Follow
Christopher M. Poskitt
Title
Cited by
Cited by
Year
Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning
J Inoue, Y Yamagata, Y Chen, CM Poskitt, J Sun
ICDMW 2017 ▪ IEEE International Conference on Data Mining Workshops: Data …, 2017
3752017
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Y Chen, CM Poskitt, J Sun
S&P 2018 ▪ IEEE Symposium on Security & Privacy, 648-660, 2018
1682018
Hoare-Style Verification of Graph Programs
CM Poskitt, D Plump
Fundamenta Informaticae 118 (1-2), 135-175, 2012
782012
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Y Chen, CM Poskitt, J Sun, S Adepu, F Zhang
ASE 2019 ▪ IEEE/ACM International Conference on Automated Software …, 2019
732019
Verifying Monadic Second-Order Properties of Graph Programs
CM Poskitt, D Plump
ICGT 2014 ▪ International Conference on Graph Transformation, 2014
532014
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles
Y Sun, CM Poskitt, J Sun, Y Chen, Z Yang
ASE'22 ▪ IEEE/ACM International Conference on Automated Software Engineering, 2022
352022
Verification of Graph Programs
CM Poskitt
University of York, 2013
342013
Verification of graph programs
CM Poskitt
ICGT 2012 ▪ International Conference on Graph Transformation, 420-422, 2012
342012
Specification-based Autonomous Driving System Testing
Y Zhou, Y Sun, Y Tang, Y Chen, J Sun, CM Poskitt, Y Liu, Z Yang
IEEE Transactions on Software Engineering 49 (6), 3391-3410, 2023
332023
Verifying Total Correctness of Graph Programs
CM Poskitt, D Plump
Electronic Communications of the EASST 61, 2013
332013
Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation
Y Chen, CM Poskitt, J Sun
FM 2016 ▪ International Symposium on Formal Methods 9995, 155-163, 2016
322016
Active Fuzzing for Testing and Securing Cyber-Physical Systems
Y Chen, B Xuan, CM Poskitt, J Sun, F Zhang
ISSTA 2020 ▪ ACM SIGSOFT International Symposium on Software Testing and …, 2020
312020
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems
Y Jia, J Wang, CM Poskitt, S Chattopadhyay, J Sun, Y Chen
International Journal of Critical Infrastructure Protection 34, 100452, 2021
302021
A Hoare calculus for graph programs
CM Poskitt, D Plump
ICGT 2010 ▪ International Conference on Graph Transformation, 139-154, 2010
262010
Securing Bring-Your-Own-Device (BYOD) Programming Exams
O Kurniawan, NTS Lee, CM Poskitt
SIGCSE 2020 ▪ ACM Technical Symposium on Computer Science Education, 880-886, 2020
212020
The AutoProof Verifier: Usability by Non-Experts and on Standard Code
CA Furia, CM Poskitt, J Tschannen
F-IDE 2015 ▪ Formal Integrated Development Environment 187, 42-55, 2015
192015
Microservices Orchestration vs. Choreography: A Decision Framework
A Megargel, CM Poskitt, V Shankararaman
EDOC 2021 ▪ IEEE International Enterprise Distributed Object Computing …, 2021
172021
Deriving invariant checkers for critical infrastructure using axiomatic design principles
CH Yoong, VR Palleti, RR Maiti, A Silva, CM Poskitt
Cybersecurity 4, 1-24, 2021
16*2021
A Semantics Comparison Workbench for a Concurrent, Asynchronous, Distributed Programming Language
C Corrodi, A Heußner, CM Poskitt
Formal Aspects of Computing 30 (1), 163-192, 2018
15*2018
Towards Rigorously Faking Bidirectional Model Transformations
CM Poskitt, M Dodds, RF Paige, A Rensink
AMT 2014 ▪ Workshop on the Analysis of Model Transformations 1277, 70-75, 2014
142014
The system can't perform the operation now. Try again later.
Articles 1–20