Engineering secure and dependable software systems /
Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical consequences, so a better understand...
Call Number: | Libro Electrónico |
---|---|
Corporate Author: | |
Other Authors: | , , |
Format: | Electronic Conference Proceeding eBook |
Language: | Inglés |
Published: |
Amsterdam, Netherlands :
IOS Press,
2019.
|
Series: | NATO science for peace and security series. Information and communication security ;
v. 53. |
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- Formal Methods and Tool-Suites for CPS Security, Safety and Verification
- A Formal Introduction to Abstract Interpretation
- SAT and SMT Solvers: A Foundational Perspective
- Programming by Examples: PL Meets ML
- Automatic Program Verification with SEAHORN
- Using Epistemic Logic to Analyze Protocols
- Abstraction-Based Control Design. Lecture Notes
- The Thousand-and-One Cryptographers
- Maude-NPA and Formal Analysis of Protocols with Equational Theories
- Building Deductive Program Verifiers. Lecture Notes
- Clocks in Kahn Process Networks
- Efficient Checking of Actual Causality with SAT Solving.