Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Run-time enforcement of nonsafety policies
A common mechanism for ensuring that software behaves securely is to monitor programs at
run time and check that they dynamically adhere to constraints specified by a security policy …
run time and check that they dynamically adhere to constraints specified by a security policy …
ARMET: Behavior-based secure and resilient industrial control systems
MT Khan, D Serpanos, H Shrobe - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
In this paper, we introduce a design methodology to develop reliable and secure industrial
control systems (ICSs) based on the behavior of their computational resources (ie …
control systems (ICSs) based on the behavior of their computational resources (ie …
On runtime enforcement via suppressions
Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the
behaviour specified by some correctness property on an executing system. The …
behaviour specified by some correctness property on an executing system. The …
[PDF][PDF] Module checking of strategic ability.
Module checking is a decision problem proposed in late 1990s to formalize verification of
open systems, ie, systems that must adapt their behavior to the input they receive from the …
open systems, ie, systems that must adapt their behavior to the input they receive from the …
[PDF][PDF] On module checking and strategies
Two decision problems are very close in spirit: module checking of CTL/CTL* and model
checking of ATL/ATL*. The latter appears to be a natural multi-agent extension of the former …
checking of ATL/ATL*. The latter appears to be a natural multi-agent extension of the former …
Enforcing information flow security properties in cyber-physical systems: A generalized framework based on compensation
TT Gamage, BM McMillin… - 2010 IEEE 34th Annual …, 2010 - ieeexplore.ieee.org
This paper presents a general theory of event compensation as an information flow security
enforcement mechanism for Cyber-Physical Systems (CPSs). The fundamental research …
enforcement mechanism for Cyber-Physical Systems (CPSs). The fundamental research …
Dynamic compact visualizations for augmented reality
M Tatzgern, D Kalkofen… - 2013 IEEE Virtual Reality …, 2013 - ieeexplore.ieee.org
In Augmented Reality (AR), careless augmentations can easily lead to information overflow.
Especially on small screen devices, only a limited amount of information can be displayed …
Especially on small screen devices, only a limited amount of information can be displayed …
On first-order runtime enforcement of branching-time properties
Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the
behaviour specified by some correctness property on an executing system. The …
behaviour specified by some correctness property on an executing system. The …
Security policy compliance with violation management
A security policy of an information system is a set of security requirements that correspond to
permissions, prohibitions and obligations to execute some actions when some contextual …
permissions, prohibitions and obligations to execute some actions when some contextual …
Design and run-time aspects of secure cyber-physical systems
Abstract Cyber-Physical Systems (CPSs) combine computational and physical components
enabling real-world interaction. Digitization, decentralization, and high connectivity, as well …
enabling real-world interaction. Digitization, decentralization, and high connectivity, as well …