Sciweavers

170 search results - page 19 / 34
» ProMoSA - Probabilistic Models for Safety Analysis
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 7 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
HYBRID
2009
Springer
15 years 4 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
RTCSA
2007
IEEE
15 years 3 months ago
Modeling Real-time Garbage Collection Cost
Given the major advantages of productivity and safety, the use of garbage collection (GC) in real-time systems has gained increasing attention. Guaranteeing garbage collection act...
Wei Fu, Carl Hauser
ICSE
2007
IEEE-ACM
15 years 9 months ago
Behaviour Model Synthesis from Properties and Scenarios
Synthesis of behaviour models from software development artifacts such as scenario-based descriptions or requirements specifications not only helps significantly reduce the effort...
Greg Brunet, Marsha Chechik, Sebastián Uchi...
93
Voted
FMCAD
2004
Springer
15 years 3 months ago
Increasing the Robustness of Bounded Model Checking by Computing Lower Bounds on the Reachable States
Most symbolic model checkers are based on either Binary Decision Diagrams (BDDs), which may grow exponentially large, or Satisfiability (SAT) solvers, whose time requirements rapi...
Mohammad Awedh, Fabio Somenzi