Follow
Phil Brooke
Phil Brooke
Green Pike Ltd
Verified email at green-pike.co.uk
Title
Cited by
Cited by
Year
Metamodel-based model conformance and multiview consistency checking
RF Paige, PJ Brooke, JS Ostroff
ACM Transactions on Software Engineering and Methodology (TOSEM) 16 (3), 11-es, 2007
2102007
Fault trees for security system design and analysis
PJ Brooke, RF Paige
Computers & Security 22 (3), 256-264, 2003
1482003
Principles for modeling language design
RF Paige, JS Ostroff, PJ Brooke
Information and Software Technology 42 (10), 665-675, 2000
1312000
A novel approach to the detection of cheating in multiplayer online games
P Laurens, RF Paige, PJ Brooke, H Chivers
12th IEEE International Conference on Engineering Complex Computer Systems …, 2007
912007
Agile development of secure web applications
X Ge, RF Paige, FAC Polack, H Chivers, PJ Brooke
Proceedings of the 6th international conference on Web engineering, 305-312, 2006
892006
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
SA Razak, SM Furnell, NL Clarke, PJ Brooke
Ad Hoc Networks 6 (7), 1151-1167, 2008
632008
Towards an insider threat prediction specification language
GB Magklaras, SM Furnell, PJ Brooke
Information management & computer security 14 (4), 361-381, 2006
542006
Towards agile engineering of high-integrity systems
RF Paige, R Charalambous, X Ge, PJ Brooke
Computer Safety, Reliability, and Security: 27th International Conference …, 2008
502008
Attacks against mobile ad hoc networks routing protocols
SA Razak, SM Furnell, PJ Brooke
Proceedings of 5th annual postgraduate symposium on the convergence of …, 2004
492004
Extreme programming security practices
X Ge, RF Paige, F Polack, P Brooke
Agile Processes in Software Engineering and Extreme Programming: 8th …, 2007
362007
A CSP model of Eiffel’s SCOOP
PJ Brooke, RF Paige, JL Jacob
Formal Aspects of Computing 19, 487-512, 2007
352007
A new taxonomy for comparing intrusion detection systems
CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research 17 (1), 88-98, 2007
332007
A timed semantics for a hierarchical design notation
PJ Brooke
University of York, 1999
331999
FPTC: automated safety analysis for domain-specific languages
RF Paige, LM Rose, X Ge, DS Kolovos, PJ Brooke
Models in Software Engineering: Workshops and Symposia at MODELS 2008 …, 2009
322009
Towards an agile process for building software product lines
RF Paige, X Wang, ZR Stephenson, PJ Brooke
Extreme Programming and Agile Processes in Software Engineering: 7th …, 2006
262006
A two-tier intrusion detection system for mobile ad hoc networks–a friend approach
SA Razak, S Furnell, N Clarke, P Brooke
Intelligence and Security Informatics: IEEE International Conference on …, 2006
242006
Security planning and refactoring in extreme programming
EG Aydal, RF Paige, H Chivers, PJ Brooke
Extreme Programming and Agile Processes in Software Engineering: 7th …, 2006
202006
Certified password quality: a case study using Coq and Linux pluggable authentication modules
JF Ferreira, SA Johnson, A Mendes, PJ Brooke
Integrated Formal Methods: 13th International Conference, IFM 2017, Turin …, 2017
182017
High-integrity agile processes for the development of safety critical software
RF Paige, A Galloway, R Charalambous, X Ge, PJ Brooke
International Journal of Critical Computer-Based Systems 2 (2), 181-216, 2011
182011
Denotational semantics and its algebraic derivation for an event-driven system-level language
H Zhu, J He, S Qin, PJ Brooke
Formal Aspects of Computing 27, 133-166, 2015
172015
The system can't perform the operation now. Try again later.
Articles 1–20