default search action
Phillip J. Brooke
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c21]João F. Ferreira, Saul A. Johnson, Alexandra Mendes, Phillip J. Brooke:
Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules. IFM 2017: 407-421 - 2015
- [j19]Huibiao Zhu, Jifeng He, Shengchao Qin, Phillip J. Brooke:
Denotational semantics and its algebraic derivation for an event-driven system-level language. Formal Aspects Comput. 27(1): 133-166 (2015) - [j18]Phillip J. Brooke, Richard F. Paige:
User-visible cryptography in email and web scenarios. Inf. Comput. Secur. 23(1): 58-72 (2015) - 2013
- [c20]Peng Liu, Huibiao Zhu, Shengchao Qin, Phillip J. Brooke, Xi Wu:
Linking the Semantics of BPEL Using Maude. APSEC (1) 2013: 422-431 - [c19]Peng Liu, Huibiao Zhu, Shengchao Qin, Phillip J. Brooke, Xi Wu:
Linking Algebraic Semantics and Operational Semantics for Web Services Using Maude. ICECCS 2013: 260-263 - [i1]Phillip J. Brooke, Richard F. Paige:
The Value of User-Visible Internet Cryptography. CoRR abs/1303.1948 (2013) - 2012
- [c18]HaiYun Tian, Phillip J. Brooke, Anne-Gwenn Bosser:
Behaviour-Based Cheat Detection in Multiplayer Games with Event-B. IFM 2012: 206-220 - [c17]Richard F. Paige, Phillip J. Brooke, Xiaocheng Ge, Christopher Power, Frank R. Burton, Simon M. Poulding:
Revealing Complexity through Domain-Specific Modelling and Analysis. Monterey Workshop 2012: 251-265 - [c16]Phillip J. Brooke, Richard F. Paige, Christopher Power:
Approaches to Modelling Security Scenarios with Domain-Specific Languages. Security Protocols Workshop 2012: 41-54 - [c15]Phillip J. Brooke:
Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion). Security Protocols Workshop 2012: 55-59 - 2011
- [j17]Richard F. Paige, Andy Galloway, Ramon Charalambous, Xiaocheng Ge, Phillip J. Brooke:
High-integrity agile processes for the development of safety critical software. Int. J. Crit. Comput. Based Syst. 2(2): 181-216 (2011) - 2010
- [j16]Phillip J. Brooke, Richard F. Paige, Christopher Power:
Document-centric XML workflows with fragment digital signatures. Softw. Pract. Exp. 40(8): 655-672 (2010) - [r1]Richard F. Paige, Jim Woodcock, Phillip J. Brooke, Ana Cavalcanti:
Programming Phase: Formal Methods. Encyclopedia of Software Engineering 2010: 772-785
2000 – 2009
- 2009
- [j15]Richard F. Paige, Phillip J. Brooke, Jin Song Dong, J. C. P. Woodcock:
Editorial. Formal Aspects Comput. 21(4): 303 (2009) - [j14]Phillip J. Brooke, Richard F. Paige:
Cameo: an alternative model of concurrency for Eiffel. Formal Aspects Comput. 21(4): 363-391 (2009) - 2008
- [j13]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7): 1151-1167 (2008) - [c14]Richard F. Paige, Louis M. Rose, Xiaocheng Ge, Dimitrios S. Kolovos, Phillip J. Brooke:
FPTC: Automated Safety Analysis for Domain-Specific Languages. MoDELS (Workshops) 2008: 229-242 - [c13]Richard F. Paige, Ramon Charalambous, Xiaocheng Ge, Phillip J. Brooke:
Towards Agile Engineering of High-Integrity Systems. SAFECOMP 2008: 30-43 - 2007
- [b1]Phillip J. Brooke, Richard F. Paige:
Practical Distributed Processing. Undergraduate Topics in Computer Science, Springer 2007, ISBN 978-1-84628-840-1, pp. i-xiv, 1-270 - [j12]Phillip J. Brooke, Richard F. Paige, Jeremy L. Jacob:
A CSP model of Eiffel's SCOOP. Formal Aspects Comput. 19(4): 487-512 (2007) - [j11]C. J. Tucker, Steven Furnell, Bogdan V. Ghita, Phillip J. Brooke:
A new taxonomy for comparing intrusion detection systems. Internet Res. 17(1): 88-98 (2007) - [j10]Phillip J. Brooke, Richard F. Paige:
Exceptions in Concurrent Eiffel. J. Object Technol. 6(10): 111-126 (2007) - [j9]Richard F. Paige, Phillip J. Brooke, Jonathan S. Ostroff:
Metamodel-based model conformance and multiview consistency checking. ACM Trans. Softw. Eng. Methodol. 16(3): 11 (2007) - [c12]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ADHOC-NOW 2007: 129-141 - [c11]Peter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers:
A Novel Approach to the Detection of Cheating in Multiplayer Online Games. ICECCS 2007: 97-106 - [c10]Phillip J. Brooke, Richard F. Paige:
Lazy Exploration and Checking of CSP Models with CSPsim. CPA 2007: 33-49 - [c9]Xiaocheng Ge, Richard F. Paige, Fiona Polack, Phillip J. Brooke:
Extreme Programming Security Practices. XP 2007: 226-230 - 2006
- [j8]George Magklaras, Steven Furnell, Phillip J. Brooke:
Towards an insider threat prediction specification language. Inf. Manag. Comput. Secur. 14(4): 361-381 (2006) - [j7]Richard F. Paige, Triston S. Attridge, Phillip J. Brooke:
Game Development Using Design-by-Contract. J. Object Technol. 5(7): 57-73 (2006) - [c8]Xiaocheng Ge, Richard F. Paige, Fiona Polack, Howard Chivers, Phillip J. Brooke:
Agile development of secure web applications. ICWE 2006: 305-312 - [c7]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ISI 2006: 590-595 - [c6]Emine Gokce Aydal, Richard F. Paige, Howard Chivers, Phillip J. Brooke:
Security Planning and Refactoring in Extreme Programming. XP 2006: 154-163 - [c5]Richard F. Paige, Xiaochen Wang, Zoë R. Stephenson, Phillip J. Brooke:
Towards an Agile Process for Building Software Product Lines. XP 2006: 198-199 - [e1]John A. Clark, Richard F. Paige, Fiona Polack, Phillip J. Brooke:
Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings. Lecture Notes in Computer Science 3934, Springer 2006, ISBN 3-540-33376-2 [contents] - 2005
- [j6]Jonathan S. Ostroff, Richard F. Paige, David Makalsky, Phillip J. Brooke:
E-Tester: a Contract-Aware and Agent-Based Unit Testing Framework for Eiffel. J. Object Technol. 4(7): 97-114 (2005) - [c4]Shukor Abd Razak, Steven Furnell, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. ECIW 2005: 271-280 - [c3]Richard F. Paige, Phillip J. Brooke:
Agile Formal Method Engineering. IFM 2005: 109-128 - 2004
- [j5]Richard F. Paige, Phillip J. Brooke:
Integrating BON and Object-Z. J. Object Technol. 3(3): 121-141 (2004) - [j4]Phillip J. Brooke, Richard F. Paige, John A. Clark, Susan Stepney:
Playing the game: cheating, loopholes, and virtual identity. SIGCAS Comput. Soc. 34(2): 3 (2004) - 2003
- [j3]Richard F. Paige, Jonathan S. Ostroff, Phillip J. Brooke:
Theorem Proving Support for View Consistency Checking. Obj. Logiciel Base données Réseaux 9(4): 115-134 (2003) - [j2]Phillip J. Brooke, Richard F. Paige:
Fault trees for security system design and analysis. Comput. Secur. 22(3): 256-264 (2003) - [c2]Richard F. Paige, Priyanka Agarwal, Phillip J. Brooke:
Combining Agile Practices with UML and EJB: A Case Study in Agile Development. XP 2003: 351-353 - 2002
- [c1]Phillip J. Brooke, Richard F. Paige:
The Design of a Tool-Supported Graphical Notation for Timed CSP. IFM 2002: 299-318 - 2000
- [j1]Richard F. Paige, Jonathan S. Ostroff, Phillip J. Brooke:
Principles for modeling language design. Inf. Softw. Technol. 42(10): 665-675 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint