Sciweavers

111 search results - page 5 / 23
» Proactive Detection of Computer Worms Using Model Checking
Sort
View
SPIN
2009
Springer
14 years 3 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
IEEESCC
2006
IEEE
14 years 2 months ago
Multiagent Policy Architecture for Virtual Business Organizations
A virtual organization (VO) is a dynamic collection of entities (individuals, enterprises, and information resources) collaborating on some computational activity. VOs are an emer...
Yathiraj B. Udupi, Munindar P. Singh
SPIN
2000
Springer
14 years 8 days ago
Using Runtime Analysis to Guide Model Checking of Java Programs
This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java pr...
Klaus Havelund
SPIN
2012
Springer
11 years 11 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
TCS
2010
13 years 7 months ago
Detecting synchronisation of biological oscillators by model checking
We define a subclass of timed automata, called oscillator timed automata, suitable to model biological oscillators. Coupled biological oscillators may synchronise, as emerging be...
Ezio Bartocci, Flavio Corradini, Emanuela Merelli,...