暂无分享,去创建一个
[1] Florian Kammuller,et al. A Formal Development Cycle for Security Engineering in Isabelle , 2020, ArXiv.
[2] Cesare Tinelli,et al. Extending SMT Solvers to Higher-Order Logic , 2019, CADE.
[3] D. Peled,et al. Model Checking , 2018, Handbook of Finite State Based Models and Applications.
[4] Florian Kammüller,et al. Human Centric Security and Privacy for the IoT Using Formal Techniques , 2017, AHFE.
[5] Florian Kammüller,et al. Modeling and Verification of Insider Threats Using Logical Analysis , 2017, IEEE Systems Journal.
[6] Florian Kammueller,et al. Towards Formal Analysis of Insider Threats for Auctions , 2016, MIST@CCS.
[7] Florian Kammüller,et al. Towards Formal Analysis of Insider Threats for Auctions , 2016, MIST@CCS.
[8] Florian Kammüller,et al. Isabelle Modelchecking for Insider Threats , 2016, DPM/QASA@ESORICS.
[9] Florian Kammüller,et al. Attack Tree Analysis for Insider Threats on the IoT Using Isabelle , 2016, HCI.
[10] Florian Kammüller,et al. Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[11] Michael Fisher,et al. Formal verification of autonomous vehicle platooning , 2016, Sci. Comput. Program..
[12] Marieta Georgieva. Transforming Graphical System Models to Graphical Attack Models , 2015, GraMSec@CSF.
[13] Giuseppe Primiero,et al. Modeling Human Behaviour with Higher Order Logic: Insider Threats , 2014, 2014 Workshop on Socio-Technical Aspects in Security and Trust.
[14] Florian Kammüller,et al. Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis , 2014, 2014 IEEE Security and Privacy Workshops.
[15] Sadie Creese,et al. Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.
[16] Sholom Cohen,et al. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits , 2014, 2014 IEEE Security and Privacy Workshops.
[17] George S. Avrunin,et al. Insider Threat Identification by Process Analysis , 2014, 2014 IEEE Security and Privacy Workshops.
[18] C. O'Halloran. Automated verification of code automatically generated from Simulink® , 2013, Automated Software Engineering.
[19] Joshua Glasser,et al. Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data , 2013, 2013 IEEE Security and Privacy Workshops.
[20] Florian Kammüller,et al. Invalidating Policies using Structural Information , 2013, 2013 IEEE Security and Privacy Workshops.
[21] Oliver Brdiczka,et al. A Bayesian Network Model for Predicting Insider Threats , 2013, 2013 IEEE Security and Privacy Workshops.
[22] Yannick Moy,et al. Testing or Formal Verification: DO-178C Alternatives and Industrial Experience , 2013, IEEE Software.
[23] Michael Sievers,et al. Model-Based Verification and Validation of Spacecraft Avionics , 2012, Infotech@Aerospace.
[24] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[25] Gilles Dowek,et al. Modeling and verification of an air traffic concept of operations , 2004, ISSTA '04.
[26] Florian Kammüller,et al. Modular Reasoning in Isabelle , 2000, CADE.
[27] Florian Kammüller,et al. Locales - A Sectioning Concept for Isabelle , 1999, TPHOLs.
[28] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[29] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[30] David K. Hsiao,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[31] Jason W. Clark. Introduction to Inside the Insider Threat Minitrack , 2018 .
[32] Victor Carreño,et al. Formal Analysis of the Operational Concept for the Small Aircraft Transportation System , 2006, RODIN Book.
[33] Victor Carreño,et al. Analyzing Mode Confusion via Model Checking , 1999, SPIN.