Sciweavers

100
Voted
CSFW
2004
IEEE
15 years 7 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
113
Voted
CSFW
2004
IEEE
15 years 7 months ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson
CSFW
2004
IEEE
15 years 7 months ago
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
Frédéric Cuppens, Sylvain Gombault, ...
76
Voted
BIRTHDAY
2006
Springer
15 years 7 months ago
A Functorial Framework for Constraint Normal Logic Programming
Paqui Lucio, Fernando Orejas, Edelmira Pasarella, ...
153
Voted
CSFW
2004
IEEE
15 years 7 months ago
Formal Analysis of Multi-Party Contract Signing
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, MOCHA, which allows specification of pr...
Rohit Chadha, Steve Kremer, Andre Scedrov