Sciweavers

3451 search results - page 467 / 691
» Collaborative attack modeling
Sort
View
ICRA
2003
IEEE
111views Robotics» more  ICRA 2003»
15 years 7 months ago
Fuzzy Petri nets for monitoring and recovery
- In this paper, we propose a unitary tool for modeling and analysis of discrete event systems monitoring. Uncertain knowledge of such tasks asks specific reasoning and adapted fuz...
Daniel I. Racoceanu, Eugenia Minca, Noureddine Zer...
ICECCS
1999
IEEE
88views Hardware» more  ICECCS 1999»
15 years 6 months ago
UML + ROOM as a Standard ADL?
Designing a software system's architecture properly is one of the most important tasks of any software engineering project. Nevertheless there exists no common definition of ...
Bernhard Rumpe, M. Schoenmakers, Ansgar Radermache...
133
Voted
ICC
2007
IEEE
15 years 8 months ago
A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks
Abstract— Securing broadcast communication over sensor networks is an important research challenge. In general, broadcast communication has two important metrics: security and re...
Avinash Srinivasan, Jie Wu
CSFW
2006
IEEE
15 years 8 months ago
Cryptographically Sound Theorem Proving
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003) in the theorem prover Isabelle/HOL. This model is cryptographically sound in ...
Christoph Sprenger, Michael Backes, David A. Basin...
PADS
2005
ACM
15 years 8 months ago
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises
The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of...
Michael Liljenstam, Jason Liu, David M. Nicol, You...