default search action
John A. Clark
Person information
- affiliation: University of Sheffield, UK
- affiliation (PhD 2001): University of York, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Chintan Patel, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark:
User-empowered secure privacy-preserving authentication scheme for Digital Twin. Comput. Secur. 140: 103793 (2024) - [j39]Soumadeep Das, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark, Chintan Patel, Biplab Sikdar:
AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks. IEEE/ACM Trans. Netw. 32(2): 1080-1095 (2024) - 2023
- [j38]Aryan Mohammadi Pasikhani, John A. Clark, Prosanta Gope:
Incremental hybrid intrusion detection for 6LoWPAN. Comput. Secur. 135: 103447 (2023) - [c104]Hebah A. Albatati, John A. Clark, Maysoon F. Abulkhair:
Privacy Awareness Among Users of Digital Healthcare Services in Saudi Arabia. HCI (35) 2023: 247-261 - [i12]Arwa Alromih, John A. Clark, Prosanta Gope:
A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids. CoRR abs/2303.13204 (2023) - [i11]Soumadeep Das, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark, Chintan Patel, Biplab Sikdar:
AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks. CoRR abs/2309.07730 (2023) - 2022
- [j37]Aryan Mohammadi Pasikhani, John A. Clark, Prosanta Gope:
Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN. IEEE Trans. Inf. Forensics Secur. 17: 3831-3846 (2022) - [c103]Abdulmonem Alshahrani, John A. Clark:
Transfer Learning Approach to Discover IDS Configurations Using Deep Neural Networks. CCCI 2022: 1-8 - [c102]Abdulmonem Alshahrani, John A. Clark:
Neural Network Approximation of Simulation-based IDS Fitness Evaluation. CSE 2022: 81-89 - [c101]Abdulmonem Alshahrani, John A. Clark:
On Optimal Configuration of IDS for RPL Resource-Constrained Networks Using Evolutionary Algorithm. FTC (2) 2022: 514-535 - [c100]Arwa Alromih, John A. Clark, Prosanta Gope:
Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids. ICICS 2022: 281-300 - [c99]Abdullah H. Alqahtani, John A. Clark:
Enhanced Scanning in SDN Networks and its Detection using Machine Learning. TPS-ISA 2022: 188-197 - [i10]Aryan Mohammadi Pasikhani, John A. Clark, Prosanta Gope:
Adaptive Hybrid Heterogeneous IDS for 6LoWPAN. CoRR abs/2205.09170 (2022) - 2021
- [j36]Ricardo M. Czekster, Charles Morisset, John A. Clark, Sadegh Soudjani, Charalampos Patsios, Peter Davison:
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems. Secur. Priv. 4(3) (2021) - [c98]Shurook S. Almohamade, John A. Clark, James Law:
Continuous User Authentication for Human-Robot Collaboration. ARES 2021: 115:1-115:9 - [c97]Shurook S. Almohamade, John A. Clark, James Law:
Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction. ETAA 2021: 111-126 - [c96]George O. O'Brien, John A. Clark:
Using Genetic Improvement to Retarget quantum Software on Differing Hardware. GI@ICSE 2021: 31-38 - [c95]Hasanen Alyasiri, John A. Clark, Ali Malik, Ruairí de Fréin:
Grammatical Evolution for Detecting Cyberattacks in Internet of Things Environments. ICCCN 2021: 1-6 - [c94]Fahad T. AlGorain, John A. Clark:
Bayesian Hyper-Parameter Optimization for Malware Detection. AI-Cybersec@SGAI 2021: 69-84 - [c93]Arwa Alromih, John A. Clark, Prosanta Gope:
Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based Multi-feature Detection Model. SmartGridComm 2021: 339-345 - [c92]Aryan Mohammadi Pasikhani, John A. Clark, Prosanta Gope:
Reinforcement-Learning-based IDS for 6LoWPAN. TrustCom 2021: 1049-1060 - 2020
- [c91]Shurook S. Almohamade, John A. Clark, James Law:
Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots. SECITC 2020: 185-197 - [i9]Mario Gleirscher, Nikita Johnson, Panayiotis Karachristou, Radu Calinescu, James Law, John A. Clark:
Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots. CoRR abs/2007.11099 (2020)
2010 – 2019
- 2019
- [c90]Benjamin D. M. Jones, David Robert White, George O. O'Brien, John A. Clark, Earl T. Campbell:
Optimising trotter-suzuki decompositions for quantum simulation using evolutionary strategies. GECCO 2019: 1223-1231 - [c89]Veysel Hatas, Sevil Sen, John A. Clark:
Efficient Evolutionary Fuzzing for Android Application Installation Process. QRS 2019: 62-68 - [i8]Benjamin D. M. Jones, George O. O'Brien, David Robert White, Earl T. Campbell, John A. Clark:
Optimising Trotter-Suzuki Decompositions for Quantum Simulation Using Evolutionary Strategies. CoRR abs/1904.01336 (2019) - 2018
- [j35]Pedro Delgado-Pérez, Ibrahim Habli, Steve Gregory, Rob Alexander, John A. Clark, Inmaculada Medina-Bulo:
Evaluation of Mutation Testing in a Nuclear Industry Case Study. IEEE Trans. Reliab. 67(4): 1406-1419 (2018) - [c88]Komsan Srivisut, John A. Clark, Richard F. Paige:
Search-Based Temporal Testing in an Embedded Multicore Platform. EvoApplications 2018: 794-809 - [c87]Komsan Srivisut, John A. Clark, Richard F. Paige:
Dependent input sampling strategies: using metaheuristics for generating parameterised random sampling regimes. GECCO 2018: 1451-1458 - [c86]Hasanen Alyasiri, John A. Clark, Daniel Kudenko:
Applying Cartesian Genetic Programming to Evolve Rules for Intrusion Detection System. IJCCI 2018: 176-183 - [c85]Hasanen Alyasiri, John A. Clark, Daniel Kudenko:
Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks. SecITC 2018: 170-184 - 2017
- [c84]Sevil Sen, Ahmet Ilhan Aysan, John A. Clark:
SAFEDroid: Using Structural Features for Detecting Android Malwares. ATCS/SePrIoT@SecureComm 2017: 255-270 - [i7]Markus Wagner, Leandro L. Minku, Ahmed E. Hassan, John A. Clark:
Data-Driven Search-Based Software Engineering (NII Shonan Meeting 2017-19). NII Shonan Meet. Rep. 2017 (2017) - 2015
- [j34]Simon M. Poulding, Robert Alexander, John A. Clark, Mark J. Hadley:
The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing. J. Syst. Softw. 103: 296-310 (2015) - [j33]Matthew Patrick, Robert Alexander, Manuel Oriol, John A. Clark:
Subdomain-based test data generation. J. Syst. Softw. 103: 328-342 (2015) - 2014
- [j32]Manuel Gil Pérez, Juan E. Tapiador, John A. Clark, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Trustworthy placements: Improving quality and resilience in collaborative attack detection. Comput. Networks 58: 70-86 (2014) - [c83]Zhan Huang, Rob Alexander, John A. Clark:
Mutation Testing for Jason Agents. EMAS@AAMAS 2014: 309-327 - [c82]Geoffrey Neumann, Jerry Swan, Mark Harman, John A. Clark:
The executable experimental template pattern for the systematic comparison of metaheuristics: Extended Abstract. GECCO (Companion) 2014: 1427-1430 - [c81]Matthew Patrick, Robert Alexander, Manuel Oriol, John A. Clark:
Probability-Based Semantic Interpretation of Mutants. ICST Workshops 2014: 186-195 - 2013
- [j31]Juan E. Tapiador, John A. Clark:
The placement-configuration problem for intrusion detection nodes in wireless sensor networks. Comput. Electr. Eng. 39(7): 2306-2317 (2013) - [j30]Lionel C. Briand, John A. Clark:
Guest Editorial: Special section of the best papers from the 2nd International Symposium on Search Based Software Engineering 2010. Inf. Softw. Technol. 55(1): 111 (2013) - [j29]Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh, Hao Chen:
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise. Inf. Syst. Frontiers 15(1): 17-34 (2013) - [j28]Saswat Anand, Edmund K. Burke, Tsong Yueh Chen, John A. Clark, Myra B. Cohen, Wolfgang Grieskamp, Mark Harman, Mary Jean Harrold, Phil McMinn:
An orchestrated survey of methodologies for automated software test case generation. J. Syst. Softw. 86(8): 1978-2001 (2013) - [j27]John A. Clark, Haitao Dan, Robert M. Hierons:
Semantic mutation testing. Sci. Comput. Program. 78(4): 345-363 (2013) - [c80]Matthew Patrick, Robert Alexander, Manuel Oriol, John A. Clark:
Selecting Highly Efficient Sets of Subdomains for Mutation Adequacy. APSEC (1) 2013: 91-98 - [c79]Simon M. Poulding, Robert Alexander, John A. Clark, Mark J. Hadley:
The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing. GECCO 2013: 1477-1484 - [c78]John A. Clark:
SE and AI: A two-way street. RAISE@ICSE 2013: 1-3 - [c77]Mark Harman, John A. Clark, Mel Ó Cinnéide:
Dynamic adaptive Search Based Software Engineering needs fast approximate metrics (keynote). WETSoM 2013: 1-6 - [c76]Matthew Patrick, Robert Alexander, Manuel Oriol, John A. Clark:
Using Mutation Analysis to Evolve Subdomains for Random Testing. ICST Workshops 2013: 53-62 - [c75]James McLaughlin, John A. Clark:
Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis. IMACC 2013: 120-140 - [c74]Matthew Patrick, Robert Alexander, Manuel Oriol, John A. Clark:
Efficient Subdomains for Random Testing. SSBSE 2013: 251-256 - [i6]James McLaughlin, John A. Clark:
Using evolutionary computation to create vectorial Boolean functions with low differential uniformity and high nonlinearity. CoRR abs/1301.6972 (2013) - [i5]Matthias Bechmann, John A. Clark, Angelika Sebald:
Genetic algorithms and solid state NMR pulse sequences. CoRR abs/1306.0194 (2013) - [i4]James McLaughlin, John A. Clark:
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity. IACR Cryptol. ePrint Arch. 2013: 11 (2013) - [i3]James McLaughlin, John A. Clark:
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. IACR Cryptol. ePrint Arch. 2013: 22 (2013) - [i2]James McLaughlin, John A. Clark:
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. IACR Cryptol. ePrint Arch. 2013: 89 (2013) - 2012
- [j26]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Int. J. Found. Comput. Sci. 23(2): 543-553 (2012) - [c73]Mark Harman, Edmund K. Burke, John A. Clark, Xin Yao:
Dynamic adaptive search based software engineering. ESEM 2012: 1-8 - [c72]Matthew Patrick, Manuel Oriol, John A. Clark:
MESSI: Mutant Evaluation by Static Semantic Interpretation. ICST 2012: 711-719 - [c71]Mark Harman, William B. Langdon, Yue Jia, David Robert White, Andrea Arcuri, John A. Clark:
The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper). ASE 2012: 1-14 - [c70]Alan G. Millard, David Robert White, John A. Clark:
Searching for Pareto-optimal Randomised Algorithms. SSBSE 2012: 183-197 - 2011
- [j25]Sevil Sen, John A. Clark:
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Comput. Networks 55(15): 3441-3457 (2011) - [j24]Juan E. Tapiador, John A. Clark:
Masquerade mimicry attack detection: A randomised approach. Comput. Secur. 30(5): 297-310 (2011) - [j23]David Robert White, Andrea Arcuri, John A. Clark:
Evolutionary Improvement of Programs. IEEE Trans. Evol. Comput. 15(4): 515-538 (2011) - [c69]Mark Blythe, Helen Petrie, John A. Clark:
F for fake: four studies on how we fall for phish. CHI 2011: 3469-3478 - [c68]Sam Ratcliff, David Robert White, John A. Clark:
Searching for invariants using genetic programming and mutation testing. GECCO 2011: 1907-1914 - [c67]Jan Staunton, John A. Clark:
Finding short counterexamples in promela models using estimation of distribution algorithms. GECCO 2011: 1923-1930 - [c66]Tara Gilliam, Richard C. Wilson, John A. Clark:
Segmentation and Normalisation in Grapheme Codebooks. ICDAR 2011: 613-617 - [c65]Simon M. Poulding, John A. Clark, Hélène Waeselynck:
A Principled Evaluation of the Effect of Directed Mutation on Search-Based Statistical Testing. ICST Workshops 2011: 184-193 - [c64]Juan E. Tapiador, Mudhakar Srivatsa, John A. Clark, John A. McDermid:
Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing. Networking Workshops 2011: 207-218 - [c63]Jan Staunton, John A. Clark:
Applications of Model Reuse When Using Estimation of Distribution Algorithms to Test Concurrent Software. SSBSE 2011: 97-111 - [i1]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez, John A. Clark:
Cryptanalysis of Song's advanced smart card based password authentication protocol. CoRR abs/1111.2744 (2011) - 2010
- [j22]Xun Dong, John A. Clark, Jeremy L. Jacob:
Defending the weakest link: phishing websites detection by analysing user behaviours. Telecommun. Syst. 45(2-3): 215-226 (2010) - [j21]Simon M. Poulding, John A. Clark:
Efficient Software Verification: Statistical Testing Using Automated Search. IEEE Trans. Software Eng. 36(6): 763-777 (2010) - [c62]Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, Philip Nobles:
Optimising IDS Sensor Placement. ARES 2010: 315-320 - [c61]Juan E. Tapiador, John A. Clark:
Learning Autonomic Security Reconfiguration Policies. CIT 2010: 902-909 - [c60]David Robert White, Juan E. Tapiador, Julio César Hernández Castro, John A. Clark:
Fine-Grained Timing Using Genetic Programming. EuroGP 2010: 325-336 - [c59]John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Modelling Uncertain and Time-Dependent Security Labels in MLS Systems. ICETE (Selected Papers) 2010: 158-171 - [c58]Tara Gilliam, Richard C. Wilson, John A. Clark:
Scribe Identification in Medieval English Manuscripts. ICPR 2010: 1880-1883 - [c57]John A. Clark, Haitao Dan, Robert M. Hierons:
Semantic Mutation Testing. ICST Workshops 2010: 100-109 - [c56]Jan Staunton, John A. Clark:
Searching for Safety Violations Using Estimation of Distribution Algorithms. ICST Workshops 2010: 212-221 - [c55]Juan E. Tapiador, John A. Clark:
Information-Theoretic Detection of Masquerade Mimicry Attacks. NSS 2010: 183-190 - [c54]John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Risk based Access Control with Uncertain and Time-dependent Sensitivity. SECRYPT 2010: 5-13
2000 – 2009
- 2009
- [j20]Howard Chivers, John A. Clark, Pau-Chen Cheng:
Risk profiles and distributed risk assessment. Comput. Secur. 28(7): 521-535 (2009) - [j19]Mark Harman, Zheng Li, Phil McMinn, Jeff Offutt, John A. Clark:
TAIC PART 2007 and Mutation 2007 special issue editorial. J. Syst. Softw. 82(11): 1753-1754 (2009) - [c53]Sevil Sen, John A. Clark, Juan E. Tapiador:
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks. ADHOCNETS 2009: 224-239 - [c52]Kamran Ghani, John A. Clark, Yuan Zhan:
Comparing algorithms for search-based test data generation of Matlab® Simulink® models. IEEE Congress on Evolutionary Computation 2009: 2940-2947 - [c51]Hao Chen, John A. Clark, Juan E. Tapiador, Siraj A. Shaikh, Howard Chivers, Philip Nobles:
A Multi-objective Optimisation Approach to IDS Sensor Placement. CISIS 2009: 101-108 - [c50]Sion Ll Rhys, Simon M. Poulding, John A. Clark:
Using automated search to generate test data for matlab. GECCO 2009: 1697-1704 - [c49]Kamran Ghani, John A. Clark:
Automatic Test Data Generation for Multiple Condition and MCDC Coverage. ICSEA 2009: 152-157 - [c48]Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. IPDPS 2009: 1-5 - [c47]Siraj A. Shaikh, Howard Chivers, Philip Nobles, John A. Clark, Hao Chen:
A Deployment Value Model for Intrusion Detection Sensors. ISA 2009: 250-259 - [c46]Sevil Sen, John Andrew Clark:
A grammatical evolution approach to intrusion detection on mobile ad hoc networks. WISEC 2009: 95-102 - [p1]Sevil Sen, John Andrew Clark:
Intrusion Detection in Mobile Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 427-454 - 2008
- [j18]Jim Woodcock, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob:
The certification of the Mondex electronic purse to ITSEC Level E6. Formal Aspects Comput. 20(1): 5-19 (2008) - [j17]Yuan Zhan, John A. Clark:
A search-based framework for automatic testing of MATLAB/Simulink models. J. Syst. Softw. 81(2): 262-285 (2008) - [c45]Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pankaj Rohatgi:
Policy evolution with Genetic Programming: A comparison of three approaches. IEEE Congress on Evolutionary Computation 2008: 1792-1800 - [c44]Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John Andrew Clark:
MLS security policy evolution with genetic programming. GECCO 2008: 1571-1578 - [c43]David Robert White, John A. Clark, Jeremy Jacob, Simon M. Poulding:
Searching for resource-efficient programs: low-power pseudorandom number generators. GECCO 2008: 1775-1782 - [c42]Xun Dong, John A. Clark, Jeremy L. Jacob:
Threat Modelling in User Performed Authentication. ICICS 2008: 49-64 - [c41]Kamran Ghani, John A. Clark:
Strengthening Inferred Specifications using Search Based Testing. ICST Workshops 2008: 187-194 - [c40]Xun Dong, John A. Clark, Jeremy L. Jacob:
User behaviour based phishing websites detection. IMCSIT 2008: 783-790 - [c39]Sevil Sen, John A. Clark:
Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks. PRICAI 2008: 1053-1058 - [c38]Andrea Arcuri, David Robert White, John A. Clark, Xin Yao:
Multi-objective Improvement of Software Using Co-evolution and Smart Seeding. SEAL 2008: 61-70 - [c37]Yow Tzu Lim, Pau-Chen Cheng, John Andrew Clark, Pankaj Rohatgi:
Policy Evolution with Grammatical Evolution. SEAL 2008: 71-80 - 2007
- [c36]Juan M. Estévez-Tapiador, Julio César Hernández Castro, John A. Clark:
Heuristic search for non-linear cryptanalytic approximations. IEEE Congress on Evolutionary Computation 2007: 3561-3568 - [c35]Simon M. Poulding, Paul Emberson, Iain Bate, John A. Clark:
An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms. HASE 2007: 53-62 - [c34]Juan M. Estévez-Tapiador, John A. Clark, Julio César Hernández Castro:
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. IMACC 2007: 99-117 - 2006
- [j16]Paul Massey, John A. Clark, Susan Stepney:
Human-Competitive Evolution of Quantum Computing Artefacts by Genetic Programming. Evol. Comput. 14(1): 21-40 (2006) - [j15]Susan Stepney, Samuel L. Braunstein, John A. Clark, Andrew M. Tyrrell, Andrew Adamatzky, Robert E. Smith, Thomas R. Addis, Colin G. Johnson, Jonathan Timmis, Peter H. Welch, Robin Milner, Derek Partridge:
Journeys in non-classical computation II: initial journeys and waypoints. Int. J. Parallel Emergent Distributed Syst. 21(2): 97-125 (2006) - [c33]Fiona Polack, Thitima Srivatanakul, Tim Kelly, John A. Clark:
Deviational Analyses for Validating Regulations on Real Systems. ReMo2V 2006 - [c32]John A. Clark, Susan Stepney:
Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range. IEEE Congress on Evolutionary Computation 2006: 200-206 - [c31]Hao Chen, John A. Clark, Jeremy Jacob:
Human competitive security protocols synthesis. GECCO 2006: 1855-1856 - [c30]Yuan Zhan, John A. Clark:
The state problem for test generation in Simulink. GECCO 2006: 1941-1948 - [e1]John A. Clark, Richard F. Paige, Fiona Polack, Phillip J. Brooke:
Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings. Lecture Notes in Computer Science 3934, Springer 2006, ISBN 3-540-33376-2 [contents] - 2005
- [j14]John A. Clark, Jeremy L. Jacob, Susan Stepney:
The Design of S-Boxes by Simulated Annealing. New Gener. Comput. 23(3): 219-231 (2005) - [j13]Susan Stepney, Samuel L. Braunstein, John A. Clark, Andrew M. Tyrrell, Andrew Adamatzky, Robert E. Smith, Tom Addis, Colin G. Johnson, Jonathan Timmis, Peter H. Welch, Robin Milner, Derek Partridge:
Journeys in non-classical computation I: A grand challenge for computing research. Parallel Algorithms Appl. 20(1): 5-19 (2005) - [c29]Yuan Zhan, John A. Clark:
Search-based mutation testing for Simulink models. GECCO 2005: 1061-1068 - [c28]Paul Massey, John A. Clark, Susan Stepney:
Evolution of a human-competitive quantum fourier transform algorithm using genetic programming. GECCO 2005: 1657-1663 - [c27]Yang Liu, John A. Clark, Susan Stepney:
"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example. SPC 2005: 31-45 - [c26]John A. Clark, Susan Stepney, Howard Chivers:
Breaking the Model: Finalisation and a Taxonomy of Security Attacks. REFINE 2005: 225-242 - 2004
- [j12]John A. Clark, Jeremy L. Jacob, Subhamoy Maitra, Pantelimon Stanica:
Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion. Comput. Intell. 20(3): 450-462 (2004) - [j11]Hao Chen, John A. Clark, Jeremy L. Jacob:
Automated Design of Security Protocols. Comput. Intell. 20(3): 503-516 (2004) - [j10]Howard Chivers, John A. Clark:
Smart dust, friend or foe?--Replacing identity with configuration trust. Comput. Networks 46(5): 723-740 (2004) - [j9]Phillip J. Brooke, Richard F. Paige, John A. Clark, Susan Stepney:
Playing the game: cheating, loopholes, and virtual identity. SIGCAS Comput. Soc. 34(2): 3 (2004) - [j8]John A. Clark, Mark Harman, Robert M. Hierons:
Editorial: Software testing in the United Kingdom. Softw. Test. Verification Reliab. 14(3): 165-166 (2004) - [c25]John A. Clark, Jeremy L. Jacob, Susan Stepney:
Searching for cost functions. IEEE Congress on Evolutionary Computation 2004: 1517-1524 - [c24]John A. Clark, Jeremy L. Jacob, Susan Stepney:
The design of s-boxes by simulated annealing. IEEE Congress on Evolutionary Computation 2004: 1533-1537 - [c23]Pantelimon Stanica, Subhamoy Maitra, John A. Clark:
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. FSE 2004: 161-177 - [c22]Paul Massey, John A. Clark, Susan Stepney:
Evolving Quantum Circuits and Programs Through Genetic Programming. GECCO (2) 2004: 569-580 - [c21]Yuan Zhan, John A. Clark:
Search Based Automatic Test-Data Generation at an Architectural Level. GECCO (2) 2004: 1413-1424 - [c20]Thitima Srivatanakul, John A. Clark, Fiona Polack:
Effective Security Requirements Analysis: HAZOP and Use Cases. ISC 2004: 416-427 - [c19]Mark Harman, John A. Clark:
Metrics Are Fitness Functions Too. IEEE METRICS 2004: 58-69 - [c18]Hao Chen, John A. Clark, Jeremy L. Jacob:
Synthesising Efficient and Effective Security Protocols. ARSPA@IJCAR 2004: 25-41 - 2003
- [j7]John A. Clark, José Javier Dolado, Mark Harman, Robert M. Hierons, Bryan F. Jones, M. Lumkin, Brian S. Mitchell, Spiros Mancoridis, K. Rees, Marc Roper, Martin J. Shepperd:
Formulating software engineering as a search problem. IEE Proc. Softw. 150(3): 161-175 (2003) - [c17]Thitima Srivatanakul, John A. Clark, Susan Stepney, Fiona Polack:
Challenging Formal Specifications by Mutation: a CSP security example. APSEC 2003: 340- - [c16]John A. Clark:
Nature-inspired cryptography: past, present and future. IEEE Congress on Evolutionary Computation 2003: 1647-1654 - [c15]John A. Clark, Jeremy L. Jacob, Subhamoy Maitra, Pantelimon Stanica:
Almost Boolean functions: the design of Boolean functions by spectral inversion. IEEE Congress on Evolutionary Computation 2003: 2173-2180 - [c14]Hao Chen, John A. Clark, Jeremy L. Jacob:
Automated design of security protocols. IEEE Congress on Evolutionary Computation 2003: 2181-2188 - [c13]Matthew D. Russell, John A. Clark, Susan Stepney:
Making the most of two heuristics: breaking transposition ciphers with ants. IEEE Congress on Evolutionary Computation 2003: 2653-2658 - [c12]Matthew D. Russell, John A. Clark, Susan Stepney:
Using Ants to Attack a Classical Cipher. GECCO 2003: 146-147 - [c11]John A. Clark, Jeremy L. Jacob, Susan Stepney:
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It. GECCO 2003: 2022-2033 - [c10]Susan Stepney, John A. Clark, Colin G. Johnson, Derek Partridge, Robert E. Smith:
Artificial Immune Systems and the Grand Challenge for Non-classical Computation. ICARIS 2003: 204-216 - [c9]Howard Chivers, John A. Clark, Susan Stepney:
Smart Devices and Software Agents: The Basics of Good Behaviour. SPC 2003: 39-52 - 2002
- [c8]Jonathan P. Bowen, Kirill Bogdanov, John A. Clark, Mark Harman, Robert M. Hierons, Paul J. Krause:
FORTEST: Formal Methods and Testing. COMPSAC 2002: 91-104 - [c7]John A. Clark, Jeremy L. Jacob:
Fault Injection and a Timing Channel on an Analysis Technique. EUROCRYPT 2002: 181-196 - [c6]John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan:
Evolving Boolean Functions Satisfying Multiple Criteria. INDOCRYPT 2002: 246-259 - 2001
- [j6]John A. Clark, Jeremy L. Jacob:
Protocols are programs too: the meta-heuristic search for security protocols. Inf. Softw. Technol. 43(14): 891-904 (2001) - [j5]Sun-Woo Kim, John A. Clark, John A. McDermid:
Investigating the effectiveness of object-oriented testing strategies using the mutation method. Softw. Test. Verification Reliab. 11(3): 207-225 (2001) - 2000
- [j4]Nigel J. Tracey, John A. Clark, Keith Mander, John A. McDermid:
Automated test-data generation for exception conditions. Softw. Pract. Exp. 30(1): 61-79 (2000) - [c5]John A. Clark, Jeremy Jacob:
Two-Stage Optimisation in the Design of Boolean Functions. ACISP 2000: 242-254 - [c4]John A. Clark, Jeremy L. Jacob:
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. S&P 2000: 82-95
1990 – 1999
- 1999
- [j3]Darren Lee Buttle, John A. Clark, John A. McDermid, Alan Stephenson, Nigel James Tracey:
CONVERSE: A change-oriented process for engine controllers. IEE Proc. Softw. 146(3): 130-136 (1999) - 1998
- [c3]John A. McDermid, Andy Galloway, Simon Burton, John A. Clark, Ian Toyn, Nigel J. Tracey, Samuel H. Valentine:
Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap. ICFEM 1998: 76-89 - [c2]Nigel J. Tracey, John A. Clark, Keith Mander:
Automated Program Flaw Finding Using Simulated Annealing. ISSTA 1998: 73-81 - [c1]Nigel J. Tracey, John A. Clark, Keith Mander, John A. McDermid:
An Automated Framework for Structural Test-Data Generation. ASE 1998: 285-288 - 1995
- [j2]John A. Clark, Jeremy Jacob:
On the Security of Recent Protocols. Inf. Process. Lett. 56(3): 151-155 (1995) - 1994
- [j1]Ken Tindell, John A. Clark:
Holistic schedulability analysis for distributed hard real-time systems. Microprocess. Microprogramming 40(2-3): 117-134 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint