Christopher M. Poskitt
Cited by
Cited by
Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning
J Inoue, Y Yamagata, Y Chen, CM Poskitt, J Sun
ICDMW 2017 ▪ IEEE International Conference on Data Mining Workshops: Data …, 2017
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Y Chen, CM Poskitt, J Sun
S&P 2018 ▪ IEEE Symposium on Security & Privacy, 648-660, 2018
Hoare-Style Verification of Graph Programs
CM Poskitt, D Plump
Fundamenta Informaticae 118 (1-2), 135-175, 2012
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Y Chen, CM Poskitt, J Sun, S Adepu, F Zhang
ASE 2019 ▪ IEEE/ACM International Conference on Automated Software …, 2019
Verifying Monadic Second-Order Properties of Graph Programs
CM Poskitt, D Plump
ICGT 2014 ▪ International Conference on Graph Transformation, 2014
Verifying Total Correctness of Graph Programs
CM Poskitt, D Plump
Electronic Communications of the EASST 61, 2013
Verification of Graph Programs
CM Poskitt
University of York, 2013
Verification of graph programs
CM Poskitt
ICGT 2012 ▪ International Conference on Graph Transformation, 420-422, 2012
Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation
Y Chen, CM Poskitt, J Sun
FM 2016 ▪ International Symposium on Formal Methods 9995, 155-163, 2016
A Hoare calculus for graph programs
CM Poskitt, D Plump
ICGT 2010 ▪ International Conference on Graph Transformation, 139-154, 2010
The AutoProof Verifier: Usability by Non-Experts and on Standard Code
CA Furia, CM Poskitt, J Tschannen
F-IDE 2015 ▪ Formal Integrated Development Environment 187, 42-55, 2015
Active Fuzzing for Testing and Securing Cyber-Physical Systems
Y Chen, B Xuan, CM Poskitt, J Sun, F Zhang
ISSTA 2020 ▪ ACM SIGSOFT International Symposium on Software Testing and …, 2020
Towards Rigorously Faking Bidirectional Model Transformations
CM Poskitt, M Dodds, RF Paige, A Rensink
AMT 2014 ▪ Workshop on the Analysis of Model Transformations 1277, 70-75, 2014
Securing Bring-Your-Own-Device (BYOD) Programming Exams
O Kurniawan, NTS Lee, CM Poskitt
SIGCSE 2020 ▪ ACM Technical Symposium on Computer Science Education, 880-886, 2020
A Semantics Comparison Workbench for a Concurrent, Asynchronous, Distributed Programming Language
C Corrodi, A Heußner, CM Poskitt
Formal Aspects of Computing 30 (1), 163-192, 2018
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems
Y Jia, J Wang, CM Poskitt, S Chattopadhyay, J Sun, Y Chen
International Journal of Critical Infrastructure Protection 34, 100452, 2021
SafeGPU: Contract- and Library-Based GPGPU for Object-Oriented Languages
A Kolesnichenko, CM Poskitt, S Nanz
Computer Languages, Systems & Structures 48, 68-88, 2017
Deriving invariant checkers for critical infrastructure using axiomatic design principles
CH Yoong, VR Palleti, RR Maiti, A Silva, CM Poskitt
Cybersecurity 4 (1), 1-24, 2021
Microservices Orchestration vs. Choreography: A Decision Framework
A Megargel, CM Poskitt, V Shankararaman
EDOC 2021 ▪ IEEE International Enterprise Distributed Object Computing …, 2021
An Interference-Free Programming Model for Network Objects
M Schill, CM Poskitt, B Meyer
COORDINATION 2016 ▪ IFIP International Conference on Coordination Models and …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20