Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Website of the System Programming Department. Khmelnytskyi National University
., 2016.
Monin, Jean François
, and
Michael G. Hinchey
.
Understanding Formal Methods
. Springer, 2003.
Romanovsky, Alexander
.
"
Deployment of Formal Methods in Industry: the Legacy of the FP7 ICT DEPLOY Integrated Project
."
ACM SIGSOFT Software Engineering Notes
37, no. 5 (2012): 1-4.
Almeida, José Bacelar
,
Maria João Frade
,
Jorge Sousa Pinto
, and
Simão Melo de Sousa
.
"
An Overview of Formal Methods Tools and Techniques
." In
Rigorous Software Development: An Introduction to Program Verification
, 15-44. London, 2011.
Hinchey, Michael G.
,
Jonathan P. Bowen
, and
Emil Vassev
.
"
Formal Methods
." In
Encyclopedia of Software Engineering, ed. Philip A. Laplante
, 308-320. Taylor & Francis, 2010.
Laprie, Jean-Claude
.
"
From Dependability to Resilience
." In
38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
. Anchorage, USA, 2008.
Neches, Robert
.
Engineered Resilient Systems (ERS)
. S&T Priority Description and Roadmap, 2011.
Reder, Leonard
,
John Day
,
Mitch Ingham
,
Richard Murray
, and
Brian Williams
.
Engineering Resilient Space Systems: Introduction to Short Course
. Pasadena, CA: Keck Institute for Space Studies, 2012.
Tyugu, Enn
.
Artificial Intelligence in Cyber Defense
In
Proceedings of the Third International Conference on Cyber Conflict, ed. C. Czosseck, E. Tyugu, T. Wingfield
. Tallinn: CCD COE, 2011.
Bitter, Christian
,
David A. Elizondo
, and
Tim Watson
.
"
Application of Artificial Neural Networks and Related Techniques to Intrusion Detection
." In
The 2010 International Joint Conference on Neural Networks (IJCNN)
., 2010.
Wing, Jeannette M.
.
A Symbiotic Relationship Between Formal Methods and Security
In
Computer Security, Dependability and Assurance: From Needs to Solutions, Proceedings
. IEEE, 1998.
Mansour, Riham Hassan Abd
.
Formal Analysis and Design for Engineering Security (FADES)
. Vol. PhD Dissertation. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2009.
Nakagawa, Hiroyuki
,
Kenji Taguchi
, and
Shinichi Honiden
.
Formal Specification Generator for KAOS: Model Transformation Approach to Generate Formal Specifications from KAOS Requirements Models
In
Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering
. Atlanta, GA, 2007.
Schneider, Steve
.
The B-Method: An Introduction
. Basingstoke, UK: Palgrave, 2001.
van Lamsweerde, A.
.
Elaborating Security Requirements by Construction of Intentional Anti-Models
In
Proceedings of the 26th International Conference on Software Engineering, ICSE 2004
., 2004.
Dai, Lirong
, and
Kendra Cooper
.
"
A Survey of Modelling and Analysis Approaches for Architecting Secure Software Systems
."
International Journal of Network Security
5, no. 2 (2007): 187-198.
Heitmeyer, Constance L.
,
Myla M. Archer
,
Elizabeth I. Leonard
, and
John D. McLean
.
"
Applying Formal Methods to a Certifiably Secure Software System
."
IEEE Transactions on Software Engineering
34, no. 1 (8): 82-97.
Heitmeyer, Constance
,
Myla Archer
,
Ramesh Bharadwaj
, and
Ralph Jeffords
.
"
Tools for Constructing Requirements Specifications: The SCR Toolset at the Age of Ten
."
Computer Systems Science & Engineering
20, no. 1 (2005): 19-35.
Older, Susan
, and
Shiu-Kai Chin
.
"
Formal Methods of Assuring Security of Protocols
."
The Computer Journal
45, no. 1 (2002): 46-54.
Mossakowski, Till
, and
Markus Roggenbach
.
Structured CSP – A Process Algebra as an Institution
In
Recent Trends in Algebraic Development Techniques
. Berlin, Heidelberg: Springer, 2007.
Madeira, Pedro Miguel dos
.
Formal Methods for the Analysis of Security Protocols
. Vol. PhD Dissertation. Lisbon: Instituto Superior Tėcnico, Universidade Tecnica de Lisboa, 2006.
Blanchet, Bruno
.
"
Using Horn Clauses for Analyzing Security Protocols
." In
Formal Models and Techniques for Analyzing Security Protocols
, 86-111. Amsterdam: IOS Press, 2011.
Arsac, Wihem
,
Giampaolo Bella
,
Xavier Chantry
, and
Luca Compagna
.
"
Validating Security Protocols under the General Attacker
." In
Foundations and Applications of Security Analysis
, 33-51. Berlin, Heidelberg: Springer, 2009.
Armando, Alessandro
,
D.A. Basin
, and
Y. Boichut
.
"
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
." In
International Conference on Computer Aided Verification CAV 2005
. Heidelberg: Springer, 2005.
Armando, Alessandro
, and
Luca Compagna
.
"
SAT-based Model-Checking for Security Protocols Analysis
."
International Journal of Information Security
7, no. 1 (2008): 3-32.
Pages
« първа
‹ предишна
…
209
210
211
212
213
214
215
216
217
…
следваща ›
последна »
469821 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all