Author:
Basagiannis S.,Petridou S.,Alexiou N.,Papadimitriou G.,Katsaros P.
Subject
Law,General Computer Science
Reference36 articles.
1. Agha G, Greenwald M, Gunter CA, Khanna S, Meseguer J, Sen K, Thati P, Formal modeling and analysis of dos using probabilistic rewrite theories. In: Proc.. The IEEE Workshop on Foundations of Computer Security (FCS'05), Chicago, IL, USA, 2005.
2. Ateniese G, Nita-Rotaru C, Stateless-recipient certified e-mail system based on verifiable encryption. In: Proc. of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology (CT-RSA'02), Germany, 2002, pp. 182–199.
3. Model-checking continous-time markov chains;Aziz;ACM Transactions on Computational Logic,2000
4. Principles of model checking;Baier,2008
5. Basagiannis S, Katsaros P, Pombortsis A, Alexiou N, A probabilistic attacker model for quantitative verification of dos security threats. In: Proc. of the 32nd Annual IEEE International Conference on Computer Software and Applications (COMPSAC'08), Finland, 2008, pp. 12–19.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献