Phil Brooke
Phil Brooke
Green Pike Ltd
E-mail confirmado em
Citado por
Citado por
Metamodel-based model conformance and multiview consistency checking
RF Paige, PJ Brooke, JS Ostroff
ACM Transactions on Software Engineering and Methodology (TOSEM) 16 (3), 11-es, 2007
Fault trees for security system design and analysis
PJ Brooke, RF Paige
Computers & Security 22 (3), 256-264, 2003
Principles for modeling language design
RF Paige, JS Ostroff, PJ Brooke
Information and Software Technology 42 (10), 665-675, 2000
A novel approach to the detection of cheating in multiplayer online games
P Laurens, RF Paige, PJ Brooke, H Chivers
12th IEEE International Conference on Engineering Complex Computer Systems …, 2007
Agile development of secure web applications
X Ge, RF Paige, FAC Polack, H Chivers, PJ Brooke
Proceedings of the 6th international conference on Web engineering, 305-312, 2006
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
SA Razak, SM Furnell, NL Clarke, PJ Brooke
Ad Hoc Networks 6 (7), 1151-1167, 2008
Towards an insider threat prediction specification language
GB Magklaras, SM Furnell, PJ Brooke
Information management & computer security, 2006
Attacks against mobile ad hoc networks routing protocols
SA Razak, SM Furnell, PJ Brooke
Network Research Group, University of Plymouth, Devon, 2004
Towards agile engineering of high-integrity systems
RF Paige, R Charalambous, X Ge, PJ Brooke
International Conference on Computer Safety, Reliability, and Security, 30-43, 2008
A CSP model of Eiffel’s SCOOP
PJ Brooke, RF Paige, JL Jacob
Formal Aspects of Computing 19 (4), 487-512, 2007
A new taxonomy for comparing intrusion detection systems
CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research, 2007
A timed semantics for a hierarchical design notation
PJ Brooke
University of York, 1999
Extreme programming security practices
X Ge, RF Paige, F Polack, P Brooke
International Conference on Extreme Programming and Agile Processes in …, 2007
A two-tier intrusion detection system for mobile ad hoc networks–a friend approach
S Abd Razak, S Furnell, N Clarke, P Brooke
International conference on intelligence and security informatics, 590-595, 2006
FPTC: automated safety analysis for domain-specific languages
RF Paige, LM Rose, X Ge, DS Kolovos, PJ Brooke
International Conference on Model Driven Engineering Languages and Systems …, 2008
Towards an agile process for building software product lines
RF Paige, X Wang, ZR Stephenson, PJ Brooke
International Conference on Extreme Programming and Agile Processes in …, 2006
Security planning and refactoring in extreme programming
EG Aydal, RF Paige, H Chivers, PJ Brooke
International Conference on Extreme Programming and Agile Processes in …, 2006
Checking the consistency of collaboration and class diagram using pvs
R Paige, J Ostroff, P Brooke
Proc of Fourth Workshop on Rigorous Object-Oriented Methods (ROOM4), London …, 2002
Agile formal method engineering
RF Paige, PJ Brooke
International Conference on Integrated Formal Methods, 109-128, 2005
High-integrity agile processes for the development of safety critical software
RF Paige, A Galloway, R Charalambous, X Ge, PJ Brooke
International Journal of Critical Computer-Based Systems 2 (2), 181-216, 2011
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20