Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of Shanghai Jiaotong University (Science)"
DOI: 10.1007/s12204-021-2340-2
Abstract: IEEE 802.16 is the standard for broadband wireless access. The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control, in which the privacy and key management (PKM) protocols are specified.…
read more here.
Keywords:
way handshake;
formal analysis;
analysis;
tek way ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3280804
Abstract: Process isolation is a key component of the security architecture in any hardware/software system. However, even when implemented correctly and comprehensively at the software (SW) level, process isolation may be compromised by weaknesses of the…
read more here.
Keywords:
formal analysis;
security;
access control;
threat ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Knowledge and Data Engineering"
DOI: 10.1109/tkde.2021.3068009
Abstract: Machine learning research, particularly in genomics, is often based on wide shaped datasets, i.e. datasets having a large number of features, but a small number of samples. Such configurations raise the possibility of chance influence…
read more here.
Keywords:
influence;
chance datasets;
chance;
formal analysis ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Power Systems"
DOI: 10.1109/tpwrs.2018.2875150
Abstract: A scalable distributed formal analysis (DFA) via reachable set computation is presented to efficiently evaluate the stability of large-scale interconnected power networks under heterogeneous disturbances induced by high penetration of distributed energy resources (DERs). Based…
read more here.
Keywords:
distributed formal;
power networks;
formal analysis;
power ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Computational Intelligence and Neuroscience"
DOI: 10.1155/2022/2420590
Abstract: The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols…
read more here.
Keywords:
time;
security;
analysis;
security protocols ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Media and Communication"
DOI: 10.17645/mac.v6i2.1321
Abstract: This article explores how the concept of formalism and the resulting method of formal analysis have been used and applied in the study of digital games. Three types of formalism in game studies are identified…
read more here.
Keywords:
formal analysis;
game;
ontology;
form game ... See more keywords