| Dynamic plan management in the context of a recognized air picture | Aaron Hunter |
| Modelling cryptographic protocols in a theory of action | Aaron Hunter |
| Belief modeling for maritime surveillance | Aaron Hunter |
| On the representation and verification of cryptographic protocols in a theory of action | Aaron Hunter |
| Arbitrary announcements in propositional belief revision | Aaron Hunter |
| Trust-sensitive belief revision | Aaron Hunter |
| Belief change with uncertain action histories | Aaron Hunter |
| Ordinal conditional functions for nearly counterfactual revision | Aaron Hunter |
| Spectrum hierarchies and subdiagonal functions | Aaron Hunter |
| Adding modal operators to the action language A | Aaron Hunter |
| Limiting cases for spectrum closure results | Aaron Hunter |
| Using ranking functions to determine plausible action histories | Aaron Hunter |
| Iterated belief change | Aaron Hunter |
| Belief change in the context of fallible actions and observations | Aaron Hunter |
| An action description language for iterated belief change | Aaron Hunter |
| An explicit model of belief change for cryptographic protocol verification | Aaron Hunter |
| Belief change and cryptographic protocol verification | Aaron Hunter |
| Iterated belief change due to actions and observations | Aaron Hunter |
| Structured documents | Aaron Hunter |
| Belief revision on modal accessibility relations | Aaron Hunter |
| Ranking functions for belief change | Aaron Hunter |
| Belief revision and trust | Aaron Hunter |
| Belief manipulation and message meaning for protocol analysis | Aaron Hunter |
| Exploring power storage profiles for vehicle to grid systems | Aaron Hunter |
| On keeping secrets | Aaron Hunter |
| Exploiting known vulnerabilities of a smart thermostat | Aaron Hunter |
| Mobile forensics for cloud data | Aaron Hunter |
| A logical approach to promoting trust over knowledge to trust over action | Aaron Hunter |
| Belief manipulation through propositional announcements | Aaron Hunter |
| Security and trust for surveillance cameras | Aaron Hunter |
| Trust as a precursor to belief revision | Aaron Hunter |
| Bluetooth for decoy systems | Aaron Hunter |