Profil

HORNE Ross James

Main Referenced Co-authors
MAUW, Sjouke  (12)
Tiu, Alwen (10)
Ciobanu, Gabriel (6)
Sassone, Vladimiro (5)
Ahn, Ki Yung (3)
Main Referenced Keywords
bisimilarity (2); Aerospace Engineering (1); authentication (1); Communication-centric Systems (1); Computer Science Applications (1);
Main Referenced Disciplines
Computer science (33)
Aerospace & aeronautics engineering (2)

Publications (total 34)

The most downloaded
321 downloads
Horne, R. J., Mauw, S., & Tiu, A. (2017). Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae, 153 (1-2), 57-86. doi:10.3233/FI-2017-1531 https://hdl.handle.net/10993/34365

The most cited

26 citations (Scopus®)

Horne, R. J., Mauw, S., & Tiu, A. (2017). Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae, 153 (1-2), 57-86. doi:10.3233/FI-2017-1531 https://hdl.handle.net/10993/34365

HORNE, R. J., MAUW, S., MIZERA, A., Stemper, A., & THOEMEL, J. (2023). Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat. Journal of Aerospace Information Systems, 1-14. doi:10.2514/1.i011232
Peer reviewed

Horne, R. J., Mauw, S., Mizera, A., Stemper, A., & Thoemel, J. (2022). Autonomous Trustworthy Monitoring and Diagnosis of CubeSat Health (AtMonSat). European Space Agency.

Horne, R. J., Mauw, S., & Yurkov, S. (10 August 2022). Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments [Paper presentation]. 35th IEEE Computer Security Foundations Symposium (CSF), Haifa, Israel.

Gil Pons, R., Horne, R. J., Mauw, S., Trujillo-Rasua, R., & Tiu, A. (2022). Is Eve nearby? Analysing protocols under the distant-attacker assumption. In IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel.
Peer reviewed

Hasan, C., Horne, R. J., Mauw, S., & Mizera, A. (2022). Cloud removal from satellite imagery using multispectral edge-filtered conditional generative adversarial networks. International Journal of Remote Sensing, 43 (5), 1881-1893. doi:10.1080/01431161.2022.2048915
Peer Reviewed verified by ORBi

Acclavio, M., Horne, R. J., Mauw, S., & Straßburger, L. (2022). A Graphical Proof Theory of Logical Time. In A. P. Felty (Ed.), Proc. 7th International Conference on Formal Structures for Computation and Deduction (FSCD 2022) (pp. 22:1-22:25). Germany: Schloss Dagstuhl -- Leibniz-Zentrum fur Informatik. doi:10.4230/LIPIcs.FSCD.2022.22
Peer reviewed

Horne, R. J., & Mauw, S. (2021). Discovering ePassport Vulnerabilities using Bisimilarity. Logical Methods in Computer Science, 17 (2), 24:1--24:52. doi:10.23638/LMCS-17(2:24)2021
Peer reviewed

Ahn, K. Y., Horne, R. J., & Tiu, A. (2021). A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. Logical Methods in Computer Science, 17 (3), 2:1–2:40. doi:10.46298/lmcs-17(3:2)2021
Peer reviewed

Horne, R. J., Mauw, S., Yurkov, S., Cerone, A., & Ölveczky, P. C. (2021). Compositional Analysis of Protocol Equivalence in the Applied pi-Calculus Using Quasi-open Bisimilarity. In Theoretical Aspects of Computing -- ICTAC 2021 (pp. 235--255). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-85315-0_14
Peer reviewed

van Glabeek, R. J., Höfner, P., & Horne, R. J. (2021). Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom. In 36th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS '21) (pp. 1-16). IEEE. doi:10.1109/LICS52264.2021.9470531
Peer reviewed

Horne, R. J., Acclavio, M., & Straßburger, L. (2020). Logic Beyond Formulas: A Graphical Proof System. In LICS '20: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science (pp. 38-52). doi:10.1145/3373718.3394763
Peer reviewed

Horne, R. J. (2020). Session Subtyping and Multiparty Compatibility Using Circular Sequents. In In 31st International Conference on Concurrency Theory (CONCUR 2020) (pp. 12:1–12:22).
Peer reviewed

Gabbay, D. M., Horne, R. J., Mauw, S., & van der Torre, L. (2020). Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. In Graphical Models for Security - 7th International Workshop. doi:10.1007/978-3-030-62230-5_8
Peer reviewed

Horne, R. J., Mauw, S., Smith, Z. D., & Filimonov, I. (Other coll.). (2019). Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity. In Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (pp. 18). doi:10.1007/978-3-030-29959-0_28
Peer reviewed

Castellani, I., Dezani-Ciancaglini, M., Giannini, P., & Horne, R. J. (2019). Global Types with Internal Delegation. Theoretical Computer Science. doi:10.1016/j.tcs.2019.09.027
Peer reviewed

Horne, R. J., & Tiu, A. (2019). Constructing weak simulations from linear implications for processes with private names. Mathematical Structures in Computer Science. doi:10.1017/S0960129518000452
Peer Reviewed verified by ORBi

Horne, R. J., Tiu, A., Aman, B., & Ciobanu, G. (2019). De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic. ACM Transactions on Computational Logic, 20 (4), 22:1--22:44. doi:10.1145/3325821
Peer Reviewed verified by ORBi

Albanese, M., Horne, R. J., & Probst, C. W. (2019). Graphical Models for Security - 6th International Workshop, Revised Papers [Paper presentation]. GraMSec@CSF 2019, Hoboken, NJ, USA. doi:10.1007/978-3-030-36537-0

Horne, R. J. (2019). The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic. In 4th International Conference on Formal Structures for Computation and Deduction (FSCD 2019) (pp. 23:1–23:16). LIPIcs. doi:10.4230/LIPIcs.FSCD.2019.23
Peer reviewed

Horne, R. J., Ahn, K. Y., Lin, S.-W., & Tiu, A. (2018). Quasi-Open Bisimilarity with Mismatch is Intuitionistic. In Proceedings of LICS '18: 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS '18) (pp. 26-35). New York, United States: ACM. doi:10.1145/3209108.3209125
Peer reviewed

Horne, R. J., Mauw, S., & Tiu, A. (2018). The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. In Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18).
Peer reviewed

Ahn, K. Y., Horne, R. J., & Tiu, A. (2017). A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. In 28th International Conference on Concurrency Theory (CONCUR 2017). doi:10.4230/LIPIcs.CONCUR.2017.7
Peer reviewed

Horne, R. J., Mauw, S., & Tiu, A. (2017). Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae, 153 (1-2), 57-86. doi:10.3233/FI-2017-1531
Peer Reviewed verified by ORBi

Ciobanu, G., Horne, R. J., & Sassone, V. (2016). A descriptive type foundation for RDF Schema. Journal of Logical and Algebraic Methods in Programming, 85 (5), 681-706. doi:10.1016/j.jlamp.2016.02.006
Peer reviewed

Horne, R. J., Tiu, A., Aman, B., & Ciobanu, G. (2016). Private Names in Non-Commutative Logic. In 27th International Conference on Concurrency Theory (CONCUR 2016). doi:10.4230/LIPIcs.CONCUR.2016.31
Peer reviewed

Tiu, A., Nguyen, N., & Horne, R. J. (2016). SPEC: An Equivalence Checker for Security Protocols. In Programming Languages and Systems - 14th Asian Symposium, APLAS 2016, Hanoi, Vietnam, November 21-23, 2016, Proceedings. doi:10.1007/978-3-319-47958-3_5
Peer reviewed

Ciobanu, G., Horne, R. J., & Sassone, V. (2015). Minimal type inference for Linked Data consumers. Journal of Logical and Algebraic Methods in Programming, 84 (4), 485-504. doi:10.1016/j.jlamp.2014.12.005
Peer reviewed

Ciobanu, G., & Horne, R. J. (2015). Behavioural analysis of sessions using the calculus of structures. In In Perspectives of System Informatics, 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27. Springer. doi:10.1007/978-3-319-41579-6_8
Peer reviewed

Horne, R. J. (Ed.). (2015). Embracing Global Computing in Emerging Economies - First Workshop EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Springer. doi:10.1007/978-3-319-25043-4

Horne, R. J. (2015). The consistency and complexity of multiplicative additive system virtual. Scientific Annals of Computer Science, 25 (2), 245-316. doi:10.7561/SACS.2015.2.245
Peer reviewed

Horne, R. J., & Sassone, V. (2014). A verified algebra for read-write Linked Data. Science of Computer Programming, 89, 2--22. doi:10.1016/j.scico.2013.07.005
Peer Reviewed verified by ORBi

Ciobanu, G., & Horne, R. J. (2013). Non-interleaving Operational Semantics for Geographically Replicated Databases. In 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, {SYNASC} 2013, Timisoara, Romania, September 23-26, 2013. doi:10.1109/SYNASC.2013.64
Peer reviewed

Dezani-Ciancaglini, M., Horne, R. J., & Sassone, V. (2012). Tracing where and who provenance in Linked Data: A calculus. Theoretical Computer Science, 464, 113--129. doi:10.1016/j.tcs.2012.06.020
Peer Reviewed verified by ORBi

Horne, R. J., Sassone, V., & Gibbins, N. (2011). Operational Semantics for SPARQL Update. In The Semantic Web - Joint International Semantic Technology Conference JIST 2011, Hangzhou, China, December 4-7, 2011. Proceedings. Springer. doi:10.1007/978-3-642-29923-0\_16
Peer reviewed

Contact ORBilu