Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

service unavailable

biblio

Visible to the public Resource-Bounded Intruders in Denial of Service Attacks

Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
  • refined intruder model
  • powerful intruders
  • privacy
  • protocol execution
  • protocol theories
  • protocol verification
  • Protocols
  • PSPACE-complete
  • pubcrawl
  • reachability analysis
  • real-time systems
  • policy-based governance
  • resource-bounded intruders
  • rewriting modulo SMT
  • rewriting systems
  • serious security concern
  • Servers
  • service resource usage
  • service unavailable
  • tools
  • unlimited resources
  • Denial of Service attacks
  • Analytical models
  • Bandwidth
  • collaboration
  • complexity
  • composability
  • Compositionality
  • computational complexity
  • Computer crime
  • computer network security
  • DDoS
  • amplification DoS attacks
  • Dolev-Yao intruder
  • DoS problem
  • existing resource-conscious protocol verification models
  • formal methods
  • formal protocol verification
  • Formal Specification
  • formal verification
  • formal verification model
  • Policy Based Governance

Terms of Use  |  ©2023. CPS-VO