HORNE, R. J., MAUW, S., MIZERA, A., Stemper, A., & THOEMEL, J. (2023). Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat. Journal of Aerospace Information Systems, 1-14. doi:10.2514/1.i011232 Peer reviewed |
HORNE, R. J., MAUW, S., MIZERA, A., STEMPER, A., & THOEMEL, J. (2022). Autonomous Trustworthy Monitoring and Diagnosis of CubeSat Health (AtMonSat). European Space Agency. https://orbilu.uni.lu/handle/10993/55702 |
HORNE, R. J., MAUW, S., & YURKOV, S. (10 August 2022). Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments [Paper presentation]. 35th IEEE Computer Security Foundations Symposium (CSF), Haifa, Israel. |
Hasan, C., HORNE, R. J., MAUW, S., & MIZERA, A. (2022). Cloud removal from satellite imagery using multispectral edge-filtered conditional generative adversarial networks. International Journal of Remote Sensing, 43 (5), 1881-1893. doi:10.1080/01431161.2022.2048915 Peer Reviewed verified by ORBi |
ACCLAVIO, M., HORNE, R. J., MAUW, S., & Straßburger, L. (2022). A Graphical Proof Theory of Logical Time. In A. P. Felty (Ed.), Proc. 7th International Conference on Formal Structures for Computation and Deduction (FSCD 2022) (pp. 22:1-22:25). Germany: Schloss Dagstuhl -- Leibniz-Zentrum fur Informatik. doi:10.4230/LIPIcs.FSCD.2022.22 Peer reviewed |
GIL PONS, R., HORNE, R. J., MAUW, S., Trujillo-Rasua, R., & Tiu, A. (2022). Is Eve nearby? Analysing protocols under the distant-attacker assumption. In IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel. Peer reviewed |
HORNE, R. J., & MAUW, S. (2021). Discovering ePassport Vulnerabilities using Bisimilarity. Logical Methods in Computer Science, 17 (2), 24:1--24:52. doi:10.23638/LMCS-17(2:24)2021 Peer reviewed |
Ahn, K. Y., HORNE, R. J., & Tiu, A. (2021). A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. Logical Methods in Computer Science, 17 (3), 2:1–2:40. doi:10.46298/lmcs-17(3:2)2021 Peer reviewed |
van Glabeek, R. J., Höfner, P., & HORNE, R. J. (2021). Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom. In 36th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS '21) (pp. 1-16). IEEE. doi:10.1109/LICS52264.2021.9470531 Peer reviewed |
HORNE, R. J., MAUW, S., YURKOV, S., Cerone, A., & Ölveczky, P. C. (2021). Compositional Analysis of Protocol Equivalence in the Applied pi-Calculus Using Quasi-open Bisimilarity. In Theoretical Aspects of Computing -- ICTAC 2021 (pp. 235--255). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-85315-0_14 Peer reviewed |
GABBAY, D. M., HORNE, R. J., MAUW, S., & VAN DER TORRE, L. (2020). Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. In Graphical Models for Security - 7th International Workshop. doi:10.1007/978-3-030-62230-5_8 Peer reviewed |
HORNE, R. J., ACCLAVIO, M., & Straßburger, L. (2020). Logic Beyond Formulas: A Graphical Proof System. In LICS '20: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science (pp. 38-52). doi:10.1145/3373718.3394763 Peer reviewed |
HORNE, R. J. (2020). Session Subtyping and Multiparty Compatibility Using Circular Sequents. In In 31st International Conference on Concurrency Theory (CONCUR 2020) (pp. 12:1–12:22). Peer reviewed |
HORNE, R. J., MAUW, S., SMITH, Z. D., & Filimonov, I. (Other coll.). (2019). Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity. In Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (pp. 18). doi:10.1007/978-3-030-29959-0_28 Peer reviewed |
HORNE, R. J. (2019). The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic. In 4th International Conference on Formal Structures for Computation and Deduction (FSCD 2019) (pp. 23:1–23:16). LIPIcs. doi:10.4230/LIPIcs.FSCD.2019.23 Peer reviewed |
Castellani, I., Dezani-Ciancaglini, M., Giannini, P., & HORNE, R. J. (2019). Global Types with Internal Delegation. Theoretical Computer Science. doi:10.1016/j.tcs.2019.09.027 Peer reviewed |
Albanese, M., HORNE, R. J., & Probst, C. W. (2019). Graphical Models for Security - 6th International Workshop, Revised Papers [Paper presentation]. GraMSec@CSF 2019, Hoboken, NJ, USA. doi:10.1007/978-3-030-36537-0 |
HORNE, R. J., Tiu, A., Aman, B., & Ciobanu, G. (2019). De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic. ACM Transactions on Computational Logic, 20 (4), 22:1--22:44. doi:10.1145/3325821 Peer Reviewed verified by ORBi |
HORNE, R. J., & Tiu, A. (2019). Constructing weak simulations from linear implications for processes with private names. Mathematical Structures in Computer Science. doi:10.1017/S0960129518000452 Peer Reviewed verified by ORBi |
HORNE, R. J., Ahn, K. Y., Lin, S.-W., & Tiu, A. (2018). Quasi-Open Bisimilarity with Mismatch is Intuitionistic. In Proceedings of LICS '18: 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS '18) (pp. 26-35). New York, United States: ACM. doi:10.1145/3209108.3209125 Peer reviewed |
HORNE, R. J., MAUW, S., & Tiu, A. (2018). The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. In Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18). Peer reviewed |
Ahn, K. Y., HORNE, R. J., & Tiu, A. (2017). A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. In 28th International Conference on Concurrency Theory (CONCUR 2017). doi:10.4230/LIPIcs.CONCUR.2017.7 Peer reviewed |
HORNE, R. J., MAUW, S., & Tiu, A. (2017). Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae, 153 (1-2), 57-86. doi:10.3233/FI-2017-1531 Peer Reviewed verified by ORBi |
Ciobanu, G., HORNE, R. J., & Sassone, V. (2016). A descriptive type foundation for RDF Schema. Journal of Logical and Algebraic Methods in Programming, 85 (5), 681-706. doi:10.1016/j.jlamp.2016.02.006 Peer reviewed |
HORNE, R. J., Tiu, A., Aman, B., & Ciobanu, G. (2016). Private Names in Non-Commutative Logic. In 27th International Conference on Concurrency Theory (CONCUR 2016). doi:10.4230/LIPIcs.CONCUR.2016.31 Peer reviewed |
Tiu, A., Nguyen, N., & HORNE, R. J. (2016). SPEC: An Equivalence Checker for Security Protocols. In Programming Languages and Systems - 14th Asian Symposium, APLAS 2016, Hanoi, Vietnam, November 21-23, 2016, Proceedings. doi:10.1007/978-3-319-47958-3_5 Peer reviewed |
Ciobanu, G., HORNE, R. J., & Sassone, V. (2015). Minimal type inference for Linked Data consumers. Journal of Logical and Algebraic Methods in Programming, 84 (4), 485-504. doi:10.1016/j.jlamp.2014.12.005 Peer reviewed |
Ciobanu, G., & HORNE, R. J. (2015). Behavioural analysis of sessions using the calculus of structures. In In Perspectives of System Informatics, 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27. Springer. doi:10.1007/978-3-319-41579-6_8 Peer reviewed |
HORNE, R. J. (Ed.). (2015). Embracing Global Computing in Emerging Economies - First Workshop EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Springer. doi:10.1007/978-3-319-25043-4 |
HORNE, R. J. (2015). The consistency and complexity of multiplicative additive system virtual. Scientific Annals of Computer Science, 25 (2), 245-316. doi:10.7561/SACS.2015.2.245 Peer reviewed |
HORNE, R. J., & Sassone, V. (2014). A verified algebra for read-write Linked Data. Science of Computer Programming, 89, 2--22. doi:10.1016/j.scico.2013.07.005 Peer Reviewed verified by ORBi |
Ciobanu, G., & HORNE, R. J. (2013). Non-interleaving Operational Semantics for Geographically Replicated Databases. In 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, {SYNASC} 2013, Timisoara, Romania, September 23-26, 2013. doi:10.1109/SYNASC.2013.64 Peer reviewed |
Dezani-Ciancaglini, M., HORNE, R. J., & Sassone, V. (2012). Tracing where and who provenance in Linked Data: A calculus. Theoretical Computer Science, 464, 113--129. doi:10.1016/j.tcs.2012.06.020 Peer Reviewed verified by ORBi |
HORNE, R. J., Sassone, V., & Gibbins, N. (2011). Operational Semantics for SPARQL Update. In The Semantic Web - Joint International Semantic Technology Conference JIST 2011, Hangzhou, China, December 4-7, 2011. Proceedings. Springer. doi:10.1007/978-3-642-29923-0\_16 Peer reviewed |