Sciweavers

529 search results - page 76 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
FORTE
2008
13 years 9 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
TDSC
2011
13 years 2 months ago
Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems
Abstract— We present on-line tunable diagnostic and membership protocols for generic time-triggered (TT) systems to detect crashes, send/receive omission faults and network parti...
Marco Serafini, Péter Bokor, Neeraj Suri, J...
AGENTS
2000
Springer
13 years 12 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
BELL
2000
107views more  BELL 2000»
13 years 7 months ago
Automating software feature verification
A significant part of the call processing software for Lucent's new PathStar access server [FSW98] was checked with automated formal verification techniques. The verification...
Gerard J. Holzmann, Margaret H. Smith