Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

Spot 2.0—a framework for LTL and-automata manipulation

A Duret-Lutz, A Lewkowicz, A Fauchille… - … for Verification and …, 2016 - Springer
Abstract We present Spot 2.0, a C++ library with Python bindings and an assortment of
command-line tools designed to manipulate LTL and ω-automata in batch. New automata …

[HTML][HTML] A flexible approach to multi-party business process execution on blockchain

F Corradini, A Marcelletti, A Morichetta, A Polini… - Future Generation …, 2023 - Elsevier
In modern business scenarios, more and more organisations have to deal with the critical
requirements of trustworthiness and flexibility, when collaborating in multi-party business …

Handling state space explosion in component-based software verification: A review

F Nejati, AA Abd Ghani, NK Yap, AB Jafaar - IEEE Access, 2021 - ieeexplore.ieee.org
Component-based software development (CBSD) is an alternative approach to constructing
software systems that offers numerous benefits, particularly in decreasing the complexity of …

Presentation of the 9th edition of the model checking contest

E Amparore, B Berthomieu, G Ciardo… - Tools and Algorithms for …, 2019 - Springer
Abstract The Model Checking Contest (MCC) is an annual competition of software tools for
model checking. Tools must process an increasing benchmark gathered from the whole …

Is my attack tree correct?

M Audinot, S Pinchinat, B Kordy - … on Research in Computer Security, Oslo …, 2017 - Springer
Attack trees are a popular way to represent and evaluate potential security threats on
systems or infrastructures. The goal of this work is to provide a framework allowing to …

[Књига][B] Foundations of multi-paradigm modelling for cyber-physical systems

P Carreira, V Amaral, H Vangheluwe - 2020 - library.oapen.org
This open access book coherently gathers well-founded information on the fundamentals of
and formalisms for modelling cyber-physical systems (CPS). Highlighting the cross …

Zone-based verification of timed automata: extrapolations, simulations and what next?

P Bouyer, P Gastin, F Herbreteau, O Sankur… - … Conference on Formal …, 2022 - Springer
Timed automata have been introduced by Rajeev Alur and David Dill in the early 90's. In the
last decades, timed automata have become the de facto model for the verification of real …

Improving livelihood through crop-livestock integration: insights from a farm trajectory model

M Cosme, A Koné, F Pommereau, C Gaucherel - Agricultural Systems, 2024 - Elsevier
CONTEXT Smallholder farmers in sub-Saharan Africa seek to improve their livelihoods by
investing in new assets. These investments and their effectiveness are constrained by …

MightyL: A Compositional Translation from MITL to Timed Automata

T Brihaye, G Geeraerts, HM Ho, B Monmege - International Conference on …, 2017 - Springer
Abstract Metric Interval Temporal Logic (MITL) was first proposed in the early 1990s as a
specification formalism for real-time systems. Apart from its appealing intuitive syntax, there …