default search action
Michael Goldsmith
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
Unmasking hate in the pandemic: A cross-platform study of the COVID-19 infodemic. Big Data Res. 37: 100481 (2024) - [c80]Ahmed Salman, Sadie Creese, Michael Goldsmith:
Position Paper: Leveraging Large Language Models for Cybersecurity Compliance. EuroS&P Workshops 2024: 496-503 - 2023
- [i8]Louise Axon, Dimitrios Panagiotakopoulos, Samuel Ayo, Carolina Sanchez-Hernandez, Yan Zong, Simon Brown, Lei Zhang, Michael Goldsmith, Sadie Creese, Weisi Guo:
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI. CoRR abs/2304.14095 (2023) - 2022
- [j20]Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. Comput. Secur. 113: 102545 (2022) - [j19]Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations. J. Inf. Secur. Appl. 67: 103167 (2022) - [c79]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
A comparison of online hate on reddit and 4chan: a case study of the 2020 US election. SAC 2022: 1797-1800 - [i7]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
A Comparison of Online Hate on Reddit and 4chan: A Case Study of the 2020 US Election. CoRR abs/2202.01302 (2022) - 2021
- [j18]Louise Axon, Jassim Happa, Alastair Janse van Rensburg, Michael Goldsmith, Sadie Creese:
Sonification to Support the Monitoring Tasks of Security Operations Centres. IEEE Trans. Dependable Secur. Comput. 18(3): 1227-1244 (2021) - [c78]Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. ARES 2021: 87:1-87:10 - [c77]Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. ARES 2021: 91:1-91:10 - [c76]Hugo Sbai, Jassim Happa, Michael Goldsmith:
A Novel Behavioural Screenlogger Detection System. ISC 2021: 279-295 - 2020
- [j17]Louise Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice. J. Cybersecur. 6(1): tyaa004 (2020) - [j16]Hugo Sbai, Jassim Happa, Michael Goldsmith, Samy Meftali:
A survey on screenlogger attacks as well as countermeasures. Int. J. Embed. Syst. 12(4): 441-452 (2020) - [c75]Fuchiang (Rich) Tsui, Lingyun Shi, Victor M. Ruiz, Fan Mi, Michael Goldsmith, Maryam Y. Naim, Jorge A. Gálvez, Allan F. Simpao:
Design and deployment of a real-time AI-based telehealth system for deterioration prediction of critical-care patients in a large children's hospital. AMIA 2020 - [c74]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CyberSA 2020: 1-8 - [c73]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. EuroS&P Workshops 2020: 438-447 - [c72]Hugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali:
Dataset Construction and Analysis of Screenshot Malware. TrustCom 2020: 646-655 - [i6]Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. CoRR abs/2008.04713 (2020) - [i5]Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith:
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives. CoRR abs/2008.11808 (2020)
2010 – 2019
- 2019
- [j15]Jassim Happa, Thomas Bashford-Rogers, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Anomaly Detection Using Pattern-of-Life Visual Metaphors. IEEE Access 7: 154018-154034 (2019) - [j14]Louise Axon, Jassim Happa, Michael Goldsmith, Sadie Creese:
Hearing attacks in network data: An effectiveness study. Comput. Secur. 83: 367-388 (2019) - [j13]Rodrigo Carvalho, Michael Goldsmith, Sadie Creese:
Investigating Malware Campaigns With Semantic Technologies. IEEE Secur. Priv. 17(1): 43-54 (2019) - [c71]Victor M. Ruiz, Jorge A. Gálvez, Michael Goldsmith, Maryam Y. Naim, Alejandro Lopez-Magallon, Ricardo Munoz, Rich Tsui:
Leveraging temporal patterns in physiological variables for prediction of critical events in single ventricle infants. AMIA 2019 - [c70]Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Analysing cyber-insurance claims to design harm-propagation trees. CyberSA 2019: 1-4 - [c69]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing. Cyber Security 2019: 1-9 - [c68]Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa. ICISSP 2019: 75-87 - [c67]Mary K. Bispham, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith:
Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input. ICISSP (Revised Selected Papers) 2019: 93-120 - [c66]Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms. ICISSP (Revised Selected Papers) 2019: 288-316 - [c65]Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Attack and Defence Modelling for Attacks via the Speech Interface. ICISSP 2019: 519-527 - [c64]Arianna Schuler Scott, Michael Goldsmith, Harriet Teare, Helena Webb, Sadie Creese:
Why We Trust Dynamic Consent to Deliver on Privacy. IFIPTM 2019: 28-38 - [c63]Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith:
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. ISI 2019: 98-103 - [i4]Mariam Nouh, Jason R. C. Nurse, Helena Webb, Michael Goldsmith:
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. CoRR abs/1902.06961 (2019) - [i3]Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith:
Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter. CoRR abs/1905.08067 (2019) - 2018
- [j12]Louise Axon, Michael Goldsmith, Sadie Creese:
Chapter Eight - Privacy Requirements in Cybersecurity Applications of Blockchain. Adv. Comput. 111: 229-278 (2018) - [j11]Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton:
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1): tyy006 (2018) - [c62]Hugo Sbai, Michael Goldsmith, Samy Meftali, Jassim Happa:
A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them. CSS 2018: 18-32 - [c61]Jassim Happa, Nick Moffat, Michael Goldsmith, Sadie Creese:
Run-Time Monitoring of Data-Handling Violations. CyberICPS/SECPRE@ESORICS 2018: 213-232 - [c60]Haozhe Zhang, Ioannis Agrafiotis, Arnau Erola, Sadie Creese, Michael Goldsmith:
A State Machine System for Insider Threat Detection. GraMSec@FLoC 2018: 111-129 - [c59]Arianna Schuler Scott, Michael Goldsmith, Harriet Teare:
Wider Research Applications of Dynamic Consent. Privacy and Identity Management 2018: 114-120 - [i2]Louise M. Axon, Bushra A. AlAhmadi, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Sonification in security operations centres: what do security practitioners think? CoRR abs/1807.06706 (2018) - [i1]Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Nonsense Attacks on Google Assistant. CoRR abs/1808.01947 (2018) - 2017
- [j10]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
Formalising Policies for Insider-threat Detection: A Tripwire Grammar. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 26-43 (2017) - [j9]Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Syst. J. 11(2): 503-512 (2017) - [c58]Angeliki Aktypi, Jason R. C. Nurse, Michael Goldsmith:
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. MPS@CCS 2017: 1-11 - [c57]Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. CyberSA 2017: 1-8 - [c56]Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. HCI (22) 2017: 366-383 - [c55]Louise Axon, Michael Goldsmith:
PB-PKI: A Privacy-aware Blockchain-based PKI. SECRYPT 2017: 311-318 - 2016
- [j8]Jason R. C. Nurse, Arnau Erola, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Analytics for characterising and measuring the naturalness of online personae. Secur. Informatics 5(1): 3 (2016) - [c54]Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
A Tripwire Grammar for Insider Threat Detection. MIST@CCS 2016: 105-108 - [c53]Mariam Nouh, Jason R. C. Nurse, Michael Goldsmith:
Towards Designing a Multipurpose Cybercrime Intelligence Framework. EISIC 2016: 60-67 - [c52]Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
A Pragmatic System-failure Assessment and Response Model. ICISSP 2016: 503-508 - [c51]Ioannis Agrafiotis, Arnau Erola, Jassim Happa, Michael Goldsmith, Sadie Creese:
Validating an Insider Threat Detection System: A Real Scenario Perspective. IEEE Symposium on Security and Privacy Workshops 2016: 286-295 - 2015
- [j7]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
An overview of insider attacks in cloud computing. Concurr. Comput. Pract. Exp. 27(12): 2964-2981 (2015) - [j6]Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese:
Investigating the leakage of sensitive personal and organisational information in email headers. J. Internet Serv. Inf. Secur. 5(1): 70-84 (2015) - [c50]Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, Koen Lamberts:
Technology and Information Trust for Supporting Risky Decisions Based on Social-Media Content. CIT/IUCC/DASC/PICom 2015: 461-468 - [c49]Rodrigo Carvalho, Michael Goldsmith, Sadie Creese:
Applying Semantic Technologies to Fight Online Banking Fraud. EISIC 2015: 61-68 - [c48]Matthieu Devlin, Jason R. C. Nurse, Duncan Hodges, Michael Goldsmith, Sadie Creese:
Predicting Graphical Passwords. HCI (22) 2015: 23-35 - [c47]Jason R. C. Nurse, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things. SIoT 2015: 5-14 - 2014
- [j5]Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. J. Internet Serv. Inf. Secur. 4(4): 1-13 (2014) - [j4]Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. J. Internet Serv. Inf. Secur. 4(4): 127-137 (2014) - [c46]Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. HCI (24) 2014: 270-281 - [c45]Jason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese:
Inferring social relationships from technology-level device connections. PST 2014: 40-47 - [c44]Jason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty:
Understanding Insider Threat: A Framework for Characterising Attacks. IEEE Symposium on Security and Privacy Workshops 2014: 214-228 - [c43]Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. STAST 2014: 8-15 - 2013
- [j3]Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 20-37 (2013) - [c42]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman:
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics. HCI (27) 2013: 316-325 - [c41]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Communicating trustworthiness using radar graphs: A detailed look. PST 2013: 333-339 - [c40]James Nicholls, Dominik Peters, Albert Slawinski, Thomas Spoor, Sergiu Vicol, Jassim Happa, Michael Goldsmith, Sadie Creese:
NetVis: a Visualization Tool Enabling Multiple Perspectives of Network Traffic Data. TPCG 2013: 9-16 - [c39]Adrian J. Duncan, Sadie Creese, Michael Goldsmith, Jamie S. Quinton:
Cloud Computing: Insider Attacks on Virtual Machines during Migration. TrustCom/ISPA/IUCC 2013: 493-500 - [c38]Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Building Confidence in Information-Trustworthiness Metrics for Decision Support. TrustCom/ISPA/IUCC 2013: 535-543 - [c37]Thomas Gibson-Robinson, Michael Goldsmith:
The Meaning and Implementation of SKIP in CSP. CPA 2013: 5-20 - 2012
- [j2]Nikolaos Papanikolaou, Sadie Creese, Michael Goldsmith:
Refinement checking for privacy policies. Sci. Comput. Program. 77(10-11): 1198-1209 (2012) - [c36]Philip J. Armstrong, Michael Goldsmith, Gavin Lowe, Joël Ouaknine, Hristina Palikareva, A. W. Roscoe, James Worrell:
Recent Developments in FDR. CAV 2012: 699-704 - [c35]Adedayo Oyelakin Adetoye, Sadie Creese, Michael Goldsmith:
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment. CRITIS 2012: 155-167 - [c34]Duncan Hodges, Sadie Creese, Michael Goldsmith:
A Model for Identity in the Cyber and Natural Universes. EISIC 2012: 115-122 - [c33]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Rachel Craddock, Glyn Jones:
An initial usability evaluation of the secure situation awareness system. ISCRAM 2012 - [c32]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Using Information Trustworthiness Advice in Decision Making. STAST 2012: 35-42 - [c31]Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
Insider Attacks in Cloud Computing. TrustCom 2012: 857-862 - [c30]Sadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips:
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. TrustCom 2012: 1124-1131 - 2011
- [c29]Adedayo Oyelakin Adetoye, Michael Goldsmith, Sadie Creese:
Analysis of Dependencies in Critical Infrastructures. CRITIS 2011: 18-29 - [c28]Sadie Creese, Michael Goldsmith, Adedayo Adetoye:
A logical high-level framework for Critical Infrastructure resilience and risk assessment. CSS 2011: 7-14 - [c27]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Guidelines for usable cybersecurity: Past and present. CSS 2011: 21-26 - [c26]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Developing a Strategy for Automated Privacy Testing Suites. PrimeLife 2011: 32-44 - [c25]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith:
Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation. PrimeLife 2011: 232-244 - [c24]Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Trustworthy and effective communication of cybersecurity risks: A review. STAST 2011: 60-68 - [c23]Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith:
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. STM 2011: 223-238 - 2010
- [c22]M. Auty, Sadie Creese, Michael Goldsmith, Paul Hopkins:
Inadequacies of Current Risk Controls for the Cloud. CloudCom 2010: 659-666 - [c21]Adedayo Adetoye, Sadie Creese, Michael Goldsmith, Paul Hopkins:
A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract. CRITIS 2010: 153-156 - [c20]Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. PrimeLife 2010: 258-270 - [c19]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. PrimeLife 2010: 271-282 - [c18]Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson:
EnCoRe: Towards a Holistic Approach to Privacy. SECRYPT 2010: 171-176 - [c17]Michael Goldsmith, Sadie Creese:
Refinement-Friendly Bigraphs and Spygraphs. SEFM 2010: 203-207
2000 – 2009
- 2009
- [c16]Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
Reaching for Informed Revocation: Shutting Off the Tap on Personal Data. PrimeLife 2009: 246-258 - [c15]Michael Goldsmith:
Beyond Mobility : What Next After CSP/pi? CPA 2009: 1-6 - [e1]Michael Goldsmith, Bill Roscoe:
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007. Electronic Notes in Theoretical Computer Science 250(1), Elsevier 2009 [contents] - 2008
- [j1]Nick Moffat, Michael Goldsmith:
Assumption-Commitment Support for CSP Model Checking. J. Autom. Reason. 41(3-4): 365-398 (2008) - [c14]Nick Moffat, Michael Goldsmith, Bill Roscoe:
A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking. ICFEM 2008: 258-277 - [c13]Sadie Creese, Michael Goldsmith:
Requirements and Concepts for Information Assurance and Pervasive Adaptation Co-design. SASO Workshops 2008: 73-77 - 2007
- [c12]Michael Goldsmith, Bill Roscoe:
Preface. AVoCS 2007: 1-2 - 2006
- [c11]Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao:
Bootstrapping multi-party ad-hoc security. SAC 2006: 369-375 - [c10]Nick Moffat, Michael Goldsmith:
Assumption-Commitment Support for CSP Model Checking. AVoCS 2006: 121-137 - 2005
- [c9]Sadie Creese, Michael Goldsmith, Richard Harrison, Bill Roscoe, Paul Whittaker, Irfan Zakiuddin:
Exploiting Empirical Engagement in Authentication Protocol Design. SPC 2005: 119-133 - 2004
- [c8]Michael Goldsmith:
Operational Semantics for Fun and Profit. 25 Years Communicating Sequential Processes 2004: 265-274 - 2003
- [c7]Michael Goldsmith, Nick Moffat, Bill Roscoe, Tim Whitworth, Irfan Zakiuddin:
Watchdog Transformations for Property-Oriented Model-Checking. FME 2003: 600-616 - [c6]Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin:
Authentication for Pervasive Computing. SPC 2003: 116-129 - [c5]Irfan Zakiuddin, Michael Goldsmith, Paul Whittaker, Paul H. B. Gardiner:
A Methodology for Model-Checking Ad-hoc Networks. SPIN 2003: 181-196
1990 – 1999
- 1999
- [c4]Michael Goldsmith:
Challenges to Process-Algebraic Property-Checking. PDPTA 1999: 273-278 - 1998
- [c3]Michael Goldsmith, Irfan Zakiuddin:
Critical Systems Validation and Verification with CSP and FDR. FM-Trends 1998: 243-250 - 1995
- [c2]A. W. Roscoe, Paul H. B. Gardiner, Michael Goldsmith, J. R. Hulance, D. M. Jackson, J. Bryan Scattergood:
Hierarchical Compression for Model-Checking CSP or How to Check 1020 Dining Philosophers for Deadlock. TACAS 1995: 133-152
1980 – 1989
- 1987
- [c1]Michael Goldsmith, A. Cox, Geoff Barrett:
An Algebraic Transformation System for Occam Programs. STACS 1987: 481 - 1985
- [b1]Geraint Jones, Michael Goldsmith:
Programming in occam 2. Prentice Hall international series in computer science, Prentice Hall 1985, ISBN 978-0-13-730334-2, pp. I-X, 1-317
Coauthor Index
aka: Louise M. Axon
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint