-
21
The Comparison of Tree-Sibling Time Consistent Phylogenetic Networks Is Graph Isomorphism-Complete
Published 2014-01-01Get full text
Article -
22
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
Published 2025-01-01“…The security of the session is rigorously evaluated using formal methods, including Scyther and the random or real model, alongside informal approaches. …”
Get full text
Article -
23
Ontologies in bioinformatics and systems biology
Published 2016-01-01“…Further formalization and ontological accumulation of knowledge and the use of formal methods of analysis can take the entire cycle of research in systems biology to a new technological level.…”
Get full text
Article -
24
External validation of AI-based scoring systems in the ICU: a systematic review and meta-analysis
Published 2025-01-01Get full text
Article -
25
THE FORMATION OF THE BUDGET OF THE TV COMPANY METHOD OF VALUATION OF COST OF PRODUCTION
Published 2017-04-01“…The necessity of applying formalized methods of evaluating labor and resource intensity of production of television programmes of various kinds. …”
Get full text
Article -
26
Formalization of Methods in Criminalistics
Published 2019-12-01“…Accordingly, the purpose of this article is to clarify the methods used to detect and investigate crimes and the possibilities of their formalization in criminalistics. Formalization methods in criminalistics have been considered. …”
Get full text
Article -
27
Novel mobile agent dynamic data integrity protection protocol
Published 2007-01-01“…Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.…”
Get full text
Article -
28
Research on formal security policy model specification and its formal analysis
Published 2006-01-01“…Formal method is one of the kernel technologies of developing high security level computer system.But by current formal development method,assurance of security policy model correctness cannot be provided directly using machine proof which is stricter than manual proof,correspondence between security policy model and security functional specification is also hard to achieve.To solve these problems,a new and effective method was proposed for specification constructing and proving by extending the specification technique of security functional specification into the specifica-tion of security policy model.Also,BLP model was specified and analyzed as an example.…”
Get full text
Article -
29
Research on a new network covert channel model in blockchain environment
Published 2019-05-01“…Blockchain is a decentralized architecture emerging with cryptocurrencies,which is credible and robust.A network covert channel model in blockchain environment was proposed for the first time,which was anti-interference,anti-tamper modification,multi-line communication,receiver anonymity and line independence.The shortcomings of network covert channel in existing network environment could be tackled by the new type of network covert channel,such as characteristic defect.etc.Firstly,A network covert channel model in blockchain environment was presented by formal method,its anti-interference and anti-tamper modification was proved.Then,a blockchain network covert channel scenario using service operation interval time was presented.Finally,the undetectability,robustness and rate of the blockchain network covert channel evaluation vectors was proposed.A theoretical foundation was laid for the practicality of the new type of network covert channel in blockchain.…”
Get full text
Article -
30
Verification of serialising instructions for security against transient execution attacks
Published 2023-07-01“…The authors provide a formal method solution that addresses the verification of lfence hardware implementation. …”
Get full text
Article -
31
Neighbor Session Solutions for Integrated Routing Protocols
Published 2024-12-01“…Colored Petri nets (CPNs) are selected as a formal method to create a model of each PISC. The following parts deal with a detailed description and analysis of the created Protocol Integration Solution Class models, which are also verified and compared with each other. …”
Get full text
Article -
32
Novel Web Service Selection Model Based on Discrete Group Search
Published 2014-01-01“…In our earlier work, we present a novel formal method for the semiautomatic verification of specifications and for describing web service composition components by using abstract concepts. …”
Get full text
Article -
33
Structural levels of the national economic system: management aspect
Published 2020-01-01“…The analysis has been carried out using general scientific methods: the method of abstraction, historical research methods; formalization method, reconstruction method; based on a systematic approach using the method of forecasting.…”
Get full text
Article -
34
Analysis and forecasting of pet food markets using extrapolation methods
Published 2024-06-01“…From the variety of formalized methods for forecasting the demand in pet food markets, the authors chose extrapolation methods, namely, methods of trend analysis and adaptive methods of exponential smoothing. …”
Get full text
Article