Employing Dynamic Logic in Cybersecurity

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Employing a User-Centered Design Process for Cybersecurity Awareness in the Power Grid

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping role...

متن کامل

General Dynamic Dynamic Logic

Dynamic epistemic logic (DEL) extends purely modal epistemic logic (S5) by adding dynamic operators that change the model structure. Propositional dynamic logic (PDL) extends basic modal logic with programs that allow the definition of complex modalities. We provide a common generalisation: a logic that is ‘dynamic’ in both senses, and one that is not limited to S5 as its modal base. It also in...

متن کامل

Employing fuzzy logic in the diagnosis of a clinical case

Fuzzy logic is a logical calculus which operates with many truth values (while classical logic works with the two values of true and false). Since fuzzy logic considers the truth of scientific statements like something softened, it is fruitfully applied to the study of biological phenomena, biology is indeed considered the field of complexity, uncertainty and vagueness. In this paper fuzzy logi...

متن کامل

Dynamic Frames in Java Dynamic Logic

In this paper we present a realisation of the concept of dynamic frames in a dynamic logic for verifying Java programs. This is achieved by treating sets of heap locations as first class citizens in the logic. Syntax and formal semantics of the logic are presented, along with sound proof rules for modularly reasoning about method calls and heap dependent symbols using specification contracts.

متن کامل

Linking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism

To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Technology Education: Discussion Cases

سال: 2017

ISSN: 2166-1316,2166-1324

DOI: 10.28945/3927