Verification and enforcement of state-based notions of opacity in discrete event systems
暂无分享,去创建一个
[1] S C Kleene,et al. Representation of Events in Nerve Nets and Finite Automata , 1951 .
[2] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[3] J. Meditch. A survey of data smoothing for linear and nonlinear dynamic systems , 1973 .
[4] Harry B. Hunt,et al. On the time and tape complexity of languages I , 1973, STOC.
[5] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[6] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[7] Donald Reid. An algorithm for tracking multiple targets , 1978 .
[8] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[9] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[10] P. Ramadge,et al. Supervisory control of a class of discrete event processes , 1987 .
[11] R. Greiner,et al. Dynamical logic observers for finite automata , 1988, Proceedings of the 27th IEEE Conference on Decision and Control.
[12] Walter Murray Wonham,et al. On observability of discrete-event systems , 1988, Inf. Sci..
[13] R. D. Brandt,et al. Formulas for calculating supremal controllable and normal sublanguages , 1990 .
[14] A. Willsky,et al. Observability of discrete event dynamic systems , 1990 .
[15] Panos J. Antsaklis,et al. Stability and stabilizability of discrete event dynamic systems , 1991, JACM.
[16] Peter E. Caines,et al. Classical and Logic-Based Dynamic Observers for Finite Automata , 1991 .
[17] Alan S. Willsky,et al. Mathematics of Control, Signals, and Systems Invertibility of Discrete-event Dynamic Systems* , 2022 .
[18] Roberto Gorrieri,et al. A taxonomy of trace-based security properties for CCS , 1994, Proceedings The Computer Security Foundations Workshop VII.
[19] David Lee,et al. Testing Finite-State Machines: State Identification and Verification , 1994, IEEE Trans. Computers.
[20] Amit Patra,et al. On observability with delay: antitheses and syntheses , 1994, IEEE Trans. Autom. Control..
[21] Raja Sengupta,et al. Diagnosability of discrete-event systems , 1995, IEEE Trans. Autom. Control..
[22] Yakov Bar-Shalom,et al. Multitarget-Multisensor Tracking: Principles and Techniques , 1995 .
[23] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[24] Stéphane Lafortune,et al. Failure diagnosis using discrete-event models , 1996, IEEE Trans. Control. Syst. Technol..
[25] David Lee,et al. Principles and methods of testing finite state machines-a survey , 1996, Proc. IEEE.
[26] Sagar Naik,et al. Efficient computation of unique input/output sequences in finite-state machines , 1997, TNET.
[27] Demosthenis Teneketzis,et al. Active diagnosis of discrete-event systems , 1998 .
[28] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[29] Dhiraj K. Pradhan,et al. GLFSR-a new test pattern generator for built-in-self-test , 1999, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[30] Christos G. Cassandras,et al. Introduction to Discrete Event Systems , 1999, The Kluwer International Series on Discrete Event Dynamic Systems.
[31] Shengbing Jiang,et al. A polynomial algorithm for testing diagnosability of discrete-event systems , 2001, IEEE Trans. Autom. Control..
[32] Stéphane Lafortune,et al. On an Optimization Problem in Sensor Selection* , 2002, Discret. Event Dyn. Syst..
[33] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[34] Stéphane Lafortune,et al. Polynomial-time verification of diagnosability of partially observed discrete-event systems , 2002, IEEE Trans. Autom. Control..
[35] Stéphane Lafortune,et al. NP-completeness of sensor selection problems arising in partially observed discrete-event systems , 2002, IEEE Trans. Autom. Control..
[36] Biplab Sikdar,et al. A protocol for tracking mobile targets using sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[37] Shengbing Jiang,et al. Optimal sensor selection for discrete-event systems with partial observation , 2003, IEEE Trans. Autom. Control..
[38] Shahin Hashtrudi-Zad,et al. Fault diagnosis in discrete-event systems: framework and model reduction , 2003, IEEE Trans. Autom. Control..
[39] Inseok Hwang,et al. Immediate observability of discrete event systems with application to user-interface design , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[40] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[41] Maciej Koutny,et al. Modelling Dynamic Opacity Using Petri Nets with Silent Actions , 2004, Formal Aspects in Security and Trust.
[42] Gaurav S. Sukhatme,et al. Constrained coverage for mobile sensor networks , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.
[43] Maciej Koutny,et al. Modelling Opacity Using Petri Nets , 2005, WISP@ICATPN.
[44] Guoliang Xing,et al. Integrated coverage and connectivity configuration for energy conservation in sensor networks , 2005, TOSN.
[45] Nejib Ben Hadj-Alouane,et al. On the verification of intransitive noninterference in mulitlevel security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[46] D. Thorsley,et al. Intrusion Detection in Controlled Discrete Event Systems , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[47] Benoît Caillaud,et al. Concurrent Secrets , 2007, 2006 8th International Workshop on Discrete Event Systems.
[48] Radha Poovendran,et al. Stochastic coverage in heterogeneous sensor networks , 2006, TOSN.
[49] Olivier Roux,et al. Synthesis of non-interferent distributed systems , 2007 .
[50] Christoforos N. Hadjicostis,et al. Notions of security and opacity in discrete event systems , 2007, 2007 46th IEEE Conference on Decision and Control.
[51] Maciej Koutny,et al. Opacity generalised to transition systems , 2005, International Journal of Information Security.
[52] A. Saboori,et al. Verification of initial-state opacity in security applications of DES , 2008, 2008 9th International Workshop on Discrete Event Systems.
[53] George Cybenko,et al. The theory of trackability with applications to sensor networks , 2008, TOSN.
[54] P. Darondeau,et al. Opacity enforcing control synthesis , 2008, 2008 9th International Workshop on Discrete Event Systems.
[55] Christoforos N. Hadjicostis,et al. Verification of Infinite-Step Opacity and Analysis of its Complexity* , 2009 .
[56] Sheng Zhong,et al. k-Anonymous data collection , 2009, Inf. Sci..
[57] Narad Rampersad,et al. On NFAs where all states are final, initial, or both , 2008, Theor. Comput. Sci..
[58] Christoforos N. Hadjicostis,et al. Reduced-complexity verification for initial-state opacity in modular discrete event systems , 2010, WODES.
[59] Christoforos N. Hadjicostis,et al. Verification of $K$-Step Opacity and Analysis of Its Complexity , 2009, IEEE Transactions on Automation Science and Engineering.