![]() ![]() | HORNE, R. J., MAUW, S., MIZERA, A., Stemper, A., & THOEMEL, J. (2023). Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat. Journal of Aerospace Information Systems, 1-14. doi:10.2514/1.i011232 ![]() |
![]() ![]() | HORNE, R. J., MAUW, S., MIZERA, A., STEMPER, A., & THOEMEL, J. (2022). Autonomous Trustworthy Monitoring and Diagnosis of CubeSat Health (AtMonSat). European Space Agency. |
![]() ![]() | HORNE, R. J., MAUW, S., & YURKOV, S. (10 August 2022). Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments [Paper presentation]. 35th IEEE Computer Security Foundations Symposium (CSF), Haifa, Israel. |
![]() ![]() | ACCLAVIO, M., HORNE, R. J., MAUW, S., & Straßburger, L. (2022). A Graphical Proof Theory of Logical Time. In A. P. Felty (Ed.), Proc. 7th International Conference on Formal Structures for Computation and Deduction (FSCD 2022) (pp. 22:1-22:25). Germany: Schloss Dagstuhl -- Leibniz-Zentrum fur Informatik. doi:10.4230/LIPIcs.FSCD.2022.22 ![]() |
![]() ![]() | GIL PONS, R., HORNE, R. J., MAUW, S., Trujillo-Rasua, R., & Tiu, A. (2022). Is Eve nearby? Analysing protocols under the distant-attacker assumption. In IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel. ![]() |
![]() ![]() | Hasan, C., HORNE, R. J., MAUW, S., & MIZERA, A. (2022). Cloud removal from satellite imagery using multispectral edge-filtered conditional generative adversarial networks. International Journal of Remote Sensing, 43 (5), 1881-1893. doi:10.1080/01431161.2022.2048915 ![]() |
![]() ![]() | HORNE, R. J., & MAUW, S. (2021). Discovering ePassport Vulnerabilities using Bisimilarity. Logical Methods in Computer Science, 17 (2), 24:1--24:52. doi:10.23638/LMCS-17(2:24)2021 ![]() |
![]() ![]() | Ahn, K. Y., HORNE, R. J., & Tiu, A. (2021). A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. Logical Methods in Computer Science, 17 (3), 2:1–2:40. doi:10.46298/lmcs-17(3:2)2021 ![]() |
![]() ![]() | van Glabeek, R. J., Höfner, P., & HORNE, R. J. (2021). Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom. In 36th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS '21) (pp. 1-16). IEEE. doi:10.1109/LICS52264.2021.9470531 ![]() |
![]() ![]() | HORNE, R. J., MAUW, S., YURKOV, S., Cerone, A., & Ölveczky, P. C. (2021). Compositional Analysis of Protocol Equivalence in the Applied pi-Calculus Using Quasi-open Bisimilarity. In Theoretical Aspects of Computing -- ICTAC 2021 (pp. 235--255). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-85315-0_14 ![]() |
![]() ![]() | HORNE, R. J. (2020). Session Subtyping and Multiparty Compatibility Using Circular Sequents. In In 31st International Conference on Concurrency Theory (CONCUR 2020) (pp. 12:1–12:22). ![]() |
![]() ![]() | GABBAY, D. M., HORNE, R. J., MAUW, S., & VAN DER TORRE, L. (2020). Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. In Graphical Models for Security - 7th International Workshop. doi:10.1007/978-3-030-62230-5_8 ![]() |
![]() ![]() | HORNE, R. J., ACCLAVIO, M., & Straßburger, L. (2020). Logic Beyond Formulas: A Graphical Proof System. In LICS '20: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science (pp. 38-52). doi:10.1145/3373718.3394763 ![]() |
![]() ![]() | HORNE, R. J., MAUW, S., SMITH, Z. D., & Filimonov, I. (Other coll.). (2019). Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity. In Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (pp. 18). doi:10.1007/978-3-030-29959-0_28 ![]() |
![]() ![]() | Albanese, M., HORNE, R. J., & Probst, C. W. (2019). Graphical Models for Security - 6th International Workshop, Revised Papers [Paper presentation]. GraMSec@CSF 2019, Hoboken, NJ, USA. doi:10.1007/978-3-030-36537-0 |
![]() ![]() | HORNE, R. J. (2019). The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic. In 4th International Conference on Formal Structures for Computation and Deduction (FSCD 2019) (pp. 23:1–23:16). LIPIcs. doi:10.4230/LIPIcs.FSCD.2019.23 ![]() |
![]() ![]() | HORNE, R. J., & Tiu, A. (2019). Constructing weak simulations from linear implications for processes with private names. Mathematical Structures in Computer Science. doi:10.1017/S0960129518000452 ![]() |
![]() ![]() | HORNE, R. J., Tiu, A., Aman, B., & Ciobanu, G. (2019). De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic. ACM Transactions on Computational Logic, 20 (4), 22:1--22:44. doi:10.1145/3325821 ![]() |
![]() ![]() | Castellani, I., Dezani-Ciancaglini, M., Giannini, P., & HORNE, R. J. (2019). Global Types with Internal Delegation. Theoretical Computer Science. doi:10.1016/j.tcs.2019.09.027 ![]() |
![]() ![]() | HORNE, R. J., Ahn, K. Y., Lin, S.-W., & Tiu, A. (2018). Quasi-Open Bisimilarity with Mismatch is Intuitionistic. In Proceedings of LICS '18: 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS '18) (pp. 26-35). New York, United States: ACM. doi:10.1145/3209108.3209125 ![]() |
![]() ![]() | HORNE, R. J., MAUW, S., & Tiu, A. (2018). The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. In Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18). ![]() |
![]() ![]() | Ahn, K. Y., HORNE, R. J., & Tiu, A. (2017). A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. In 28th International Conference on Concurrency Theory (CONCUR 2017). doi:10.4230/LIPIcs.CONCUR.2017.7 ![]() |
![]() ![]() | HORNE, R. J., MAUW, S., & Tiu, A. (2017). Semantics for specialising attack trees based on linear logic. Fundamenta Informaticae, 153 (1-2), 57-86. doi:10.3233/FI-2017-1531 ![]() |
![]() ![]() | HORNE, R. J., Tiu, A., Aman, B., & Ciobanu, G. (2016). Private Names in Non-Commutative Logic. In 27th International Conference on Concurrency Theory (CONCUR 2016). doi:10.4230/LIPIcs.CONCUR.2016.31 ![]() |
![]() ![]() | Ciobanu, G., HORNE, R. J., & Sassone, V. (2016). A descriptive type foundation for RDF Schema. Journal of Logical and Algebraic Methods in Programming, 85 (5), 681-706. doi:10.1016/j.jlamp.2016.02.006 ![]() |
![]() ![]() | Tiu, A., Nguyen, N., & HORNE, R. J. (2016). SPEC: An Equivalence Checker for Security Protocols. In Programming Languages and Systems - 14th Asian Symposium, APLAS 2016, Hanoi, Vietnam, November 21-23, 2016, Proceedings. doi:10.1007/978-3-319-47958-3_5 ![]() |
![]() ![]() | HORNE, R. J. (Ed.). (2015). Embracing Global Computing in Emerging Economies - First Workshop EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Springer. doi:10.1007/978-3-319-25043-4 |
![]() ![]() | Ciobanu, G., HORNE, R. J., & Sassone, V. (2015). Minimal type inference for Linked Data consumers. Journal of Logical and Algebraic Methods in Programming, 84 (4), 485-504. doi:10.1016/j.jlamp.2014.12.005 ![]() |
![]() ![]() | Ciobanu, G., & HORNE, R. J. (2015). Behavioural analysis of sessions using the calculus of structures. In In Perspectives of System Informatics, 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27. Springer. doi:10.1007/978-3-319-41579-6_8 ![]() |
![]() ![]() | HORNE, R. J. (2015). The consistency and complexity of multiplicative additive system virtual. Scientific Annals of Computer Science, 25 (2), 245-316. doi:10.7561/SACS.2015.2.245 ![]() |
![]() ![]() | HORNE, R. J., & Sassone, V. (2014). A verified algebra for read-write Linked Data. Science of Computer Programming, 89, 2--22. doi:10.1016/j.scico.2013.07.005 ![]() |
![]() ![]() | Ciobanu, G., & HORNE, R. J. (2013). Non-interleaving Operational Semantics for Geographically Replicated Databases. In 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, {SYNASC} 2013, Timisoara, Romania, September 23-26, 2013. doi:10.1109/SYNASC.2013.64 ![]() |
![]() ![]() | Dezani-Ciancaglini, M., HORNE, R. J., & Sassone, V. (2012). Tracing where and who provenance in Linked Data: A calculus. Theoretical Computer Science, 464, 113--129. doi:10.1016/j.tcs.2012.06.020 ![]() |
![]() ![]() | HORNE, R. J., Sassone, V., & Gibbins, N. (2011). Operational Semantics for SPARQL Update. In The Semantic Web - Joint International Semantic Technology Conference JIST 2011, Hangzhou, China, December 4-7, 2011. Proceedings. Springer. doi:10.1007/978-3-642-29923-0\_16 ![]() |