81 results on '"Basagiannis, Stylianos"'
Search Results
2. The Potential of Digital Twins: Four Industry Perspectives
3. Computer-Aided Verification for Iterative Matrix Inversion Problems in Systems and Control
4. Efficient Translation of Safety LTL to DFA Using Symbolic Automata Learning and Inductive Inference
5. Learning Moore machines from input–output traces
6. Formal Verification of Network Interlocking Control by Distributed Signal Boxes
7. Injecting Formal Verification in FMI-Based Co-simulations of Cyber-Physical Systems
8. Lessons Learned Using FMI Co-simulation for Model-Based Design of Cyber Physical Systems
9. Quantitative Analysis for Authentication of Low-cost RFID Tags
10. State Space Reduction with Message Inspection in Security Protocol Model Checking
11. Attacking an OT-Based Blind Signature Scheme
12. Safe Implementation of Mixed-Criticality Applications in Multicore Platforms: A Model-Based Design Approach
13. SMT-Based Stability Verification of an Industrial Switched PI Control Systems
14. Formal Verification of Network Interlocking Control by Distributed Signal Boxes
15. Towards Verification of Multicore Motor-Drive Controllers in Aerospace
16. Formal security analysis of near field communication using model checking
17. Injecting Formal Verification in FMI-Based Co-simulations of Cyber-Physical Systems
18. Lessons Learned Using FMI Co-simulation for Model-Based Design of Cyber Physical Systems
19. A Formally Verified Mechanism for Countering SPIT
20. Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
21. Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker
22. Implementation Experiences from Smart Grid Security Applications and Outlook on Future Research
23. List of Contributors
24. Second Interactive Workshop on the Industrial Application of Verification and Testing, ETAPS 2020 Workshop (InterAVT 2020)
25. ReForm: A Tool for Rapid Requirements Formalization
26. Formal analysis for robust anti-SPIT protection using model checking
27. Preface
28. Towards an Explainable Approach for Insider Threat Detection: Constraint Network Learning
29. A Formally Verified Mechanism for Countering SPIT
30. Learning Moore machines from input–output traces
31. Interlocking Control by Distributed Signal Boxes: Design and Verification with the SPIN Model Checker
32. An intruder model with message inspection for model checking security protocols
33. Probabilistic model checking for the quantification of DoS security threats
34. The INtegrated TOolchain for Cyber-Physical Systems (INTO-CPS): a Guide
35. INtegrated TOol chain for model-based design of CPSs:D1.2 - Case Studies 2
36. Formal Methods for Energy-Efficient EPONs
37. Energy-efficiency analysis under QoS constraints using formal methods: A study on EPONs
38. SysML as a Common Integration Platform for Co-Simulations
39. Collaborative Model-based Systems Engineering for Cyber-Physical Systems, with a Building Automation Case Study
40. Software certification of airborne cyber-physical systems under DO-178C
41. Integrated tool chain for model-based design of Cyber-Physical Systems: The INTO-CPS project
42. SysML as a Common Integration Platform for Co-Simulations.
43. Security analysis of NFC relay attacks using probabilistic model checking
44. Explanations and Relaxations for Policy Conflicts in Physical Access Control
45. Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks
46. Towards energy consumption evaluation of the SSL handshake protocol in mobile communications
47. Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking
48. Quantitative analysis for authentication of low-cost RFID tags
49. Quantitative model checking of an RSA-based email protocol on mobile devices
50. Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.