Modeling attack, defense and threat trees and the cyber kill chain, att&ck and stride frameworks as blackboard architecture networks
J Straub - 2020 IEEE International conference on smart cloud …, 2020 - ieeexplore.ieee.org
Multiple techniques for modeling cybersecurity attacks and defense have been developed.
The use of tree-structures as well as techniques proposed by several firms (such as …
The use of tree-structures as well as techniques proposed by several firms (such as …
[BOOK][B] Advances in Information and Communication: Proceedings of the 2022 Future of Information and Communication Conference (FICC), Volume 2
K Arai - 2022 - books.google.com
The book “Advances in Information and Communication Networks-Proceedings of the 2022
Future of Information and Communication Conference (FICC)” aims in presenting the latest …
Future of Information and Communication Conference (FICC)” aims in presenting the latest …
A verification environment for sequential imperative programs in Isabelle/HOL
N Schirmer - International Conference on Logic for Programming …, 2005 - Springer
LNAI 3452 - A Verification Environment for Sequential Imperative Programs in Isabelle/HOL
Page 1 A Verification Environment for Sequential Imperative Programs in Isabelle/HOL* Norbert …
Page 1 A Verification Environment for Sequential Imperative Programs in Isabelle/HOL* Norbert …
[HTML][HTML] Computer supported mathematics with ΩMEGA
Classical automated theorem proving of today is based on ingenious search techniques to
find a proof for a given theorem in very large search spaces—often in the range of several …
find a proof for a given theorem in very large search spaces—often in the range of several …
Enhancing Security Testing Software for Systems that Cannot be Subjected to the Risks of Penetration Testing Through the Incorporation of Multi-threading and and …
M Tassava, C Kolodjski, J Milbrath, J Straub - arxiv preprint arxiv …, 2024 - arxiv.org
The development of a system vulnerability analysis tool (SVAT) for complex mission critical
systems (CMCS) produced the software for operation and network attack results review …
systems (CMCS) produced the software for operation and network attack results review …
Extension of the Blackboard Architecture with Common Properties and Generic Rules
J Rivard, J Straub - arxiv preprint arxiv:2306.04287, 2023 - arxiv.org
The Blackboard Architecture provides a mechanism for embodying data, decision making
and actuation. Its versatility has been demonstrated across a wide number of application …
and actuation. Its versatility has been demonstrated across a wide number of application …
A distributed blackboard approach based upon a boundary node concept
J Straub - Journal of Intelligent & Robotic Systems, 2016 - Springer
An architecture for distributed decision making and command/control, which is based on an
extrapolation of the Blackboard architectural style, is presented. The proposed architecture …
extrapolation of the Blackboard architectural style, is presented. The proposed architecture …
Ω-Ants–An open approach at combining interactive and automated theorem proving
We present the Ω-Ants theorem prover that is built on top of an agent-based command
suggestion mechanism. The theorem prover inherits beneficial properties from the …
suggestion mechanism. The theorem prover inherits beneficial properties from the …
Evaluation of a multi-goal solver for use in a blackboard architecture
J Straub - International Journal of Decision Support System …, 2014 - igi-global.com
This article presents a multi-goal solver for problems that can be modeled using a
Blackboard Architecture. The Blackboard Architecture can be used for data fusion, robotic …
Blackboard Architecture. The Blackboard Architecture can be used for data fusion, robotic …
[HTML][HTML] Combined reasoning by automated cooperation
Different reasoning systems have different strengths and weaknesses, and often it is useful
to combine these systems to gain as much as possible from their strengths and retain as little …
to combine these systems to gain as much as possible from their strengths and retain as little …