31 results on '"Fallah, Mehran S."'
Search Results
2. S-Restricted Compositions Revisited
3. Run-Time Verification for Observational Determinism Using Dynamic Program Slicing
4. On transparent value-sensitive run-time monitoring for information flow policies
5. Specification and static enforcement of scheduler-independent noninterference in a middleweight Java
6. Is Cryptyc Able to Detect Insider Attacks?
7. Noninterference in a predicative polymorphic calculus for access control
8. A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
9. On the Properties of Epistemic and Temporal Epistemic Logics of Authentication
10. A Reactive Defense Against Bandwidth Attacks Using Learning Automata
11. A Bayesian Game of Whitewashing in Reputation Systems
12. Static Checking for Multiple Start of Threads in a Type-Safe Multithreaded Java.
13. A Reactive Defense Against Bandwidth Attacks Using Learning Automata.
14. Designing programmable parallel LFSR using parallel prefix trees.
15. A Type System for Quantified Information-Flow Security in Java-Like Languages
16. How Powerful Are Run-Time Monitors with Static Information?
17. Automated type-based analysis of injective agreement in the presence of compromised principals
18. A nonmonotonic modal authorization logic for pervasive computing
19. Typing secure implementation of authentication protocols in environments with compromised principals
20. TDPF: a traceback‐based distributed packet filter to mitigate spoofed DDoS attacks
21. A distributed client-puzzle mechanism to mitigate bandwidth attacks
22. Reconstructing security types for automated policy enforcement in FABLE
23. A nonmonotonic modal authorization logic for pervasive computing.
24. A logical view of nonmonotonicity in access control.
25. Stimulating Cooperation in MANETs Using Game Theory.
26. Typing secure implementation of authentication protocols in environments with compromised principals.
27. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks.
28. A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs.
29. A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory.
30. A Game-theoretic Cooperation Stimulus Routing Protocol in MANETs.
31. A Framework for the Analysis of Denial of Service Attacks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.