Sciweavers

733 search results - page 39 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
ICCS
2007
Springer
15 years 5 months ago
Towards a Formal Foundation for Aggregating Scientific Workflows
In e-Science, scientific workflow systems are used to share data and knowledge in collaborative experiments. In recent work we discussed the concepts of a workflow bus [1], allowin...
Frank Terpstra, Zhiming Zhao, Wico Mulder, Pieter ...
ENTCS
2007
143views more  ENTCS 2007»
15 years 1 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
ICSM
1996
IEEE
15 years 6 months ago
Using Informal and Formal Techniques for the Reverse Engineering of C Programs
Reverse engineering of program code is the process of constructing a higher level abstraction of an implementation in order to facilitate the understanding of a system that may be...
Gerald C. Gannod, Betty H. C. Cheng
CCS
2007
ACM
15 years 8 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
TARK
1992
Springer
15 years 6 months ago
Topological Reasoning and The Logic of Knowledge
We present a bimodal logic suitable for formalizing reasoning about points and sets, and also states of the world and views about them. The most natural interpretation of the logi...
Lawrence S. Moss, Rohit Parikh