All Stories

  1. Automation for network security configuration: state of the art and research trends
  2. Multipoint Passive Monitoring in Packet Networks
  3. Formally sound implementations of security protocols with JavaSPI
  4. An efficient data exchange mechanism for chained network functions
  5. Interest Flooding Attack Countermeasures Assessment on Content Centric Networking
  6. Push applications and dynamic content generation over content-centric networking
  7. Automatic Configuration of Opaque Network Functions in CMS
  8. An efficient data exchange algorithm for chained network functions
  9. PIT overload analysis in content centric networks
  10. Formal verification of security protocol implementations: a survey
  11. Safe abstractions of data encodings in formal security protocol models
  12. Vehicle navigation service based on real-time traffic information: A RESTful NetAPI solution with long polling notification
  13. Visual model-driven design, verification and implementation of security protocols
  14. Efficient multistriding of large non-deterministic finite state automata for deep packet inspection
  15. Formally based semi-automatic implementation of an open security protocol
  16. An approach to refinement checking of SysML requirements
  17. The Java SPI Framework for Security Protocol Implementation
  18. SPAF: Stateless FSA-Based Packet Filters
  19. Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access
  20. JavaSPI
  21. iNFAnt
  22. Provably correct Java implementations of Spi Calculus security protocols specifications
  23. An experience in embedded control software verification
  24. Tools for cryptographic protocols analysis: A technical and experimental comparison
  25. Detecting Chains of Vulnerabilities in Industrial Networks
  26. Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code
  27. Efficient representation of the attacker’s knowledge in cryptographic protocols analysis
  28. Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models
  29. A Lightweight Security Analyzer inside GCC
  30. Vulnerability Modelling for the Analysis of Network Attacks
  31. Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models
  32. An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation
  33. Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols
  34. Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems
  35. Improving the security of industrial networks by means of formal verification
  36. A Grid-Powered Framework to Support Courses on Distributed Programming
  37. EXPLOITING SYMMETRIES FOR TESTING EQUIVALENCE VERIFICATION IN THE SPI CALCULUS
  38. Implementing innovative services supporting user and terminal mobility: the SCARAB architecture
  39. Temporal logic properties of Java objects
  40. Automatic testing equivalence verification of spi calculus specifications
  41. Using binary decision diagrams for representation and analysis of communication protocols
  42. A deadlock detection tool for concurrent Java programs
  43. Mapping Petri nets with inhibitor arcs onto basic LOTOS behavior expressions
  44. A LOTOS extension for the performance analysis of distributed systems
  45. Rapid prototyping of protocols from LOTOS specifications
  46. A protocol for multirendezvous of LOTOS processes
  47. Parallel CRC generation
  48. The use of Estelle to specify manufacturing systems
  49. Automated Formal Methods for Security Protocol Engineering
  50. Spi2Java: automatic cryptographic protocol Java code generation from SPI calculus