A State-of-the-Art Survey on Formal Verification of the Internet of Things Applications
暂无分享,去创建一个
[1] Nadeem Javaid,et al. Fog Computing Over IoT: A Secure Deployment and Formal Verification , 2017, IEEE Access.
[2] Mansoor Ahmed,et al. Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks , 2017, Future Gener. Comput. Syst..
[3] Nima Jafari Navimipour,et al. Formal verification approaches in the web service composition: A comprehensive analysis of the current challenges for future research , 2018, Int. J. Commun. Syst..
[4] Amir Masoud Rahmani,et al. Service composition approaches in IoT: A systematic review , 2018, J. Netw. Comput. Appl..
[5] Alireza Souri,et al. Software as a service based CRM providers in the cloud computing: Challenges and technical issues , 2017, J. Serv. Sci. Res..
[6] Valeriy Vyatkin,et al. Towards formal verification for cyber-physically agnostic software: A case study , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.
[7] Woo-Sik Bae. Verifying a secure authentication protocol for IoT medical devices , 2017, Cluster Computing.
[8] David Broman,et al. A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[9] Meenakshi D'Souza,et al. A Framework for Modeling and Verifying IoT Communication Protocols , 2017, SETTA.
[10] Benjamin Aziz,et al. A formal model and analysis of an IoT protocol , 2016, Ad Hoc Networks.
[11] Amir Masoud Rahmani,et al. Internet of Things applications: A systematic review , 2019, Comput. Networks.
[12] Junliang Chen,et al. Constructing scalable Internet of Things services based on their event‐driven models , 2015, Concurr. Comput. Pract. Exp..
[13] Shabir Ahmad,et al. Towards the Design of a Formal Verification and Evaluation Tool of Real-Time Tasks Scheduling of IoT Applications , 2019, Sustainability.
[14] Amir Masoud Rahmani,et al. A moth‐flame optimization algorithm for web service composition in cloud computing: Simulation and verification , 2018, Softw. Pract. Exp..
[15] Sofiène Tahar,et al. Formal Probabilistic Analysis of a WSN-Based Monitoring Framework for IoT Applications , 2016, FTSCS.
[16] Divya Saxena,et al. Design and Verification of an NDN-Based Safety-Critical Application: A Case Study With Smart Healthcare , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[17] Nima Jafari Navimipour,et al. Formal modeling and verification of a service composition approach in the social customer relationship management system , 2019, Inf. Technol. People.
[18] Yuichi Nishiwaki,et al. F-Calculus: A Universal Programming Language of Self-Stabilizing Computational Fields , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[19] Ruggero Lanotte,et al. A Semantic Theory for the Internet of Things , 2015, Inf. Comput..
[20] Samir Tata,et al. Formal Model and Method to Decompose Process-Aware IoT Applications , 2017, OTM Conferences.
[21] Kun-Hee Han,et al. Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices , 2016, Cluster Computing.
[22] Robertas Damasevicius,et al. Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness , 2016, Secur. Commun. Networks.
[23] Hyun Jung La,et al. A conceptual framework for trajectory-based medical analytics with IoT contexts , 2016, J. Comput. Syst. Sci..
[24] Yu Li,et al. Frequency-domain channel equalisation for LTE-based uplink narrowband Internet of Things systems , 2019, IET Commun..
[25] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[26] Sheetal Kalra,et al. A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..
[27] Mario Cagalj,et al. LISA: Visible light based initialization and SMS based authentication of constrained IoT devices , 2019, Future Gener. Comput. Syst..
[28] Nima Jafari Navimipour,et al. A symbolic model checking approach in formal verification of distributed systems , 2019, Human-centric Computing and Information Sciences.
[29] Nima Jafari Navimipour,et al. A model checking approach for user relationship management in the social network , 2019, Kybernetes.
[30] Sheetal Kalra,et al. Secure multi‐factor remote user authentication scheme for Internet of Things environments , 2017, Int. J. Commun. Syst..
[31] Zahid Anwar,et al. IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things , 2017, IEEE Access.
[32] Igor V. Kotenko,et al. Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge , 2016, Journal of Ambient Intelligence and Humanized Computing.
[33] Tongquan Wei,et al. Quantitative Analysis of Variation-Aware Internet of Things Designs Using Statistical Model Checking , 2016, 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS).
[34] Merve Astekin,et al. Provenance aware run‐time verification of things for self‐healing Internet of Things applications , 2019, Concurr. Comput. Pract. Exp..
[35] Florian Kammüller,et al. Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems , 2017, HCI.
[36] Zhigang Chen,et al. Workload scheduling toward worst-case delay and optimal utility for single-hop Fog-IoT architecture , 2018, IET Commun..
[37] Nikolai Kosmatov,et al. Formal Verification of a Memory Allocation Module of Contiki with Frama-C: A Case Study , 2016, CRiSIS.
[38] Florian Kammüller,et al. Human Centric Security and Privacy for the IoT Using Formal Techniques , 2017, AHFE.