default search action
Colin O'Halloran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ran Wei, Simon Foster, Haitao Mei, Fang Yan, Ruizhe Yang, Ibrahim Habli, Colin O'Halloran, Nick Tudor, Tim Kelly, Yakoub Nemouchi:
ACCESS: Assurance Case Centric Engineering of Safety-critical Systems. J. Syst. Softw. 213: 112034 (2024) - [i1]Ran Wei, Simon Foster, Haitao Mei, Fang Yan, Ruizhe Yang, Ibrahim Habli, Colin O'Halloran, Nick Tudor, Tim Kelly:
ACCESS: Assurance Case Centric Engineering of Safety-critical Systems. CoRR abs/2403.15236 (2024) - 2020
- [c22]Simon Foster, Yakoub Nemouchi, Colin O'Halloran, Karen Stephenson, Nick Tudor:
Formal Model-Based Assurance Cases in Isabelle/SACM: An Autonomous Underwater Vehicle Case Study. FormaliSE@ICSE 2020: 11-21
2010 – 2019
- 2017
- [j6]Colin O'Halloran, Thomas Gibson-Robinson, Neil Brock:
Verifying cyber attack properties. Sci. Comput. Program. 148: 3-25 (2017) - [c21]Thomas Gibson-Robinson, Guy H. Broadfoot, Gustavo Carvalho, Philippa J. Hopcroft, Gavin Lowe, Sidney C. Nogueira, Colin O'Halloran, Augusto Sampaio:
FDR: From Theory to Industrial Application. Concurrency, Security, and Puzzles 2017: 65-87 - 2016
- [c20]Yuhui Lin, Gudmund Grov, Colin O'Halloran, Priiya G.:
A Super Industrial Application of PSGraph. ABZ 2016: 319-325 - 2015
- [j5]Colin O'Halloran:
Verifying Critical Cyber-Physical Systems After Deployment. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 72 (2015) - 2014
- [j4]Ana Cavalcanti, Steve King, Colin O'Halloran, Jim Woodcock:
Test-data generation for control coverage by proof. Formal Aspects Comput. 26(4): 795-823 (2014) - 2013
- [j3]Colin O'Halloran:
Automated verification of code automatically generated from Simulink®. Autom. Softw. Eng. 20(2): 237-264 (2013) - 2011
- [j2]Ana Cavalcanti, Phil Clayton, Colin O'Halloran:
From control law diagrams to Ada via Circus. Formal Aspects Comput. 23(4): 465-512 (2011)
2000 – 2009
- 2009
- [c19]Colin O'Halloran:
Guess and Verify - Back to the Future. FM 2009: 23-32 - 2008
- [c18]Colin O'Halloran, Andy Bates:
Security and Interoperability for MANETs and a Fixed Core. SAFECOMP 2008: 5-11 - [c17]Colin O'Halloran:
How to Soar with CSP. CPA 2008: 15 - 2005
- [c16]Ana Cavalcanti, Phil Clayton, Colin O'Halloran:
Control Law Diagrams in Circus. FM 2005: 253-268 - [c15]Colin O'Halloran:
Where Is the Value in a Program Verifier?. VSTTE 2005: 255-262 - 2004
- [c14]Phil Clayton, Colin O'Halloran:
Using the Compliance Notation in Industry. PSSE 2004: 269-314 - 2003
- [c13]Colin O'Halloran:
Model Based Code Verification. ICFEM 2003: 16-25 - 2001
- [c12]Colin O'Halloran:
Session II-A: Verification and Validation/High-Assurance Systems Acceptance-Based Assurance. ASE 2001: 63-70 - 2000
- [c11]R. D. Arthan, P. Caseley, Colin O'Halloran, Alf Smith:
ClawZ: Control Laws in Z. ICFEM 2000: 169-176 - [c10]Colin O'Halloran:
Issues for the Automatic Generation of Safety Critical Software. ASE 2000: 277-280
1990 – 1999
- 1999
- [c9]Colin O'Halloran:
Trusted System Construction. CSFW 1999: 124-135 - [c8]Colin O'Halloran, Alf Smith:
Verification of Picture Generated Code. ASE 1999: 127-136 - 1998
- [c7]Colin O'Halloran, Alf Smith:
Don't Verify, Abstract! ASE 1998: 53-62 - 1997
- [j1]Colin O'Halloran, R. D. Arthan, D. King:
Using a Formal Specification Contractually. Formal Aspects Comput. 9(4): 349-358 (1997) - [c6]M. A. Hewitt, Colin O'Halloran, Chris T. Sennett:
Experiences with PiZA, an Animator for Z. ZUM 1997: 37-51 - 1994
- [c5]Colin O'Halloran, Chris T. Sennett:
Security Through Type Analysis. ESORICS 1994: 75-89 - [c4]Colin O'Halloran:
Evaluation Semantics in Z. FME 1994: 502-518 - 1992
- [c3]Colin O'Halloran:
On Requirements and Security in a CCIS. CSFW 1992: 121-134 - [c2]Colin O'Halloran:
Refinement and Confidentiality. Refine 1992: 119-139 - 1990
- [c1]Colin O'Halloran:
A Calculus of Information Flow. ESORICS 1990: 147-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint