Search research publications and outputs

  1. Other report › Research
  2. A Z Patterns Catalogue II: definitions and laws, v0.1

    Valentine, S. H., Stepney, S. & Toyn, I., 1 Oct 2004, Department of Computer Science, University of York. (Department of Computer Science Technical Report; vol. YCS-2004-383)

    Research output: Book/ReportOther report

  3. A search-based approach to the automated design of security protocols

    Hao, C., Clark, JA. & Jacob, J. L., 2004, YCS-2004-376 ed. Department of Computer Science, University of York. 102 p. (York Computer Science Technical Report Series ("Yellow Reports"); vol. YCS , no. YCS-2004-376)

    Research output: Book/ReportOther report

  4. Automatic test-data generation for testing simulink models

    Zhan, Y. & Clark, J. A., 2004, Department of Computer Science, University of York. 16 p. (York Computer Science Technical Report ; vol. YCS, no. YCS-2004-382)

    Research output: Book/ReportOther report

  5. Breaking the Model: finalisation and a taxonomy of security attack

    Stepney, S., Clark, J. A. & Chivers, H., 2004, Department of Computer Science, University of York. 20 p. (York Computer Science Technical Report; vol. YCS, no. YCS-2004-371)

    Research output: Book/ReportOther report

  6. Security Zonal Analysis

    Srivratanakul, T., Clark, J. A. & Polack, F., 2004, Department of Computer Science, University of York. 43 p. (York Computer Science Technical Report)

    Research output: Book/ReportOther report

  7. Writing Effective Security Abuse Cases

    Srivratanakul, T., Clark, J. A. & Polack, F., 2004, Department of Computer Science, University of York. 52 p. (York Computer Science Technical Report; vol. YCS, no. YCS-2004-375)

    Research output: Book/ReportOther report