Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1
暂无分享,去创建一个
H. Javitz | A. Valdes | Debra Anderson | T. Lunt | A. Tamaru
[1] Owre Sam,et al. Abstract Datatypes in PVS , 1997 .
[2] Ugo Montanari,et al. On the semantics of place/transition Petri nets , 1997, Mathematical Structures in Computer Science.
[3] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[4] John Rushby,et al. Formal Methods and their Role in the Certification of Critical Systems , 1997 .
[5] Xiaolei Qian,et al. View-based access control with high assurance , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[6] Xiaolei Qian,et al. Correct Schema Transformations , 1996, EDBT.
[7] Narciso Martí-Oliet,et al. Rewriting Logic as a Logical and Semantic Framework , 1996 .
[8] E. D. Jensen,et al. Adaptive Fault-Resistant Systems , 1994 .
[9] Li Gong,et al. The complexity and composability of secure interoperation , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] John Rushby,et al. Critical system properties: survey and taxonomy , 1994 .
[11] José Meseguer,et al. Speciication, Transformation, and Programming of Concurrent Systems in Rewriting Logic , 1994 .
[12] P. Sreeranga Rajan. Transformations in High-Level Synthesis: Formal Specification and Efficient Mechanical Verification , 1994 .
[13] U. Dayal,et al. Semantic Interoperation: A Query Mediation Approach , 1994 .
[14] José Meseguer,et al. A logical theory of concurrent objects and its realization in the Maude language , 1993 .
[15] José Meseguer,et al. Solving the Inheritance Anomaly in Concurrent Object-Oriented Programming , 1993, ECOOP.
[16] Natarajan Shankar,et al. Verification of Real-Time Systems Using PVS , 1993, CAV.
[17] José Meseguer,et al. A logical semantics for object-oriented databases , 1993, SIGMOD '93.
[18] David Cyrluk,et al. Microprocessor Verification in PVS - A Methodology and Simple Example , 1993 .
[19] Patrick Lincoln,et al. A formally verified algorithm for interactive consistency under a hybrid fault model , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.
[20] José Meseguer,et al. Order-Sorted Algebra I: Equational Deduction for Multiple Inheritance, Overloading, Exceptions and Partial Operations , 1992, Theor. Comput. Sci..
[21] Joseph A. Goguen,et al. Simulation and performance estimation for the Rewrite Rule Machine , 1992, [Proceedings 1992] The Fourth Symposium on the Frontiers of Massively Parallel Computation.
[22] Natarajan Shankar. Mechanical Verification of a Generalized Protocol for Byzantine Fault Tolerant Clock Synchronization , 1992, FTRTFT.
[23] John M. Rushby,et al. Formal Specification and Verification of a Fault-Masking and Transient-Recovery Model for Digital Flight-Control Systems , 1992, FTRTFT.
[24] D. Hsieh. A logic to unify semantic network knowledge systems with object-oriented database models , 1992, Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences.
[25] T. Lunt. A Real-Time Intrusion Detection Expert System (IDES)-Final Report , 1992 .
[26] José Meseguer,et al. From Petri Nets to Linear Logic through Categories: A Survey , 1991, Int. J. Found. Comput. Sci..
[27] José Meseguer,et al. An algebraic axiomatization of linear logic models , 1991 .
[28] Joseph A. Goguen,et al. A categorical manifesto , 1989, Mathematical Structures in Computer Science.
[29] José Meseguer,et al. Architectural Design of the Rewrite Rule Machine Ensemble , 1991 .
[30] John Rushby,et al. An Introduction to Formal Specification and Verification using EHDM , 1991 .
[31] Natarajan Shankar,et al. Decision problems for propositional linear logic , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[32] José Meseguer,et al. Petri Nets Are Monoids , 1990, Inf. Comput..
[33] José Meseguer,et al. Compiling Concurrent Rewriting onto the Rewrite Rule Machine , 1990, CTRS.
[34] J. Goguen. Higher-order functions considered unnecessary for higher-order programming , 1990 .
[35] Joseph A. Goguen,et al. Semantic Specifications for the Rewrite Rule Machine , 1991, Concurrency: Theory, Language, And Architecture.
[36] Mark Moriconi,et al. A practical approach to semantic configuration management , 1989, TAV3.
[37] Narciso Martí-Oliet,et al. From Petri nets to linear logic , 1989, Mathematical Structures in Computer Science.
[38] Joseph A. Goguen,et al. The Rewrite Rule Machine Project , 1989 .
[39] Joseph A. Goguen,et al. OBJ as a Theorem Prover with Applications to Hardware Verification , 1989 .
[40] R. Jagannathan,et al. Dataflow-based Methodology for Coarse-Grain Multiprocessing on a Network of Workstations , 1989, ICPP.
[41] Joseph A. Goguen,et al. What Is Unification?: A Categorical View of Substitution, Equation and Solution , 1989 .
[42] John Rushby,et al. Formal Verification of the Interactive Convergence Clock Synchronization Algorithm using EHDM , 1989 .
[43] Rangaswamy Jagannathan. A descriptive and prescriptive model for dataflow semantics , 1988 .
[44] José Meseguer,et al. Software for the Rewrite Rule Machine , 1988, Fifth Generation Computer Systems.
[45] John Rushby,et al. Quality Measures and Assurance for AI Software1 , 1988 .
[46] J. Meseguer,et al. Order-Sorted Algebra Solves the Constructor-Selector, Multiple Representation, and Coercion Problems , 1993, Inf. Comput..
[47] José Meseguer,et al. Final Algebras, Cosemicomputable Algebras, and Degrees of Unsolvability , 1987, Category Theory and Computer Science.
[48] José Meseguer,et al. Unifying Functional, Object-Oriented and Relational Programming with Logical Semantics , 1987, Research Directions in Object-Oriented Programming.
[49] Thomas A. Berson,et al. Multilevel Security for Knowledge-Based Systems , 1987, 1987 IEEE Symposium on Security and Privacy.
[50] José Meseguer,et al. Concurrent term rewriting as a model of computation , 1986, Graph Reduction.
[51] Speci cation , Transformation , and Programmingof Concurrent Systems in Rewriting , .