Sciweavers

293 search results - page 3 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
DAC
1994
ACM
13 years 9 months ago
Probabilistic Analysis of Large Finite State Machines
Regarding nite state machines as Markov chains facilitates the application of probabilistic methods to very large logic synthesis and formal veri cation problems. Recently, we ha...
Gary D. Hachtel, Enrico Macii, Abelardo Pardo, Fab...
DSN
2006
IEEE
14 years 9 days ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
DSN
2003
IEEE
13 years 11 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
AAMAS
2012
Springer
12 years 2 months ago
A formal model of emotions for an empathic rational dialog agent
Recent research has shown that virtual agents expressing empathic emotions toward users have the potentiality to enhance human-machine interaction. To provide empathic capabilitie...
Magalie Ochs, David Sadek, Catherine Pelachaud
INFOCOM
2006
IEEE
14 years 8 days ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee