal Aspects of Computing 27, 133-166, 2015 | 18 | 2015 |