Follow
Phil Brooke
Phil Brooke
Green Pike Ltd
Verified email at green-pike.co.uk
Title
Cited by
Cited by
Year
Metamodel-based model conformance and multiview consistency checking
RF Paige, PJ Brooke, JS Ostroff
ACM Transactions on Software Engineering and Methodology (TOSEM) 16 (3), 11-es, 2007
2142007
Fault trees for security system design and analysis
PJ Brooke, RF Paige
Computers & Security 22 (3), 256-264, 2003
1482003
Principles for modeling language design
RF Paige, JS Ostroff, PJ Brooke
Information and Software Technology 42 (10), 665-675, 2000
1322000
A novel approach to the detection of cheating in multiplayer online games
P Laurens, RF Paige, PJ Brooke, H Chivers
12th IEEE International Conference on Engineering Complex Computer Systems …, 2007
922007
Agile development of secure web applications
X Ge, RF Paige, FAC Polack, H Chivers, PJ Brooke
Proceedings of the 6th international conference on Web engineering, 305-312, 2006
892006
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
SA Razak, SM Furnell, NL Clarke, PJ Brooke
Ad Hoc Networks 6 (7), 1151-1167, 2008
652008
Towards an insider threat prediction specification language
GB Magklaras, SM Furnell, PJ Brooke
Information management & computer security 14 (4), 361-381, 2006
542006
Towards agile engineering of high-integrity systems
RF Paige, R Charalambous, X Ge, PJ Brooke
Computer Safety, Reliability, and Security: 27th International Conference …, 2008
522008
Attacks against mobile ad hoc networks routing protocol
SA Razak, SM Furnell, PJ Brooke
482004
A CSP model of Eiffel’s SCOOP
PJ Brooke, RF Paige, JL Jacob
Formal Aspects of Computing 19, 487-512, 2007
362007
Extreme programming security practices
X Ge, RF Paige, F Polack, P Brooke
Agile Processes in Software Engineering and Extreme Programming: 8th …, 2007
362007
A timed semantics for a hierarchical design notation
PJ Brooke
University of York, 1999
351999
A new taxonomy for comparing intrusion detection systems
CJ Tucker, SM Furnell, BV Ghita, PJ Brooke
Internet Research 17 (1), 88-98, 2007
332007
FPTC: automated safety analysis for domain-specific languages
RF Paige, LM Rose, X Ge, DS Kolovos, PJ Brooke
Models in Software Engineering: Workshops and Symposia at MODELS 2008 …, 2009
322009
Towards an agile process for building software product lines
RF Paige, X Wang, ZR Stephenson, PJ Brooke
Extreme Programming and Agile Processes in Software Engineering: 7th …, 2006
252006
A two-tier intrusion detection system for mobile ad hoc networks–a friend approach
SA Razak, S Furnell, N Clarke, P Brooke
Intelligence and Security Informatics: IEEE International Conference on …, 2006
242006
Security planning and refactoring in extreme programming
EG Aydal, RF Paige, H Chivers, PJ Brooke
Extreme Programming and Agile Processes in Software Engineering: 7th …, 2006
212006
High-integrity agile processes for the development of safety critical software
RF Paige, A Galloway, R Charalambous, X Ge, PJ Brooke
International Journal of Critical Computer-Based Systems 2 (2), 181-216, 2011
202011
Certified password quality: a case study using Coq and Linux pluggable authentication modules
JF Ferreira, SA Johnson, A Mendes, PJ Brooke
Integrated Formal Methods: 13th International Conference, IFM 2017, Turin …, 2017
182017
Denotational semantics and its algebraic derivation for an event-driven system-level language
H Zhu, J He, S Qin, PJ Brooke
Formal Aspects of Computing 27, 133-166, 2015
182015
The system can't perform the operation now. Try again later.
Articles 1–20