Search research publications and outputs

  1. 2015
  2. Situation coverage – a coverage criterion for testing autonomous robots

    Alexander, R., Hawkins, H. R. & Rae, A. J., Feb 2015, Department of Computer Science, University of York. 21 p.

    Research output: Book/ReportOther report

  3. 2005
  4. Formalizing anonymity: A review

    Wright, J., Stepney, S., Clark, J. A. & Jacob, J. L., 2005, YCS-2005-389 ed. Department of Computer Science, University of York. 64 p. (York Computer Science Technical Report Series; vol. YCS, no. YCS-2005-389)

    Research output: Book/ReportOther report

  5. 2004
  6. A search-based approach to the automated design of security protocols

    Hao, C., Clark, JA. & Jacob, J. L., 2004, YCS-2004-376 ed. Department of Computer Science, University of York. 102 p. (York Computer Science Technical Report Series ("Yellow Reports"); vol. YCS , no. YCS-2004-376)

    Research output: Book/ReportOther report

  7. Automatic test-data generation for testing simulink models

    Zhan, Y. & Clark, J. A., 2004, Department of Computer Science, University of York. 16 p. (York Computer Science Technical Report ; vol. YCS, no. YCS-2004-382)

    Research output: Book/ReportOther report

  8. Breaking the Model: finalisation and a taxonomy of security attack

    Stepney, S., Clark, J. A. & Chivers, H., 2004, Department of Computer Science, University of York. 20 p. (York Computer Science Technical Report; vol. YCS, no. YCS-2004-371)

    Research output: Book/ReportOther report

  9. Writing Effective Security Abuse Cases

    Srivratanakul, T., Clark, J. A. & Polack, F., 2004, Department of Computer Science, University of York. 52 p. (York Computer Science Technical Report; vol. YCS, no. YCS-2004-375)

    Research output: Book/ReportOther report

  10. 1997
  11. A survey of authentication protocol literature: Version 1.0

    Clark, J. A. & Jacob, J. L., 1997, Citeseer.

    Research output: Book/ReportOther report