


default search action
International Journal of Critical Computer-Based Systems, Volume 3
Volume 3, Numbers 1/2, 2012
- Khaza Anuarul Hoque, Otmane Aït Mohamed, Sa'ed Abed
, Mounir Boukadoum:
MDG-SAT: an automated methodology for efficient safety checking. 4-25 - Moez Krichen:
A formal framework for black-box conformance testing of distributed real-time systems. 26-43 - Mohand Cherif Boukala
, Laure Petrucci
:
Distributed model-checking and counterexample search for CTL logic. 44-59 - Nesrine Harrath, Bruno Monsuez:
SystemC waiting state automata. 60-95 - Nabila Salmi, Patrice Moreaux, Malika Ioualalen
:
Structured performance analysis for component-based systems. 96-131 - Tayssir Touili:
Computing transitive closures of hedge transformations. 132-150
Volume 3, Number 3, 2012
- Tangming Yuan
, Tim Kelly:
Argument-based approach to computer system safety engineering. 151-167 - Raimundo José de Araújo Macêdo
, Sérgio Gorender:
Exploiting partitioned synchrony to implement accurate failure detectors. 168-186 - Abdelli Abdelkrim
:
Efficient computation of quantitative properties of real-time preemptive systems. 187-209 - Luigi Coppolino
, Luigi Romano, Andrea Bondavalli
, Alessandro Daidone:
A hidden Markov model based intrusion detection system for wireless sensor networks. 210-228 - Francesco Flammini
:
On the use of models for the dependability and security of transit systems and infrastructures: a multi-year industrial experience report. 229-244
Volume 3, Number 4, 2012
- Davide Papini:
Lightweight MAC-spoof detection exploiting received signal power and median filtering. 247-261 - Naveed Ahmed, Christian Damsgaard Jensen:
Structured intuition: a new methodology to analyse authentication protocols. 262-283 - Nicola Dragoni
, Olga Gadyatskaya, Fabio Massacci
, Anton Philippov:
High-level algorithms and data structures requirements for security-by-contract on Java cards. 284-304 - Yuliya Prokhorova, Linas Laibinis, Elena Troubitsyna, Kimmo Varpaaniemi, Timo Latvala:
Deriving a mode logic using failure modes and effects analysis. 305-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.