↓ Skip to main content

Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs

Overview of attention for book
Cover of 'Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Formal Verification of Liferay RBAC
  3. Altmetric Badge
    Chapter 2 Formal Verification of Privacy Properties in Electric Vehicle Charging
  4. Altmetric Badge
    Chapter 3 Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs
  5. Altmetric Badge
    Chapter 4 Idea: State-Continuous Transfer of State in Protected-Module Architectures
  6. Altmetric Badge
    Chapter 5 Are Your Training Datasets Yet Relevant?
  7. Altmetric Badge
    Chapter 6 Learning How to Prevent Return-Oriented Programming Efficiently
  8. Altmetric Badge
    Chapter 7 Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores
  9. Altmetric Badge
    Chapter 8 Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints
  10. Altmetric Badge
    Chapter 9 Idea: Towards an Inverted Cloud
  11. Altmetric Badge
    Chapter 10 OMEN: Faster Password Guessing Using an Ordered Markov Enumerator
  12. Altmetric Badge
    Chapter 11 The Heavy Tails of Vulnerability Exploitation
  13. Altmetric Badge
    Chapter 12 Idea: Benchmarking Indistinguishability Obfuscation – A Candidate Implementation
  14. Altmetric Badge
    Chapter 13 A Security Ontology for Security Requirements Elicitation
  15. Altmetric Badge
    Chapter 14 Producing Hook Placements to Enforce Expected Access Control Policies
  16. Altmetric Badge
    Chapter 15 Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates
  17. Altmetric Badge
    Chapter 16 Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study
Attention for Chapter 11: The Heavy Tails of Vulnerability Exploitation
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
22 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
The Heavy Tails of Vulnerability Exploitation
Chapter number 11
Book title
Engineering Secure Software and Systems
Published by
Springer, Cham, March 2015
DOI 10.1007/978-3-319-15618-7_11
Book ISBNs
978-3-31-915617-0, 978-3-31-915618-7
Authors

Luca Allodi, Allodi, Luca

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 22 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 22 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 36%
Researcher 3 14%
Other 2 9%
Student > Master 2 9%
Student > Doctoral Student 1 5%
Other 2 9%
Unknown 4 18%
Readers by discipline Count As %
Computer Science 14 64%
Biochemistry, Genetics and Molecular Biology 1 5%
Social Sciences 1 5%
Engineering 1 5%
Unknown 5 23%