Follow
Christopher M. Poskitt
Title
Cited by
Cited by
Year
Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning
J Inoue, Y Yamagata, Y Chen, CM Poskitt, J Sun
ICDMW 2017 ▪ IEEE International Conference on Data Mining Workshops: Data …, 2017
2172017
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Y Chen, CM Poskitt, J Sun
S&P 2018 ▪ IEEE Symposium on Security & Privacy, 648-660, 2018
1112018
Hoare-Style Verification of Graph Programs
CM Poskitt, D Plump
Fundamenta Informaticae 118 (1-2), 135-175, 2012
692012
Verifying Monadic Second-Order Properties of Graph Programs
CM Poskitt, D Plump
ICGT 2014 ▪ International Conference on Graph Transformation, 2014
462014
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Y Chen, CM Poskitt, J Sun, S Adepu, F Zhang
ASE 2019 ▪ IEEE/ACM International Conference on Automated Software …, 2019
382019
Verifying Total Correctness of Graph Programs
CM Poskitt, D Plump
Electronic Communications of the EASST 61, 2013
312013
Verification of Graph Programs
CM Poskitt
University of York, 2013
302013
Verification of graph programs
CM Poskitt
ICGT 2012 ▪ International Conference on Graph Transformation, 420-422, 2012
302012
Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation
Y Chen, CM Poskitt, J Sun
FM 2016 ▪ International Symposium on Formal Methods 9995, 155-163, 2016
252016
A Hoare calculus for graph programs
CM Poskitt, D Plump
ICGT 2010 ▪ International Conference on Graph Transformation, 139-154, 2010
202010
The AutoProof Verifier: Usability by Non-Experts and on Standard Code
CA Furia, CM Poskitt, J Tschannen
F-IDE 2015 ▪ Formal Integrated Development Environment 187, 42-55, 2015
182015
Towards Rigorously Faking Bidirectional Model Transformations
CM Poskitt, M Dodds, RF Paige, A Rensink
AMT 2014 ▪ Workshop on the Analysis of Model Transformations 1277, 70-75, 2014
152014
Active Fuzzing for Testing and Securing Cyber-Physical Systems
Y Chen, B Xuan, CM Poskitt, J Sun, F Zhang
ISSTA 2020 ▪ ACM SIGSOFT International Symposium on Software Testing and …, 2020
132020
Securing Bring-Your-Own-Device (BYOD) Programming Exams
O Kurniawan, NTS Lee, CM Poskitt
SIGCSE 2020 ▪ ACM Technical Symposium on Computer Science Education, 880-886, 2020
132020
A Semantics Comparison Workbench for a Concurrent, Asynchronous, Distributed Programming Language
C Corrodi, A Heußner, CM Poskitt
Formal Aspects of Computing 30 (1), 163-192, 2018
13*2018
SafeGPU: Contract- and Library-Based GPGPU for Object-Oriented Languages
A Kolesnichenko, CM Poskitt, S Nanz
Computer Languages, Systems & Structures 48, 68-88, 2017
10*2017
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems
Y Jia, J Wang, CM Poskitt, S Chattopadhyay, J Sun, Y Chen
International Journal of Critical Infrastructure Protection 34, 100452, 2021
82021
Deriving invariant checkers for critical infrastructure using axiomatic design principles
CH Yoong, VR Palleti, RR Maiti, A Silva, CM Poskitt
Cybersecurity 4 (1), 1-24, 2021
6*2021
An Interference-Free Programming Model for Network Objects
M Schill, CM Poskitt, B Meyer
COORDINATION 2016 ▪ IFIP International Conference on Coordination Models and …, 2016
62016
Hoare logic for graph programs
CM Poskitt, D Plump
VS-THEORY 2010 ▪ THEORY Workshop at Verified Software: Theories, Tools and …, 2010
62010
The system can't perform the operation now. Try again later.
Articles 1–20