Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1

[1]  Owre Sam,et al.  Abstract Datatypes in PVS , 1997 .

[2]  Ugo Montanari,et al.  On the semantics of place/transition Petri nets , 1997, Mathematical Structures in Computer Science.

[3]  Alfonso Valdes,et al.  Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .

[4]  John Rushby,et al.  Formal Methods and their Role in the Certification of Critical Systems , 1997 .

[5]  Xiaolei Qian,et al.  View-based access control with high assurance , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[6]  Xiaolei Qian,et al.  Correct Schema Transformations , 1996, EDBT.

[7]  Narciso Martí-Oliet,et al.  Rewriting Logic as a Logical and Semantic Framework , 1996 .

[8]  E. D. Jensen,et al.  Adaptive Fault-Resistant Systems , 1994 .

[9]  Li Gong,et al.  The complexity and composability of secure interoperation , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  John Rushby,et al.  Critical system properties: survey and taxonomy , 1994 .

[11]  José Meseguer,et al.  Speciication, Transformation, and Programming of Concurrent Systems in Rewriting Logic , 1994 .

[12]  P. Sreeranga Rajan Transformations in High-Level Synthesis: Formal Specification and Efficient Mechanical Verification , 1994 .

[13]  U. Dayal,et al.  Semantic Interoperation: A Query Mediation Approach , 1994 .

[14]  José Meseguer,et al.  A logical theory of concurrent objects and its realization in the Maude language , 1993 .

[15]  José Meseguer,et al.  Solving the Inheritance Anomaly in Concurrent Object-Oriented Programming , 1993, ECOOP.

[16]  Natarajan Shankar,et al.  Verification of Real-Time Systems Using PVS , 1993, CAV.

[17]  José Meseguer,et al.  A logical semantics for object-oriented databases , 1993, SIGMOD '93.

[18]  David Cyrluk,et al.  Microprocessor Verification in PVS - A Methodology and Simple Example , 1993 .

[19]  Patrick Lincoln,et al.  A formally verified algorithm for interactive consistency under a hybrid fault model , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.

[20]  José Meseguer,et al.  Order-Sorted Algebra I: Equational Deduction for Multiple Inheritance, Overloading, Exceptions and Partial Operations , 1992, Theor. Comput. Sci..

[21]  Joseph A. Goguen,et al.  Simulation and performance estimation for the Rewrite Rule Machine , 1992, [Proceedings 1992] The Fourth Symposium on the Frontiers of Massively Parallel Computation.

[22]  Natarajan Shankar Mechanical Verification of a Generalized Protocol for Byzantine Fault Tolerant Clock Synchronization , 1992, FTRTFT.

[23]  John M. Rushby,et al.  Formal Specification and Verification of a Fault-Masking and Transient-Recovery Model for Digital Flight-Control Systems , 1992, FTRTFT.

[24]  D. Hsieh A logic to unify semantic network knowledge systems with object-oriented database models , 1992, Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences.

[25]  T. Lunt A Real-Time Intrusion Detection Expert System (IDES)-Final Report , 1992 .

[26]  José Meseguer,et al.  From Petri Nets to Linear Logic through Categories: A Survey , 1991, Int. J. Found. Comput. Sci..

[27]  José Meseguer,et al.  An algebraic axiomatization of linear logic models , 1991 .

[28]  Joseph A. Goguen,et al.  A categorical manifesto , 1989, Mathematical Structures in Computer Science.

[29]  José Meseguer,et al.  Architectural Design of the Rewrite Rule Machine Ensemble , 1991 .

[30]  John Rushby,et al.  An Introduction to Formal Specification and Verification using EHDM , 1991 .

[31]  Natarajan Shankar,et al.  Decision problems for propositional linear logic , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[32]  José Meseguer,et al.  Petri Nets Are Monoids , 1990, Inf. Comput..

[33]  José Meseguer,et al.  Compiling Concurrent Rewriting onto the Rewrite Rule Machine , 1990, CTRS.

[34]  J. Goguen Higher-order functions considered unnecessary for higher-order programming , 1990 .

[35]  Joseph A. Goguen,et al.  Semantic Specifications for the Rewrite Rule Machine , 1991, Concurrency: Theory, Language, And Architecture.

[36]  Mark Moriconi,et al.  A practical approach to semantic configuration management , 1989, TAV3.

[37]  Narciso Martí-Oliet,et al.  From Petri nets to linear logic , 1989, Mathematical Structures in Computer Science.

[38]  Joseph A. Goguen,et al.  The Rewrite Rule Machine Project , 1989 .

[39]  Joseph A. Goguen,et al.  OBJ as a Theorem Prover with Applications to Hardware Verification , 1989 .

[40]  R. Jagannathan,et al.  Dataflow-based Methodology for Coarse-Grain Multiprocessing on a Network of Workstations , 1989, ICPP.

[41]  Joseph A. Goguen,et al.  What Is Unification?: A Categorical View of Substitution, Equation and Solution , 1989 .

[42]  John Rushby,et al.  Formal Verification of the Interactive Convergence Clock Synchronization Algorithm using EHDM , 1989 .

[43]  Rangaswamy Jagannathan A descriptive and prescriptive model for dataflow semantics , 1988 .

[44]  José Meseguer,et al.  Software for the Rewrite Rule Machine , 1988, Fifth Generation Computer Systems.

[45]  John Rushby,et al.  Quality Measures and Assurance for AI Software1 , 1988 .

[46]  J. Meseguer,et al.  Order-Sorted Algebra Solves the Constructor-Selector, Multiple Representation, and Coercion Problems , 1993, Inf. Comput..

[47]  José Meseguer,et al.  Final Algebras, Cosemicomputable Algebras, and Degrees of Unsolvability , 1987, Category Theory and Computer Science.

[48]  José Meseguer,et al.  Unifying Functional, Object-Oriented and Relational Programming with Logical Semantics , 1987, Research Directions in Object-Oriented Programming.

[49]  Thomas A. Berson,et al.  Multilevel Security for Knowledge-Based Systems , 1987, 1987 IEEE Symposium on Security and Privacy.

[50]  José Meseguer,et al.  Concurrent term rewriting as a model of computation , 1986, Graph Reduction.

[51]  Speci cation , Transformation , and Programmingof Concurrent Systems in Rewriting , .