Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Massimo Merro"'
Publikováno v:
Logical Methods in Computer Science, Vol Volume 14, Issue 3 (2018)
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout large-scale networks. In this paper, we propose a compositional analysis technique to study formal probabilistic models of gossip protocols
Externí odkaz:
https://doaj.org/article/07038f58b30c41e39c90beb35fd25fab
Publikováno v:
Logical Methods in Computer Science, Vol Volume 11, Issue 1 (2015)
We present a timed process calculus for modelling wireless networks in which individual stations broadcast and receive messages; moreover the broadcasts are subject to collisions. Based on a reduction semantics for the calculus we define a contextual
Externí odkaz:
https://doaj.org/article/c837d91808b2423287ff141335c2727c
Publikováno v:
ACM Transactions on Privacy and Security. 26:1-41
With the advent of Industry 4.0 , industrial facilities and critical infrastructures are transforming into an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers , increasingly interconnected and therefore
Publikováno v:
Computer Security. ESORICS 2022 International Workshops ISBN: 9783031254598
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::91c6e944b200be61b542d0206384b878
https://doi.org/10.1007/978-3-031-25460-4_15
https://doi.org/10.1007/978-3-031-25460-4_15
Publikováno v:
Theoretical Computer Science. 890:125-146
We define a simple process calculus, based on Hennessy and Regan's Timed Process Language, for specifying networks of communicating programmable logic controllers (PLCs) enriched with monitors enforcing specification compliance at runtime. We define
Publikováno v:
ACM Transactions on Privacy and Security. 24:1-40
IoT platforms enable users to connect various smart devices and online services via reactive apps running on the cloud. These apps, often developed by third-parties, perform simple computations on data triggered by external information sources and ac
Publikováno v:
CSF
Cyber-Physical systems (CPSs) are exposed to cyber- physical attacks, i.e., security breaches in cyberspace that adversely affect the physical processes of the systems.We define two probabilistic metrics to estimate the physical impact of attacks tar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::edf0223780bfcc0168b4b26a1a8eebe1
http://hdl.handle.net/11383/2115577
http://hdl.handle.net/11383/2115577
Publikováno v:
FormaliSE@ICSE
Cyber-Physical Systems (CPSs) are integrations of distributed computing systems with physical processes that monitor and control entities in a physical environment. Although the range of their applications include several critical domains, the curren
Publikováno v:
Lanotte, R, Merro, M, Munteanu, A & Vigano, L 2020, ' A Formal Approach to Physics-Based Attacks in Cyber-Physical Systems ', ACM Transactions on Privacy and Security, vol. 23, no. 1, 3, pp. 3:1–3:41 . https://doi.org/10.1145/3373270
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical Systems (CPSs) and physics-based attacks, i.e., attacks targeting physical devices. We focus on a formal treatment of both integrity and denial of se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8ba7ad63d75471be85528b9f1460cf6a
https://kclpure.kcl.ac.uk/en/publications/7a06c3b0-e712-4ff7-ad05-c5ed5d84a363
https://kclpure.kcl.ac.uk/en/publications/7a06c3b0-e712-4ff7-ad05-c5ed5d84a363