Phil Brooke
Phil Brooke
Green Pike Ltd
Verified email at green-pike.co.uk
TitleCited byYear
Metamodel-based model conformance and multiview consistency checking
RF Paige, PJ Brooke, JS Ostroff
ACM Transactions on Software Engineering and Methodology (TOSEM) 16 (3), 11, 2007
1482007
Fault trees for security system design and analysis
PJ Brooke, RF Paige
Computers & Security 22 (3), 256-264, 2003
1092003
Principles for modeling language design
RF Paige, JS Ostroff, PJ Brooke
Information and Software Technology 42 (10), 665-675, 2000
1032000
Agile development of secure web applications
X Ge, RF Paige, FAC Polack, H Chivers, PJ Brooke
Proceedings of the 6th international conference on Web engineering, 305-312, 2006
692006
A novel approach to the detection of cheating in multiplayer online games
P Laurens, RF Paige, PJ Brooke, H Chivers
12th IEEE International Conference on Engineering Complex Computer Systems …, 2007
632007
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
SA Razak, SM Furnell, NL Clarke, PJ Brooke
Ad Hoc Networks 6 (7), 1151-1167, 2008
562008
Towards an insider threat prediction specification language
GB Magklaras, SM Furnell, PJ Brooke
Information management & computer security 14 (4), 361-381, 2006
432006
Attacks against mobile ad hoc networks routing protocol
SA Razak, SM Furnell, PJ Brooke
5th Annual Postgraduate Symposium on the Convergence of Telecommunications …, 2004
402004
Towards agile engineering of high-integrity systems
RF Paige, R Charalambous, X Ge, PJ Brooke
International Conference on Computer Safety, Reliability, and Security, 30-43, 2008
342008
A CSP model of Eiffel’s SCOOP
PJ Brooke, RF Paige, JL Jacob
Formal Aspects of Computing 19 (4), 487-512, 2007
322007
A timed semantics for a hierarchical design notation
PJ Brooke
University of York, 1999
301999
A new taxonomy for comparing intrusion detection systems
S Furnell, CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research, 2007
292007
A two-tier intrusion detection system for mobile ad hoc networks–a friend approach
SA Razak, S Furnell, N Clarke, P Brooke
International Conference on Intelligence and Security Informatics, 590-595, 2006
252006
FPTC: automated safety analysis for domain-specific languages
RF Paige, LM Rose, X Ge, DS Kolovos, PJ Brooke
International Conference on Model Driven Engineering Languages and Systems …, 2008
242008
Towards an agile process for building software product lines
RF Paige, X Wang, ZR Stephenson, PJ Brooke
International Conference on Extreme Programming and Agile Processes in …, 2006
202006
Security planning and refactoring in extreme programming
EG Aydal, RF Paige, H Chivers, PJ Brooke
International Conference on Extreme Programming and Agile Processes in …, 2006
172006
Checking the consistency of collaboration and class diagram using pvs
R Paige, J Ostroff, P Brooke
Proc of Fourth Workshop on Rigorous Object-Oriented Methods (ROOM4), London …, 2002
152002
Exceptions in concurrent Eiffel
P Brooke, RF Paige
Journal of Object Technology 6 (10), 111-126, 2007
132007
Agile formal method engineering
RF Paige, PJ Brooke
International Conference on Integrated Formal Methods, 109-128, 2005
132005
Playing the game: cheating, loopholes, and virtual identity
PJ Brooke, RF Paige, JA Clark, S Stepney
ACM SIGCAS Computers and Society 34 (2), 3, 2004
132004
The system can't perform the operation now. Try again later.
Articles 1–20