Sciweavers

529 search results - page 34 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
COMCOM
2008
135views more  COMCOM 2008»
13 years 7 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
JNW
2008
118views more  JNW 2008»
13 years 6 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
CSFW
2002
IEEE
14 years 21 days ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
SPIN
1999
Springer
14 years 1 min ago
Model Checking Operator Procedures
Operator procedures are documents telling operators what to do in various situations. They are widely used in process industries including the nuclear power industry. The correctne...
Wenhui Zhang
ISCIS
2004
Springer
14 years 1 months ago
Software Testing via Model Checking
Testing is a necessary, but costly process for user-centric quality control. Moreover, testing is not comprehensive enough to completely detect faults. Many formal methods have bee...
Fevzi Belli, Baris Güldali