Articles with "formal analysis" as a keyword



Photo from wikipedia

Formal Analysis of SA-TEK 3-Way Handshake Protocols

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Shanghai Jiaotong University (Science)"

DOI: 10.1007/s12204-021-2340-2

Abstract: IEEE 802.16 is the standard for broadband wireless access. The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control, in which the privacy and key management (PKM) protocols are specified.… read more here.

Keywords: way handshake; formal analysis; analysis; tek way ... See more keywords
Photo by dawson2406 from unsplash

Fault Attacks on Access Control in Processors: Threat, Formal Analysis and Microarchitectural Mitigation

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3280804

Abstract: Process isolation is a key component of the security architecture in any hardware/software system. However, even when implemented correctly and comprehensively at the software (SW) level, process isolation may be compromised by weaknesses of the… read more here.

Keywords: formal analysis; security; access control; threat ... See more keywords
Photo from wikipedia

Formal Analysis and Estimation of Chance in Datasets Based on Their Properties

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Knowledge and Data Engineering"

DOI: 10.1109/tkde.2021.3068009

Abstract: Machine learning research, particularly in genomics, is often based on wide shaped datasets, i.e. datasets having a large number of features, but a small number of samples. Such configurations raise the possibility of chance influence… read more here.

Keywords: influence; chance datasets; chance; formal analysis ... See more keywords
Photo from wikipedia

Distributed Formal Analysis for Power Networks With Deep Integration of Distributed Energy Resources

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Power Systems"

DOI: 10.1109/tpwrs.2018.2875150

Abstract: A scalable distributed formal analysis (DFA) via reachable set computation is presented to efficiently evaluate the stability of large-scale interconnected power networks under heterogeneous disturbances induced by high penetration of distributed energy resources (DERs). Based… read more here.

Keywords: distributed formal; power networks; formal analysis; power ... See more keywords
Photo by jontyson from unsplash

Formal Analysis of the Security Protocol with Timestamp Using SPIN

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/2420590

Abstract: The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols… read more here.

Keywords: time; security; analysis; security protocols ... See more keywords

The Form of Game Formalism

Sign Up to like & get
recommendations!
Published in 2018 at "Media and Communication"

DOI: 10.17645/mac.v6i2.1321

Abstract: This article explores how the concept of formalism and the resulting method of formal analysis have been used and applied in the study of digital games. Three types of formalism in game studies are identified… read more here.

Keywords: formal analysis; game; ontology; form game ... See more keywords