default search action
Thomas Given-Wilson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2012
- [b1]Thomas Given-Wilson:
Concurrent pattern unification. University of Technology Sydney, Australia, 2012
Journal Articles
- 2022
- [j11]Khanh-Huu-The Dam, Thomas Given-Wilson, Axel Legay, Rosana Veroneze:
Packer classification based on association rule mining. Appl. Soft Comput. 127: 109373 (2022) - 2020
- [j10]Stefano Sebastio, Eduard Baranov, Fabrizio Biondi, Olivier Decourbe, Thomas Given-Wilson, Axel Legay, Cassius Puodzius, Jean Quilbeuf:
Optimizing symbolic execution for malware behavior classification. Comput. Secur. 93: 101775 (2020) - [j9]Thomas Given-Wilson, Nisrine Jafri, Axel Legay:
Combined software and hardware fault injection vulnerability detection. Innov. Syst. Softw. Eng. 16(2): 101-120 (2020) - [j8]Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Introduction to the special issue for SPIN 2019. Int. J. Softw. Tools Technol. Transf. 22(5): 563-564 (2020) - [j7]Ioana Cristescu, Thomas Given-Wilson, Axel Legay:
Expressiveness of concurrent intensionality. Theor. Comput. Sci. 837: 54-83 (2020) - 2019
- [j6]Fabrizio Biondi, Michael A. Enescu, Thomas Given-Wilson, Axel Legay, Lamine Noureddine, Vivek Verma:
Effective, efficient, and robust packing detection and classification. Comput. Secur. 85: 436-451 (2019) - [j5]Thomas Given-Wilson, Annelie Heuser, Nisrine Jafri, Axel Legay:
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries. Concurr. Comput. Pract. Exp. 31(23) (2019) - 2018
- [j4]Thomas Given-Wilson, Axel Legay, Sean Sedwards, Olivier Zendra:
Group abstraction for assisted navigation of social activities in intelligent environments. J. Reliab. Intell. Environ. 4(2): 107-120 (2018) - 2016
- [j3]Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Attainable unconditional security for shared-key cryptosystems. Inf. Sci. 369: 80-99 (2016) - 2014
- [j2]Thomas Given-Wilson, Daniele Gorla, Barry Jay:
A Concurrent Pattern Calculus. Log. Methods Comput. Sci. 10(3) (2014) - 2011
- [j1]Thomas Given-Wilson, Barry Jay:
A combinatory account of internal structure. J. Symb. Log. 76(3): 807-826 (2011)
Conference and Workshop Papers
- 2022
- [c31]Khanh-Huu-The Dam, Fabien Duchene, Thomas Given-Wilson, Maxime Cordy, Axel Legay:
Automated Repair of Security Errors in C Programs via Statistical Model Checking: A Proof of Concept. ISoLA (1) 2022: 279-298 - 2021
- [c30]Eduard Baranov, Juliana Bowles, Thomas Given-Wilson, Axel Legay, Thais Webber:
A Secure User-Centred Healthcare System: Design and Verification. DataMod 2021: 44-60 - [c29]Khanh-Huu-The Dam, Thomas Given-Wilson, Axel Legay:
Unsupervised behavioural mining and clustering for malware family identification. SAC 2021: 374-383 - [c28]Antoine Chenoy, Fabien Duchene, Thomas Given-Wilson, Axel Legay:
C-SMC: A Hybrid Statistical Model Checking and Concrete Runtime Engine for Analyzing C Programs. SPIN 2021: 101-119 - [c27]Igor Zavalyshyn, Thomas Given-Wilson, Axel Legay, Ramin Sadre, Etienne Rivière:
Chaos Duck: A Tool for Automatic IoT Software Fault-Tolerance Analysis. SRDS 2021: 46-55 - 2020
- [c26]Thomas Given-Wilson, Axel Legay:
Formalising fault injection and countermeasures. ARES 2020: 22:1-22:11 - [c25]Thomas Given-Wilson, Eduard Baranov, Axel Legay:
Building User Trust of Critical Digital Technologies. ICIT 2020: 1199-1204 - [c24]Eduard Baranov, Thomas Given-Wilson, Axel Legay:
Improving Secure and Robust Patient Service Delivery. ISoLA (1) 2020: 404-418 - [c23]Igor Zavalyshyn, Thomas Given-Wilson, Axel Legay, Ramin Sadre:
Brief Announcement: Effectiveness of Code Hardening for Fault-Tolerant IoT Software. SSS 2020: 317-322 - 2019
- [c22]Vladimir Janjic, Michael Vinov, Thomas Given-Wilson, Axel Legay, Euan Blackledge, R. Arredouani, George Stylianou, Wanting Huang, Juliana Küster Filipe Bowles, Andreas Francois Vermeulen, Agastya Silvina, Marios Belk, Christos Fidas, Andreas Pitsillides, M. Kumar, Michael Rossbory:
The SERUMS tool-chain: Ensuring Security and Privacy of Medical Data in Smart Patient-Centric Healthcare Systems. IEEE BigData 2019: 2726-2735 - [c21]Quentin De Coninck, François Michel, Maxime Piraux, Florentin Rochet, Thomas Given-Wilson, Axel Legay, Olivier Pereira, Olivier Bonaventure:
Pluginizing QUIC. SIGCOMM 2019: 59-74 - 2018
- [c20]Thomas Given-Wilson, Axel Legay:
On the Expressiveness of Joining and Splitting. Models, Mindsets, Meta 2018: 326-355 - [c19]Thomas Given-Wilson, Axel Legay:
X-by-C: Non-functional Security Challenges. ISoLA (1) 2018: 486-501 - [c18]Fabrizio Biondi, Thomas Given-Wilson, Axel Legay, Cassius Puodzius, Jean Quilbeuf:
Tutorial: An Overview of Malware Detection and Evasion Techniques. ISoLA (1) 2018: 565-586 - [c17]Najah Ben Said, Fabrizio Biondi, Vesselin Bontchev, Olivier Decourbe, Thomas Given-Wilson, Axel Legay, Jean Quilbeuf:
Detection of Mirai by Syntactic and Behavioral Analysis. ISSRE 2018: 224-235 - [c16]Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Universal Optimality of Apollonian Cell Encoders. TrustCom/BigDataSE 2018: 424-435 - [c15]Thomas Given-Wilson, Nisrine Jafri, Axel Legay:
The State of Fault Injection Vulnerability Detection. VECoS 2018: 3-21 - 2017
- [c14]Fabrizio Biondi, Mounir Chadli, Thomas Given-Wilson, Axel Legay:
Information Leakage as a Scheduling Resource. FMICS-AVoCS 2017: 83-99 - [c13]Thomas Given-Wilson, Axel Legay, Sean Sedwards:
Information Security, Privacy, and Trust in Social Robotic Assistants for Older Adults. HCI (22) 2017: 90-109 - [c12]Thomas Given-Wilson, Nisrine Jafri, Jean-Louis Lanet, Axel Legay:
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT. TrustCom/BigDataSE/ICESS 2017: 293-300 - 2016
- [c11]Thomas Given-Wilson, Axel Legay:
On the Expressiveness of Symmetric Communication. ICTAC 2016: 139-157 - 2015
- [c10]Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Attainable Unconditional Security for Shared-Key Cryptosystems. TrustCom/BigDataSE/ISPA (1) 2015: 159-166 - [c9]Yusuke Kawamoto, Thomas Given-Wilson:
Quantitative Information Flow for Scheduler-Dependent Systems. QAPL 2015: 48-62 - [c8]Thomas Given-Wilson, Axel Legay:
On the Expressiveness of Joining. ICE 2015: 99-113 - 2014
- [c7]Thomas Given-Wilson:
Expressiveness via Intensionality and Concurrency. ICTAC 2014: 206-223 - [c6]Thomas Given-Wilson:
An Intensional Concurrent Faithful Encoding of Turing Machines. ICE 2014: 21-37 - [c5]Thomas Given-Wilson:
On the Expressiveness of Intensional Communication. EXPRESS/SOS 2014: 30-46 - 2013
- [c4]Thomas Given-Wilson, Daniele Gorla:
Pattern Matching and Bisimulation. COORDINATION 2013: 60-74 - [c3]Thomas Given-Wilson, Freeman Huang, Barry Jay:
Multi-polymorphic programming in bondi. WGP@ICFP 2013: 53-60 - 2012
- [c2]Mark Bradley, Franck Cassez, Ansgar Fehnker, Thomas Given-Wilson, Ralf Huuck:
High Performance Static Analysis for Industry. TAPAS@SAS 2012: 3-14 - 2010
- [c1]Thomas Given-Wilson, Daniele Gorla, Barry Jay:
Concurrent Pattern Calculus. IFIP TCS 2010: 244-258
Editorship
- 2019
- [e1]Fabrizio Biondi, Thomas Given-Wilson, Axel Legay:
Model Checking Software - 26th International Symposium, SPIN 2019, Beijing, China, July 15-16, 2019, Proceedings. Lecture Notes in Computer Science 11636, Springer 2019, ISBN 978-3-030-30922-0 [contents]
Informal and Other Publications
- 2021
- [i2]Charles-Henry Bertrand Van Ouytsel, Thomas Given-Wilson, Jeremy Minet, Julian Roussieau, Axel Legay:
Analysis of Machine Learning Approaches to Packing Detection. CoRR abs/2105.00473 (2021) - 2014
- [i1]Thomas Given-Wilson:
Expressiveness via Intensionality and Concurrency. CoRR abs/1404.0956 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint