Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Tarasyuk, O.M., and A.V. Gorbenko. "For Methods for Development of Critical Software." In Lecture Materials. Kharkiv: National Aerospace University Institute “KhAI”, 2009. Website of the System Programming Department. Khmelnytskyi National University., 2016. Monin, Jean François, and Michael G. Hinchey. Understanding Formal Methods. Springer, 2003. Romanovsky, Alexander. "Deployment of Formal Methods in Industry: the Legacy of the FP7 ICT DEPLOY Integrated Project." ACM SIGSOFT Software Engineering Notes 37, no. 5 (2012): 1-4. Almeida, José Bacelar, Maria João Frade, Jorge Sousa Pinto, and Simão Melo de Sousa. "An Overview of Formal Methods Tools and Techniques." In Rigorous Software Development: An Introduction to Program Verification, 15-44. London, 2011. Hinchey, Michael G., Jonathan P. Bowen, and Emil Vassev. "Formal Methods." In Encyclopedia of Software Engineering, ed. Philip A. Laplante, 308-320. Taylor & Francis, 2010. Laprie, Jean-Claude. "From Dependability to Resilience." In 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Anchorage, USA, 2008. Neches, Robert. Engineered Resilient Systems (ERS). S&T Priority Description and Roadmap, 2011. Reder, Leonard, John Day, Mitch Ingham, Richard Murray, and Brian Williams. Engineering Resilient Space Systems: Introduction to Short Course. Pasadena, CA: Keck Institute for Space Studies, 2012. Tyugu, Enn. Artificial Intelligence in Cyber Defense In Proceedings of the Third International Conference on Cyber Conflict, ed. C. Czosseck, E. Tyugu, T. Wingfield. Tallinn: CCD COE, 2011. Bitter, Christian, David A. Elizondo, and Tim Watson. "Application of Artificial Neural Networks and Related Techniques to Intrusion Detection." In The 2010 International Joint Conference on Neural Networks (IJCNN)., 2010. Wing, Jeannette M.. A Symbiotic Relationship Between Formal Methods and Security In Computer Security, Dependability and Assurance: From Needs to Solutions, Proceedings. IEEE, 1998. Mansour, Riham Hassan Abd. Formal Analysis and Design for Engineering Security (FADES). Vol. PhD Dissertation. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2009. Nakagawa, Hiroyuki, Kenji Taguchi, and Shinichi Honiden. Formal Specification Generator for KAOS: Model Transformation Approach to Generate Formal Specifications from KAOS Requirements Models In Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering. Atlanta, GA, 2007. Schneider, Steve. The B-Method: An Introduction. Basingstoke, UK: Palgrave, 2001. van Lamsweerde, A.. Elaborating Security Requirements by Construction of Intentional Anti-Models In Proceedings of the 26th International Conference on Software Engineering, ICSE 2004., 2004. Dai, Lirong, and Kendra Cooper. "A Survey of Modelling and Analysis Approaches for Architecting Secure Software Systems." International Journal of Network Security 5, no. 2 (2007): 187-198. Heitmeyer, Constance L., Myla M. Archer, Elizabeth I. Leonard, and John D. McLean. "Applying Formal Methods to a Certifiably Secure Software System." IEEE Transactions on Software Engineering 34, no. 1 (8): 82-97. Heitmeyer, Constance, Myla Archer, Ramesh Bharadwaj, and Ralph Jeffords. "Tools for Constructing Requirements Specifications: The SCR Toolset at the Age of Ten." Computer Systems Science & Engineering 20, no. 1 (2005): 19-35. Older, Susan, and Shiu-Kai Chin. "Formal Methods of Assuring Security of Protocols." The Computer Journal 45, no. 1 (2002): 46-54. Mossakowski, Till, and Markus Roggenbach. Structured CSP – A Process Algebra as an Institution In Recent Trends in Algebraic Development Techniques. Berlin, Heidelberg: Springer, 2007. Madeira, Pedro Miguel dos. Formal Methods for the Analysis of Security Protocols. Vol. PhD Dissertation. Lisbon: Instituto Superior Tėcnico, Universidade Tecnica de Lisboa, 2006. Blanchet, Bruno. "Using Horn Clauses for Analyzing Security Protocols." In Formal Models and Techniques for Analyzing Security Protocols, 86-111. Amsterdam: IOS Press, 2011. Arsac, Wihem, Giampaolo Bella, Xavier Chantry, and Luca Compagna. "Validating Security Protocols under the General Attacker." In Foundations and Applications of Security Analysis, 33-51. Berlin, Heidelberg: Springer, 2009. Armando, Alessandro, D.A. Basin, and Y. Boichut. "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications." In International Conference on Computer Aided Verification CAV 2005. Heidelberg: Springer, 2005. Pages« първа ‹ предишна … 209 210 211 212 213 214 215 216 217 … следваща › последна »