Skip to main content

Nick Moffat : Publications

Click here to download all publications in a single bibtex file

@article{legg2013mist,
  title = "Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection",
  author = "Philip A. Legg, Nick Moffat, Jason R.C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese",
  year = "2013",
  issn = "2093-5382",
  journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications",
  number = "4",
  pages = "20-37",
  url = "http://isyou.info/jowua/papers/jowua-v4n4-2.pdf",
  volume = "4",
}
@article{8674,
  title = "Assumption-Commitment Support for CSP Model Checking",
  author = "Nick Moffat and Michael Goldsmith",
  year = "2008",
  issn = "1573-0670",
  journal = "Journal of Automated Reasoning",
  pages = "365-398",
  publisher = "Springer Netherlands",
  url = "http://link.springer.com/article/10.1007%2Fs10817-008-9111-8",
  volume = "41",
  doi = "10.1007/s10817-008-9111-8",
}
@inproceedings{8675,
  title = "A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking",
  author = "Nick Moffat and Michael Goldsmith and Bill Roscoe",
  year = "2008",
  booktitle = "ICFEM",
  isbn = "978-3-540-88194-0",
  journal = "In Proceedings of ICFEM 2008, Kita-Kyushu City, Japan, October 2008",
  publisher = "Springer Berlin Heidelberg",
  series = "Lecture Notes in Computer Science",
  volume = "5256",
  doi = "10.1007/978-3-540-88194-0_17",
}
@conference{8673,
  title = "Towards Symmetry Aware Refinement Checking (Extended Abstract)",
  author = "Nick Moffat and Michael Goldsmith and Bill Roscoe",
  year = "2007",
  journal = "International Symmetry Conference, Edinburgh, January 15-17, 2007",
}
@inproceedings{8672,
  title = "Assumption-Commitment Support for CSP Model Checking",
  author = "Nick Moffat and Michael Goldsmith",
  year = "2006",
  booktitle = "Workshop on Automated Verification of Critical Systems",
  journal = "In Proceedings of the Sixth International Workshop on Automated Verification of Critical Systems",
  pages = "104-119",
  url = "http://hal.inria.fr/inria-00089499/en",
}
@inproceedings{8670,
  title = "Rigorous Analysis of Routing Protocols Using Game Search",
  author = "Irfan Zakiuddin and Tim Hawkins and Nick Moffat and Chris Leow",
  year = "2004",
  isbn = "4-902523-00-0",
  journal = "(ICMU 2004) In Proceedings of First International Conference on Mobile Computing and Ubiquitous Networking, Yokosuka, Japan, January 8-9, 2004",
  pages = "46-51",
}
@proceedings{8671,
  title = "Towards A Game Theoretic Understanding of Ad-Hoc Routing",
  author = "Irfan Zakiuddin and Tim Hawkins and Nick Moffat",
  year = "2004",
  booktitle = "Electronic Notes in Theoretical Computer Science",
  journal = "Proceedings of the Workshop on Games in Design and Verification (GDV 2004)",
  pages = "67-92",
  publisher = "Elsevier",
  url = "http://www.sciencedirect.com/science/article/pii/S1571066104053356",
  volume = "119",
  doi = "10.1016/j.entcs.2004.07.009",
}
@inproceedings{8669,
  title = "Watchdog Transformations for Property-Oriented Model-Checking",
  author = "Michael Goldsmith and Nick Moffat and Bill Roscoe and Tim Whitworth and Irfan Zakiuddin",
  year = "2003",
  booktitle = "FME 2003: Formal Methods",
  isbn = "3-540-40828-2",
  issn = "0302-9743",
  journal = "(FME 2003) In Proceedings of Formal Methods, International Symposium of Formal Methods Europe, Pisa, Italy, September 8-14, 2003",
  pages = "600-616",
  publisher = "Springer Berlin Heidelberg",
  url = "http://link.springer.com/chapter/10.1007%2F978-3-540-45236-2_33",
  volume = "2805",
  doi = "10.1007/978-3-540-45236-2_33",
}
@inproceedings{8668,
  title = "Modelling Ad-hoc Routing Protocols Using Game Search: Extended Abstract",
  author = "Irfan Zakiuddin and Tim Hawkins and Nick Moffat and Sadie Creese and Chris Leow",
  year = "2003",
  journal = "(AVoCS '03) In Proceedings of the 3rd Automated Verificaiton of Critical Systems",
  url = "http://www.ecs.soton.ac.uk/~mal/avocs03/",
}
@inproceedings{8667,
  title = "An Assessment of Software Sneak Analysis",
  author = "Graham Jolliffe and Nick Moffat",
  year = "2003",
  journal = "(ISSC 2003) In Proceedings of the 21st International System Safety Conference, August 4-8, 2003",
}
@proceedings{8666,
  title = "An Assessment of Software Sneak Analysis",
  author = "Graham Jolliffe and Nick Moffat",
  year = "2003",
  booktitle = "Proceedings of the Eleventh Safety-critical Systems Symposium, Bristol, UK, 4–6 February 2003",
  isbn = "978-1-85233-696-7",
  journal = "Current issues in Safety-Critical Systems",
  pages = "175-188",
  publisher = "Springer London",
  url = "http://link.springer.com/book/",
  doi = "10.1007/978-1-4471-0653-1_11",
}
@conference{8664,
  title = "Property Based Compression Strategies",
  author = "Irfan Zakiuddin and Nick Moffat and Michael Goldsmith and Tim Whitworth",
  year = "2002",
  journal = "(AVoCS 2002) Second Workshop on Automated Verificaiton of Critical Systems",
}
@conference{8661,
  title = "(DSN '2001) International Conference on DSoS (Dependable Systems of Systems) and Networks",
  author = "B. Randell, R.J. Stroud, C.Jones, H.Kopetz, D.Powell, V.Issarny, N.Moffat, M.C.Gaudel, F.Von Henke",
  year = "2001",
  pages = "D28-D31",
}