Sciweavers

529 search results - page 24 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
LPNMR
2001
Springer
14 years 6 days ago
Bounded LTL Model Checking with Stable Models
In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. As the model of asynchronous syst...
Keijo Heljanko, Ilkka Niemelä
CORR
2011
Springer
182views Education» more  CORR 2011»
13 years 2 months ago
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
— Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and adv...
Fabio Pasqualetti, Florian Dörfler, Francesco...
ETRICS
2006
13 years 11 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
DIMVA
2010
13 years 5 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
SPIN
2004
Springer
14 years 1 months ago
Directed Error Detection in C++ with the Assembly-Level Model Checker StEAM
Most approaches for model checking software are based on ration of abstract models from source code, which may greatly reduce the search space, but may also introduce errors that a...
Peter Leven, Tilman Mehler, Stefan Edelkamp