-
1
-
-
0042908709
-
Alternating-time temporal logic
-
Alur, R., Henzinger, T.A., Kupferman, O.: Alternating-time temporal logic. J. ACM 49(5), 672-713(2002)
-
(2002)
J. ACM
, vol.49
, Issue.5
, pp. 672-713
-
-
Alur, R.1
Henzinger, T.A.2
Kupferman, O.3
-
2
-
-
35148826283
-
-
PhD thesis, Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science
-
Artz, M.: NetSPA: a Network Security Planning Architecture. PhD thesis, Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science (2002)
-
(2002)
NetSPA: A Network Security Planning Architecture
-
-
Artz, M.1
-
3
-
-
2142758072
-
Technological networks and the spread of computer viruses
-
Balthrop, J., Forrest, S., Newman, M.E.J., Williamson, M.M.: Technological networks and the spread of computer viruses, science 304(23) (2004)
-
(2004)
science
, vol.304
, Issue.23
-
-
Balthrop, J.1
Forrest, S.2
Newman, M.E.J.3
Williamson, M.M.4
-
4
-
-
38349032149
-
Minimum-time reachability in timed games
-
Asarin, E, Bouyer, P, eds, FORMATS 2006, Springer, Heidelberg
-
Brihaye, T., Henzinger, TA., Raskin, J., Prabhu, V.: Minimum-time reachability in timed games. In: Asarin, E., Bouyer, P. (eds.) FORMATS 2006. LNCS, vol. 4202, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4202
-
-
Brihaye, T.1
Henzinger, T.A.2
Raskin, J.3
Prabhu, V.4
-
5
-
-
38349067293
-
-
Church, A.: logic, arithmetics and automata. In: Congress of Mathematician, Institut MittagLeffler, pp. 23-35(1962)
-
Church, A.: logic, arithmetics and automata. In: Congress of Mathematician, Institut MittagLeffler, pp. 23-35(1962)
-
-
-
-
6
-
-
33750742459
-
The modeling of global epidemics: Stochastic dynamics and predictability
-
Colizza, V., Barrat, A., Barthelemy, M., Vespignani, A.: The modeling of global epidemics: stochastic dynamics and predictability. Bulletin of Mathematical Biology 68, 1893-1921 (2006)
-
(2006)
Bulletin of Mathematical Biology
, vol.68
, pp. 1893-1921
-
-
Colizza, V.1
Barrat, A.2
Barthelemy, M.3
Vespignani, A.4
-
7
-
-
35248841407
-
The element of surprise in timed games
-
Amadio, R.M, Lugiez, D, eds, CONCUR 2003, Springer, Heidelberg
-
de Alfaro, L., Faella, M., Henzinger, T., Majumdar, R., Stoelinga, M.: The element of surprise in timed games. In: Amadio, R.M., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol. 2761, Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2761
-
-
de Alfaro, L.1
Faella, M.2
Henzinger, T.3
Majumdar, R.4
Stoelinga, M.5
-
8
-
-
38349004156
-
-
du net, J.: Bouygues telecom privé de réseau (2004)
-
du net, J.: Bouygues telecom privé de réseau (2004)
-
-
-
-
9
-
-
33750294415
-
Timed alternating-time temporal logic
-
Asarin, E, Bouyer, P, eds, FORMATS 2006, Springer, Heidelberg
-
Henzinger, T., Prabhu, V.: Timed alternating-time temporal logic. In: Asarin, E., Bouyer, P. (eds.) FORMATS 2006. LNCS, vol. 4202, pp. 1-18. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4202
, pp. 1-18
-
-
Henzinger, T.1
Prabhu, V.2
-
10
-
-
38349028184
-
-
ICANN. Dns attack factsheet. Technical report, ICANN (March 2007)
-
ICANN. Dns attack factsheet. Technical report, ICANN (March 2007)
-
-
-
-
11
-
-
34748883109
-
Topological analysis of network attack vulnerability
-
Singapore, p, ACM Press, New York
-
Jajodia, S.: Topological analysis of network attack vulnerability. In: ASIACCS 2007. Proceedings of the 2nd ACM symposium on Information, computer and communications security, Singapore, p. 2. ACM Press, New York (2007)
-
(2007)
ASIACCS 2007. Proceedings of the 2nd ACM symposium on Information, computer and communications security
, pp. 2
-
-
Jajodia, S.1
-
12
-
-
84948760464
-
Two formal analysis of attack graphs
-
Washington, DC, USA, p, IEEE Computer Society Press, Los Alamitos
-
Jha, S., Sheyner, O., Wing, J.: Two formal analysis of attack graphs. In: CSFW 2002. Proceedings of the 15th IEEE Computer Security Foundations Workshop, Washington, DC, USA, p. 49. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
CSFW 2002. Proceedings of the 15th IEEE Computer Security Foundations Workshop
, pp. 49
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
13
-
-
0003663927
-
Rfc 2821 - simple mail transfer protocol
-
Technical report, IETF Network Working Group
-
Klensin, J.: Rfc 2821 - simple mail transfer protocol. Technical report, IETF Network Working Group (2001)
-
(2001)
-
-
Klensin, J.1
-
14
-
-
84958970105
-
-
Lippmann, R., Webster, S., Stetson, D.: The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, 2516, Springer, Heidelberg (2002)
-
Lippmann, R., Webster, S., Stetson, D.: The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, Springer, Heidelberg (2002)
-
-
-
-
15
-
-
84947771104
-
-
Maler, O., Pnueli, A., Sifakis, J.: On the synthesis of discrete controllers for timed systems (extended abstract). In: STACS 1995, pp. 229-242 (1995)
-
Maler, O., Pnueli, A., Sifakis, J.: On the synthesis of discrete controllers for timed systems (extended abstract). In: STACS 1995, pp. 229-242 (1995)
-
-
-
-
16
-
-
0024864157
-
On the synthesis of a reactive module
-
Austin, Texas, United States, pp, ACM Press, New York
-
Pnueli, A., Rosner, R.: On the synthesis of a reactive module. In: POPL 1989. Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, Austin, Texas, United States, pp. 179-190. ACM Press, New York (1989)
-
(1989)
POPL 1989. Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 179-190
-
-
Pnueli, A.1
Rosner, R.2
-
17
-
-
0033718255
-
Using model checking to analyze network vulnerabilities
-
Washington, DC, USA, p, IEEE Computer Society Press, Los Alamitos
-
Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: SP 2000. Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 156. IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
SP 2000. Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 156
-
-
Ritchey, R.W.1
Ammann, P.2
-
18
-
-
33745494860
-
The ecology of the grid
-
Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Saffre, F., Halloy, J., Deneubourg, J.L.: The ecology of the grid. In: ICAC 2005. Proceedings of the Second International Conference on Automatic Computing, Washington, DC, USA, pp. 378-379. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
ICAC 2005. Proceedings of the Second International Conference on Automatic Computing
, pp. 378-379
-
-
Saffre, F.1
Halloy, J.2
Deneubourg, J.L.3
-
19
-
-
38349055939
-
-
Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb?s journal (December 1999)
-
Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb?s journal (December 1999)
-
-
-
-
21
-
-
84948951525
-
-
Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code, acsac 00: 61 (2002)
-
Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code, acsac 00: 61 (2002)
-
-
-
|