Employing Dynamic Logic in Cybersecurity
نویسندگان
چکیده
منابع مشابه
Employing a User-Centered Design Process for Cybersecurity Awareness in the Power Grid
In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping role...
متن کاملGeneral Dynamic Dynamic Logic
Dynamic epistemic logic (DEL) extends purely modal epistemic logic (S5) by adding dynamic operators that change the model structure. Propositional dynamic logic (PDL) extends basic modal logic with programs that allow the definition of complex modalities. We provide a common generalisation: a logic that is ‘dynamic’ in both senses, and one that is not limited to S5 as its modal base. It also in...
متن کاملEmploying fuzzy logic in the diagnosis of a clinical case
Fuzzy logic is a logical calculus which operates with many truth values (while classical logic works with the two values of true and false). Since fuzzy logic considers the truth of scientific statements like something softened, it is fruitfully applied to the study of biological phenomena, biology is indeed considered the field of complexity, uncertainty and vagueness. In this paper fuzzy logi...
متن کاملDynamic Frames in Java Dynamic Logic
In this paper we present a realisation of the concept of dynamic frames in a dynamic logic for verifying Java programs. This is achieved by treating sets of heap locations as first class citizens in the logic. Syntax and formal semantics of the logic are presented, along with sound proof rules for modularly reasoning about method calls and heap dependent symbols using specification contracts.
متن کاملLinking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism
To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Technology Education: Discussion Cases
سال: 2017
ISSN: 2166-1316,2166-1324
DOI: 10.28945/3927