Probabilistic model checking for the quantification of DoS security threats
暂无分享,去创建一个
[1] Bharat B. Madan,et al. Modeling and quantification of security attributes of software systems , 2002, Proceedings International Conference on Dependable Systems and Networks.
[2] Walter F. Tichy,et al. Proceedings 25th International Conference on Software Engineering , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[3] Marta Z. Kwiatkowska. Quantitative verification: models, techniques and tools , 2007, ESEC/SIGSOFT FSE.
[4] Jason Smith,et al. Modelling denial of service attacks on JFK with Meadows's cost-based framework , 2006, ACSW.
[5] Lars Grunske,et al. Specification patterns for probabilistic quality properties , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[6] Angelos D. Keromytis,et al. Efficient, DoS-resistant, secure key exchange for internet protocols , 2001, CCS '02.
[7] Marta Z. Kwiatkowska,et al. Stochastic Model Checking , 2007, SFM.
[8] Gul Agha,et al. Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories , 2005 .
[9] Angelos D. Keromytis,et al. Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols , 2001, Security Protocols Workshop.
[10] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[11] Catherine A. Meadows,et al. A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..
[12] William Allen Simpson,et al. Photuris: Session-Key Management Protocol , 1999, RFC.
[13] Catherine A. Meadows,et al. Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..
[14] Panagiotis Katsaros,et al. Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees , 2007, SAFECOMP.
[15] Felix C. Freiling,et al. Revisiting Liveness Properties in the Context of Secure Systems , 2002, FASec.
[16] Colin Boyd,et al. Using Coloured Petri Nets to Simulate DoS-resistant Protocols , 2006 .
[17] Pekka Nikander,et al. Stateless connections , 1997, ICICS.
[18] J. Kemeny,et al. Denumerable Markov chains , 1969 .
[19] Pekka Nikander,et al. Host Identity Protocol , 2005 .
[20] Pekka Nikander,et al. DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.
[21] Muhammad Torabi Dashti,et al. An intruder model for verifying liveness in security protocols , 2006, FMSE '06.
[22] Mahesh Viswanathan,et al. VESTA: A statistical model-checker and analyzer for probabilistic systems , 2005, Second International Conference on the Quantitative Evaluation of Systems (QEST'05).
[23] Bengt Jonsson,et al. A logic for reasoning about time and reliability , 1990, Formal Aspects of Computing.
[24] Mahesh Viswanathan,et al. On Statistical Model Checking of Stochastic Systems , 2005, CAV.