Results 11 to 20 of about 580,783 (342)

Formal verification for a PMQTT protocol

open access: yesEgyptian Informatics Journal, 2020
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam   +3 more
doaj   +1 more source

FIVER – Robust Verification of Countermeasures against Fault Injections

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algorithms. Over the last two decades, researchers proposed a plethora of countermeasures to secure such implementations.
Jan Richter-Brockmann   +4 more
doaj   +1 more source

Context-aware approach for formal verification

open access: yesEAI Endorsed Transactions on Context-aware Systems and Applications, 2016
The Context-aware approach has proven to be an effective technique for software model-checking verification. It focuses on the explicit modelling of environment as one or more contexts.
Amel Benabbou   +2 more
doaj   +1 more source

From Event-B models to Dafny code contracts [PDF]

open access: yes, 2015
International audienceThe constructive approach to software correctness aims at formal modelling and verification of the structure and behaviour of a system in different levels of abstraction. In contrast, the analytical approach to software verification
C.A.R. Hoare   +11 more
core   +1 more source

A Specification-Based Semi-Formal Functional Verification Method by a Stage Transition Graph Model

open access: yesIEEE Access, 2019
The semi-formal verification method, in which the functionality is formally specified and the checking is undertaken through the formal model-based simulation, has been a promising choice for the functional verification of hardware designs.
Zhao Lv   +3 more
doaj   +1 more source

Formal Verification of a Hybrid IoT Operating System Model

open access: yesIEEE Access, 2021
The Internet of Things (IoT) is becoming an increasingly common paradigm. As IoT usage scenarios have increased, many challenges in IoT operating systems’ safety and adaptability have remained.
Yuqian Guan, Jian Guo, Qin Li
doaj   +1 more source

SMACS: A framework for formal verification of complex adaptive systems

open access: yesOpen Computer Science, 2023
Self-adaptive systems (SASs) have the capability to evaluate and change their behavior according to changes occurring in the environment. Research in this field is being held since mid-60, and over the last decade, the importance of self-adaptivity is ...
Fakhir Ilyas   +3 more
doaj   +1 more source

Towards automatic Maude specifications generation from C functions

open access: yesJournal of Innovation Information Technology and Application, 2023
In this paper, we aim to contribute to the knowledge about how imperative C functions can be transformed to Maude functional and system modules respectively.
fateh boutekkouk
doaj   +1 more source

USABILITY REQUIREMENT OF FORMAL VERIFICATION TOOLS

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2012
Formal notations employ mathematical symbols and interpretation to illustrate system elements. The formality imposed by the notations allows the accuracy and consistency of a system model to be confirmed by verification tools. Formal notations on
Rozilawati Razali, Paul Garratt
doaj   +1 more source

A Modeling Strategy for the Verification of Context-Oriented Chatbot Conversational Flows via Model Checking [PDF]

open access: yesJournal of Universal Computer Science, 2023
Verification of chatbot conversational flows is paramount to capturing and understanding chatbot behavior and predicting problems that would cause the entire flow to be restructured from scratch.
Geovana Ramos Sousa Silva   +2 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy