메뉴 건너뛰기




Volumn 5311 LNCS, Issue , 2008, Pages 246-251

NetQi: A model checker for anticipation game

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 56749155747     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88387-6_22     Document Type: Conference Paper
Times cited : (5)

References (8)
  • 1
    • 38149041613 scopus 로고    scopus 로고
    • Behrmann, G., Cougnard, A., David, A., Fleury, E., Larsen, K.G., Lime, D.: Uppaal-tiga: Time for playing games! In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, 4590, pp. 121-125. Springer, Heidelberg (2007)
    • Behrmann, G., Cougnard, A., David, A., Fleury, E., Larsen, K.G., Lime, D.: Uppaal-tiga: Time for playing games! In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 121-125. Springer, Heidelberg (2007)
  • 3
    • 56749136152 scopus 로고    scopus 로고
    • Network administrator and intruder strategies
    • Technical Report LSV-08-02, LSV, ENS Cachan January
    • Bursztein, E.: Network administrator and intruder strategies. Technical Report LSV-08-02, LSV, ENS Cachan (January 2008)
    • (2008)
    • Bursztein, E.1
  • 4
    • 38349000956 scopus 로고    scopus 로고
    • Bursztein, E., Goubault-Larrecq, J.: A logical framework for evaluating network resilience against faults and attacks. In: 12th annual Asian Computing Science Conference (ASIAN), December 2007, pp. 212-227. Springer, Heidelberg (2007)
    • Bursztein, E., Goubault-Larrecq, J.: A logical framework for evaluating network resilience against faults and attacks. In: 12th annual Asian Computing Science Conference (ASIAN), December 2007, pp. 212-227. Springer, Heidelberg (2007)
  • 5
    • 35248841407 scopus 로고    scopus 로고
    • The element of surprise in timed games
    • Amadio, R, Lugiez, D, eds, CONCUR 2003, Springer, Heidelberg
    • de Alfaro, L., Faella, M., Henzinger, T., Majumdar, R., Stoelinga, M.: The element of surprise in timed games. In: Amadio, R., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol. 2761, pp. 144-158. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2761 , pp. 144-158
    • de Alfaro, L.1    Faella, M.2    Henzinger, T.3    Majumdar, R.4    Stoelinga, M.5
  • 6
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • Ramakrishan, C., Sekar, R.: Model-based analysis of configuration vulnerabilities. Journal of Computer Security 1, 198-209 (2002)
    • (2002) Journal of Computer Security , vol.1 , pp. 198-209
    • Ramakrishan, C.1    Sekar, R.2
  • 7
    • 0033718255 scopus 로고    scopus 로고
    • Using model checking to analyze network vulnerabilities
    • Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
    • Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 156-165. IEEE Computer Society Press, Los Alamitos (2000)
    • (2000) SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy , pp. 156-165
    • Ritchey, R.W.1    Ammann, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.