Results 1 to 10 of about 34,882,646 (291)
The HACMS program: using formal methods to eliminate exploitable bugs. [PDF]
For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful.
Fisher K, Launchbury J, Richards R.
europepmc +2 more sources
Formal methods encompass a wide choice of techniques and tools for the specification, development, analysis, and verification of software and hardware systems. Formal methods are widely applied in industry, in activities ranging from the elicitation of requirements and the early design phases all the way to the deployment, configuration, and runtime ...
Maurice H. ter Beek +14 more
openaire +3 more sources
A Survey of Practical Formal Methods for Security [PDF]
In today’s world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the functionality of these systems.
T. Kulik +6 more
semanticscholar +1 more source
Formal Methods in Railways: A Systematic Mapping Study [PDF]
Formal methods are mathematically based techniques for the rigorous development of software-intensive systems. The railway signaling domain is a field in which formal methods have traditionally been applied, with several success stories.
Alessio Ferrari, M. T. Beek
semanticscholar +1 more source
A Threat Model for Vehicular Fog Computing
Vehicular Fog Computing (VFC) facilitates the deployment of distributed, latency-aware services, residing between smart vehicles and cloud services. However, VFC systems are exposed to manifold security threats, putting human life at risk.
Timo Klein +5 more
doaj +1 more source
We provide a review of recent work on formal methods for autonomous driving. Formal methods have been traditionally used to specify and verify the behavior of computer programs and digital circuits. Enabled by abstraction techniques for dynamical systems
N. Mehdipour +3 more
semanticscholar +1 more source
This paper directly addresses a long-standing issue that affects the development of many complex distributed software systems: how to establish quickly, cheaply, and reliably whether they can deliver their intended performance before expending ...
Seyed Hossein Haeri +5 more
doaj +1 more source
How detection ranges and usage stops impact digital contact tracing effectiveness for COVID-19
To combat the COVID-19 pandemic, many countries around the globe have adopted digital contact tracing apps. Various technologies exist to trace contacts that are potentially prone to different types of tracing errors.
Konstantin D. Pandl +3 more
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
ASTESIANO, EGIDIO, REGGIO, GIANNA
openaire +3 more sources

