| Metamodel-based model conformance and multiview consistency checking RF Paige, PJ Brooke, JS Ostroff ACM Transactions on Software Engineering and Methodology (TOSEM) 16 (3), 11-es, 2007 | 213 | 2007 |
| Fault trees for security system design and analysis PJ Brooke, RF Paige Computers & Security 22 (3), 256-264, 2003 | 151 | 2003 |
| Principles for modeling language design RF Paige, JS Ostroff, PJ Brooke Information and Software Technology 42 (10), 665-675, 2000 | 136 | 2000 |
| A novel approach to the detection of cheating in multiplayer online games P Laurens, RF Paige, PJ Brooke, H Chivers 12th IEEE International Conference on Engineering Complex Computer Systems …, 2007 | 104 | 2007 |
| Agile development of secure web applications X Ge, RF Paige, FAC Polack, H Chivers, PJ Brooke Proceedings of the 6th international conference on Web engineering, 305-312, 2006 | 92 | 2006 |
| Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks SA Razak, SM Furnell, NL Clarke, PJ Brooke Ad Hoc Networks 6 (7), 1151-1167, 2008 | 65 | 2008 |
| Towards an insider threat prediction specification language GB Magklaras, SM Furnell, PJ Brooke Information management & computer security 14 (4), 361-381, 2006 | 55 | 2006 |
| Towards agile engineering of high-integrity systems RF Paige, R Charalambous, X Ge, PJ Brooke International Conference on Computer Safety, Reliability, and Security, 30-43, 2008 | 52 | 2008 |
| Attacks against mobile ad hoc networks routing protocols SA Razak, SM Furnell, PJ Brooke Proceedings of 5th Annual Postgraduate Symposium on the Convergence of …, 2004 | 48 | 2004 |
| FPTC: automated safety analysis for domain-specific languages RF Paige, LM Rose, X Ge, DS Kolovos, PJ Brooke International Conference on Model Driven Engineering Languages and Systems …, 2008 | 39 | 2008 |
| Extreme programming security practices X Ge, RF Paige, F Polack, P Brooke International Conference on Extreme Programming and Agile Processes in …, 2007 | 38 | 2007 |
| A CSP model of Eiffel’s SCOOP PJ Brooke, RF Paige, JL Jacob Formal Aspects of Computing 19 (4), 487-512, 2007 | 36 | 2007 |
| A new taxonomy for comparing intrusion detection systems CJ Tucker, SM Furnell, BV Ghita, PJ Brooke Internet Research 17 (1), 88-98, 2007 | 34 | 2007 |
| A timed semantics for a hierarchical design notation. PJ Brooke | 34 | 2005 |
| Towards an agile process for building software product lines RF Paige, X Wang, ZR Stephenson, PJ Brooke International Conference on Extreme Programming and Agile Processes in …, 2006 | 26 | 2006 |
| A two-tier intrusion detection system for mobile ad hoc networks–a friend approach SA Razak, S Furnell, N Clarke, P Brooke International conference on intelligence and security informatics, 590-595, 2006 | 25 | 2006 |
| Security planning and refactoring in extreme programming EG Aydal, RF Paige, H Chivers, PJ Brooke International Conference on Extreme Programming and Agile Processes in …, 2006 | 21 | 2006 |
| Certified password quality: a case study using Coq and Linux pluggable authentication modules JF Ferreira, SA Johnson, A Mendes, PJ Brooke International Conference on Integrated Formal Methods, 407-421, 2017 | 20 | 2017 |
| High-integrity agile processes for the development of safety critical software RF Paige, A Galloway, R Charalambous, X Ge, PJ Brooke International Journal of Critical Computer-Based Systems 2 (2), 181-216, 2011 | 20 | 2011 |
| Denotational semantics and its algebraic derivation for an event-driven system-level language H Zhu, J He, S Qin, PJ Brooke Formal Aspects of Computing 27 (1), 133-166, 2015 | 18 | 2015 |