关注
Jason Jaskolka
标题
引用次数
引用次数
年份
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support
Q Rouland, B Hamid, J Jaskolka
Journal of Systems Architecture 117, 102073, 2021
402021
Exploring covert channels
J Jaskolka, R Khedri
44th Hawaii International Conference on System Sciences (HICSS),, 1-10, 2011
302011
Formal specification and verification of reusable communication models for distributed systems architecture
Q Rouland, B Hamid, J Jaskolka
Future Generation Computer Systems 108, 178-197, 2020
252020
Recommendations for effective security assurance of software-dependent systems
J Jaskolka
Intelligent Computing: Proceedings of the 2020 Computing Conference, Volume …, 2020
212020
Software Engineering for Model-Based Development by Domain Experts
M Bialy, V Pantelic, J Jaskolka, A Schaap, LM Patcas, M Lawford, ...
Handbook of System Safety and Security: Cyber Risk and Risk Management …, 2016
202016
Verification of information flow in agent-based systems
KE Sabri, R Khedri, J Jaskolka
E-Technologies: Innovation in an Open World: 4th International Conference …, 2009
192009
Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems
J Jaskolka, J Villasenor
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
182017
An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems
J Jaskolka, J Villasenor
IEEE Transactions on Reliability 66 (2), 529-546, 2017
162017
Endowing concurrent Kleene algebra with communication actions
J Jaskolka, R Khedri, Q Zhang
Relational and Algebraic Methods in Computer Science: 14th International …, 2014
162014
Analyzing the Impact of Cyberattacks on Industrial Control Systems using Timed Automata
A Jawad, J Jaskolka
2021 IEEE 21st International Conference on Software Quality, Reliability and …, 2021
152021
On the necessary conditions for covert channel existence: A state-of-the-art survey
J Jaskolka, R Khedri, Q Zhang
Procedia Computer Science 10, 458-465, 2012
152012
Architecture for ontology-supported multi-context reasoning systems
A LeClair, J Jaskolka, W MacCaull, R Khedri
Data & Knowledge Engineering 140, 102044, 2022
122022
Towards an Ontology Design Architecture
J Jaskolka, W MacCaull, R Khedri
2015 International Conference on Computational Science and Computational …, 2015
122015
An Evaluation of IoT Security Guidance Documents: A Shared Responsibility Perspective
B Sereda, J Jaskolka
Procedia Computer Science 201, 281-288, 2022
102022
Modeling and Simulation Approaches for Cybersecurity Impact Analysis: State-of-the-Art
A Jawad, J Jaskolka
2021 Annual Modeling and Simulation Conference (ANNSIM), 1-12, 2021
102021
Modeling, analysis, and detection of information leakage via protocol-based covert channels
J Jaskolka
102010
Conceptualizing the Secure Machine Learning Operations (SecMLOps) Paradigm
X Zhang, J Jaskolka
2022 IEEE 22nd International Conference on Software Quality, Reliability and …, 2022
92022
A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets
A Jawad, L Newton, A Matrawy, J Jaskolka
ICC 2022-IEEE International Conference on Communications, 2206-2211, 2022
92022
On the Modelling, Analysis, and Mitigation of Distributed Covert Channels
J Jaskolka
92015
A Formulation of the Potential for Communication Condition using C2KA
J Jaskolka, R Khedri
arXiv preprint arXiv:1408.5964, 2014
92014
系统目前无法执行此操作,请稍后再试。
文章 1–20