11 research outputs found
An axiom system for sequence-based specification
AbstractThis paper establishes an axiomatic foundation and a representation theorem for the rigorous, constructive process, called sequence-based specification, of deriving precise specifications from ordinary (informal) statements of functional requirements. The representation theorem targets a special class of Mealy state machines, and algorithms are presented for converting from the set of sequences that define the specification to the equivalent Mealy machine, and vice versa. Since its inception, sequence-based specification has been effectively used in a variety of real applications, with gains reported in quality and productivity. This paper establishes the mathematical foundation independently of the process itself
Seven deadliest network attacks / Stacy Prowell, Rob Kraus, Mike Borkin.
Includes bibliographical references and index.xiv, 142 pages
Recommended from our members
Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and information intelligence challenges and strategies
As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods