Phil Brooke
Phil Brooke
Green Pike Ltd
Email verificata su
Citata da
Citata da
Metamodel-based model conformance and multiview consistency checking
RF Paige, PJ Brooke, JS Ostroff
ACM Transactions on Software Engineering and Methodology (TOSEM) 16 (3), 11-es, 2007
Fault trees for security system design and analysis
PJ Brooke, RF Paige
Computers & security 22 (3), 256-264, 2003
Principles for modeling language design
RF Paige, JS Ostroff, PJ Brooke
Information and Software Technology 42 (10), 665-675, 2000
A novel approach to the detection of cheating in multiplayer online games
P Laurens, RF Paige, PJ Brooke, H Chivers
12th IEEE International Conference on Engineering Complex Computer Systemsá…, 2007
Agile development of secure web applications
X Ge, RF Paige, FAC Polack, H Chivers, PJ Brooke
Proceedings of the 6th international conference on Web engineering, 305-312, 2006
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
SA Razak, SM Furnell, NL Clarke, PJ Brooke
Ad Hoc Networks 6 (7), 1151-1167, 2008
Towards an insider threat prediction specification language
GB Magklaras, SM Furnell, PJ Brooke
Information management & computer security, 2006
Attacks against mobile ad hoc networks routing protocols
SA Razak, SM Furnell, PJ Brooke
Network Research Group, University of Plymouth, Devon, 2004
Towards agile engineering of high-integrity systems
RF Paige, R Charalambous, X Ge, PJ Brooke
International Conference on Computer Safety, Reliability, and Security, 30-43, 2008
A CSP model of Eiffel’s SCOOP
PJ Brooke, RF Paige, JL Jacob
Formal Aspects of Computing 19 (4), 487-512, 2007
A new taxonomy for comparing intrusion detection systems
S Furnell, CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research, 2007
A timed semantics for a hierarchical design notation
PJ Brooke
University of York, 1999
Extreme programming security practices
X Ge, RF Paige, F Polack, P Brooke
International Conference on Extreme Programming and Agile Processes iná…, 2007
FPTC: automated safety analysis for domain-specific languages
RF Paige, LM Rose, X Ge, DS Kolovos, PJ Brooke
International Conference on Model Driven Engineering Languages and Systemsá…, 2008
A two-tier intrusion detection system for mobile ad hoc networks–a friend approach
S Abd Razak, S Furnell, N Clarke, P Brooke
International conference on intelligence and security informatics, 590-595, 2006
Security planning and refactoring in extreme programming
EG Aydal, RF Paige, H Chivers, PJ Brooke
International Conference on Extreme Programming and Agile Processes iná…, 2006
Towards an agile process for building software product lines
RF Paige, X Wang, ZR Stephenson, PJ Brooke
International Conference on Extreme Programming and Agile Processes iná…, 2006
Checking the consistency of collaboration and class diagram using pvs
R Paige, J Ostroff, P Brooke
Proc of Fourth Workshop on Rigorous Object-Oriented Methods (ROOM4), Londoná…, 2002
High-integrity agile processes for the development of safety critical software
RF Paige, A Galloway, R Charalambous, X Ge, PJ Brooke
International Journal of Critical Computer-Based Systems 2 (2), 181-216, 2011
Agile formal method engineering
RF Paige, PJ Brooke
International Conference on Integrated Formal Methods, 109-128, 2005
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20