Sciweavers

529 search results - page 28 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
MEMOCODE
2003
IEEE
14 years 1 months ago
LOTOS Code Generation for Model Checking of STBus Based SoC: the STBus interconnect
In the design process of SoC (System on Chip), validation is one of the most critical and costly activity. The main problem for industrial companies like STMicroelectronics, stand...
Pierre Wodey, Geoffrey Camarroque, Fabrice Baray, ...
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 2 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
CORR
2011
Springer
142views Education» more  CORR 2011»
12 years 11 months ago
Taming Numbers and Durations in the Model Checking Integrated Planning System
The Model Checking Integrated Planning System (MIPS) has shown distinguished performance in the second and third international planning competitions. With its object-oriented fram...
Stefan Edelkamp
AICCSA
2006
IEEE
117views Hardware» more  AICCSA 2006»
13 years 11 months ago
Adaptive Search in a Semi-Structured Peer-to-Peer System
s: Software Foundations Modeling Redundancy: Quantitative and Qualitative Models .......................................................43 Ali Mili............New Jersey Institute ...
Christof Squarr, Jens Bruhn, Guido Wirtz
RAID
2007
Springer
14 years 1 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...