John A. Clark
Orcid: 0000-0002-9230-9739Affiliations:
- University of Sheffield, UK
- University of York, UK (PhD 2001)
According to our database1,
John A. Clark
authored at least 148 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks.
IEEE/ACM Trans. Netw., April, 2024
Comput. Secur., 2024
2023
A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids.
CoRR, 2023
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
On Optimal Configuration of IDS for RPL Resource-Constrained Networks Using Evolutionary Algorithm.
Proceedings of the Future Technologies Conference, 2022
Proceedings of the 25th IEEE International Conference on Computational Science and Engineering, 2022
Transfer Learning Approach to Discover IDS Configurations Using Deep Neural Networks.
Proceedings of the International Conference on Communications, 2022
2021
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems.
Secur. Priv., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based Multi-feature Detection Model.
Proceedings of the IEEE International Conference on Communications, 2021
Proceedings of the Workshop on AI and Cybersecurity (AI-Cybersec 2021) co-located with 41st SGAI International Conference on Artificial Intelligence (SGAI 2021), 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the 10th IEEE/ACM International Workshop on Genetic Improvement, 2021
Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
CoRR, 2020
Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
2019
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Optimising trotter-suzuki decompositions for quantum simulation using evolutionary strategies.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019
2018
IEEE Trans. Reliab., 2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Applying Cartesian Genetic Programming to Evolve Rules for Intrusion Detection System.
Proceedings of the 10th International Joint Conference on Computational Intelligence, 2018
Dependent input sampling strategies: using metaheuristics for generating parameterised random sampling regimes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2018
Proceedings of the Applications of Evolutionary Computation, 2018
2017
NII Shonan Meet. Rep., 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
2015
The optimisation of stochastic grammars to enable cost-effective probabilistic structural testing.
J. Syst. Softw., 2015
2014
Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Comput. Networks, 2014
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
The executable experimental template pattern for the systematic comparison of metaheuristics: Extended Abstract.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014
Proceedings of the Engineering Multi-Agent Systems - Second International Workshop, 2014
2013
J. Syst. Softw., 2013
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise.
Inf. Syst. Frontiers, 2013
Guest Editorial: Special section of the best papers from the 2nd International Symposium on Search Based Software Engineering 2010.
Inf. Softw. Technol., 2013
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
IACR Cryptol. ePrint Arch., 2013
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
IACR Cryptol. ePrint Arch., 2013
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
IACR Cryptol. ePrint Arch., 2013
Using evolutionary computation to create vectorial Boolean functions with low differential uniformity and high nonlinearity
CoRR, 2013
The placement-configuration problem for intrusion detection nodes in wireless sensor networks.
Comput. Electr. Eng., 2013
Proceedings of the Search Based Software Engineering - 5th International Symposium, 2013
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
Dynamic adaptive Search Based Software Engineering needs fast approximate metrics (keynote).
Proceedings of the 4th International Workshop on Emerging Trends in Software Metrics, 2013
Proceedings of the 2nd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, 2013
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013
2012
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012
Proceedings of the Search Based Software Engineering - 4th International Symposium, 2012
The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper).
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012
Proceedings of the 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2012
2011
CoRR, 2011
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks.
Comput. Networks, 2011
Applications of Model Reuse When Using Estimation of Distribution Algorithms to Test Concurrent Software.
Proceedings of the Search Based Software Engineering - Third International Symposium, 2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
A Principled Evaluation of the Effect of Directed Mutation on Search-Based Statistical Testing.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011
Finding short counterexamples in promela models using estimation of distribution algorithms.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
IEEE Trans. Software Eng., 2010
Defending the weakest link: phishing websites detection by analysing user behaviours.
Telecommun. Syst., 2010
Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Third International Conference on Software Testing, 2010
Proceedings of the 20th International Conference on Pattern Recognition, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the Genetic Programming, 13th European Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
Comparing algorithms for search-based test data generation of Matlab® Simulink® models.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
J. Syst. Softw., 2008
Formal Aspects Comput., 2008
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008
Proceedings of the Simulated Evolution and Learning, 7th International Conference, 2008
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Proceedings of the IEEE Congress on Evolutionary Computation, 2008
2007
Proceedings of the Cryptography and Coding, 2007
An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
2006
Int. J. Parallel Emergent Distributed Syst., 2006
Evol. Comput., 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
Proceedings of the CAISE*06 Workshop on Regulations Modelling and their Validation and Verification ReMo2V '06, 2006
2005
Parallel Algorithms Appl., 2005
Proceedings of the REFINE 2005 Workshop, 2005
"Devices Are People Too" Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Evolution of a human-competitive quantum fourier transform algorithm using genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
2004
Softw. Test. Verification Reliab., 2004
SIGCAS Comput. Soc., 2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Comput. Networks, 2004
Comput. Intell., 2004
Proceedings of the 10th IEEE International Software Metrics Symposium (METRICS 2004), 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Genetic and Evolutionary Computation, 2004
Proceedings of the Genetic and Evolutionary Computation, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
2003
Proceedings of the Security in Pervasive Computing, 2003
Proceedings of the Artificial Immune Systems, Second International Conference, 2003
Proceedings of the Genetic and Evolutionary Computation, 2003
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It.
Proceedings of the Genetic and Evolutionary Computation, 2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003
2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
Investigating the effectiveness of object-oriented testing strategies using the mutation method.
Softw. Test. Verification Reliab., 2001
Inf. Softw. Technol., 2001
2000
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
1998
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998
Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis, 1998
Towards Industrially Applicable Formal Methods: Three Small Steps and One Giant Leap.
Proceedings of the Second IEEE International Conference on Formal Engineering Methods, 1998
1995
1994
Microprocess. Microprogramming, 1994