Filters








113 Hits in 8.3 sec

Table of Contents

2020 IEEE Transactions on Industrial Informatics  
Yang, and I.-B. Lee 7812 Automatic State Machine Reconstruction From Legacy Programmable Logic Controller Using Data Collection and SAT Solver . . . . . . . . . . . . . . . . . . . . . . . . D.  ...  Lotfifard 7264 A Secure Hybrid Dynamic-State Estimation Approach for Power Systems Under False Data Injection Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tii.2020.3022301 fatcat:7n2bzwx72bcencda27ey54zj6m

Guest Editorial: Emerging Technologies and Novel Trends in Industrial Informatics

Valeriy Vyatkin, Lucia Lo Bello, Thilo Sauter
2020 IEEE Transactions on Industrial Informatics  
The article "Automatic State Machine Reconstruction from Legacy PLC Using Data Collection and SAT Solver" [item 17) in the Appendix] by Chivilikhin et al. demonstrates how sophisticated formal methods  ...  This paper contributes to the systematic seamless transition by proposing a framework based on automatic synthesis methods that learns the behavior of an existing legacy programmable logic controller and  ... 
doi:10.1109/tii.2020.3007635 fatcat:feoxnzksyzdx7c32cmrqvdjzzq

Fifty Years of Prolog and Beyond [article]

Philipp Körner, Michael Leuschel, João Barbosa, Vítor Santos Costa, Verónica Dahl, Manuel V. Hermenegildo, Jose F. Morales, Jan Wielemaker, Daniel Diaz, Salvador Abreu, Giovanni Ciatto
2022 arXiv   pre-print
Both logic programming in general, and Prolog in particular, have a long and fascinating history, intermingled with that of many disciplines they inherited from or catalyzed.  ...  Often, the features added by different systems were motivated by the interdisciplinary needs of programmers and implementors, yielding systems that, while sharing the "classic" core language, and, in particular  ...  Warren, and Isabel Wingen for their input and fruitful discussions. They also thank Juan Emilio Miralles for proofreading.  ... 
arXiv:2201.10816v3 fatcat:grixngoazrdfjosno4zvnimsnq

Static Program Analysis for Security [chapter]

K Gopinath
2007 The Compiler Design Handbook  
We next discuss static analysis of buffer overflow and mobile code followed by access control.  ...  First, we discuss the background on what types of static analysis is feasible in principle and then move on to what is practical.  ...  It also reconstructs all possible secrets from the shares collected.  ... 
doi:10.1201/9781420043839.ch2 fatcat:254roq3ykrecfly3udo6o5xzva

D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

Panagiotis Rizomiliotis, Konstantinos Tserpes, Aikaterini Triakosia
2021 Zenodo  
This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4  ...  (Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in manufacturing  ...  ALES Scenario 2 -Controlled share of compliance data Compliance data is collected from the manufacturing process and is used to evaluate and testify on the quality of manufactured goods.  ... 
doi:10.5281/zenodo.5667012 fatcat:xgzhqfeq6nbwte4h256pntlkau

A Survey on Data Plane Programming with P4: Fundamentals, Advances, and Applied Research [article]

Frederik Hauser, Marco Häberle, Daniel Merling, Steffen Lindner, Vladimir Gurevich, Florian Zeiger, Reinhard Frank, Michael Menth
2021 arXiv   pre-print
software-defined networking (SDN) control.  ...  Programmable data planes allow users to define their own data plane algorithms for network devices including appropriate data plane application programming interfaces (APIs) which may be leveraged by user-defined  ...  It uses a pure data plane implementation to collect telemetry data from the network without any intervention by the control plane.  ... 
arXiv:2101.10632v3 fatcat:ci4hkca5ibdzpatgowhzqcqzvm

LiquidHaskell

Niki Vazou, Eric L. Seidel, Ranjit Jhala
2014 Proceedings of the 2014 ACM SIGPLAN symposium on Haskell - Haskell '14  
Moreover, it xvi uses the abstract interpretation framework of liquid types to automatically check correctness of specifications via Satisfiability Modulo Theories (SMT) solvers requiring no explicit proofs  ...  However, at its current state formal verification is a cumbersome process that is rarely used by mainstream developers, mostly because it targets non general purpose languages (e.g., Coq, Agda, Dafny).  ...  Acknowledgments The material of this chapter are adapted from the following publication: N. Vazou, E. Seidel, and R.  ... 
doi:10.1145/2633357.2633366 dblp:conf/haskell/VazouSJ14 fatcat:5mmk4inrc5cihk65wbrho4hbzy

LiquidHaskell

Niki Vazou, Eric L. Seidel, Ranjit Jhala
2014 SIGPLAN notices  
Moreover, it xvi uses the abstract interpretation framework of liquid types to automatically check correctness of specifications via Satisfiability Modulo Theories (SMT) solvers requiring no explicit proofs  ...  However, at its current state formal verification is a cumbersome process that is rarely used by mainstream developers, mostly because it targets non general purpose languages (e.g., Coq, Agda, Dafny).  ...  Acknowledgments The material of this chapter are adapted from the following publication: N. Vazou, E. Seidel, and R.  ... 
doi:10.1145/2775050.2633366 fatcat:tczruulo3fgepeddilt6fjgtpe

Automatic inference of specifications using matching logic

María Alpuente, Marco A. Feliú, Alicia Villanueva
2013 Proceedings of the ACM SIGPLAN 2013 workshop on Partial evaluation and program manipulation - PEPM '13  
Formal specifications can be used for various software engineering activities ranging from finding errors to documenting software and automatic test-case generation.  ...  In this paper, we propose a technique for automatically inferring formal specifications from C code which is based on the symbolic execution and automated reasoning tandem "MATCHING LOGIC / K framework  ...  [28] describe a system to extract component interfaces as finite state machines from execution traces.  ... 
doi:10.1145/2426890.2426914 dblp:conf/pepm/AlpuenteFV13 fatcat:grmx5hsqe5fmvp67melmbwyloe

D3.1 Final System Architecture, Programming Interfaces And Security Framework Specification

Carlos Parada, Francisco Fontes, Isabel Borges, Omer Gurewitz, Asaf Cohen, Philip Eardley, Andy Reid, Giuseppe Bianchi, Nicola Blefari Melazzi, Luca Chiaraviglio, Pierpaolo Loreti, Stefano Salsano (+23 others)
2018 Zenodo  
This deliverable provides the specification of the architecture, APIs and the security framework designed by the Superfluidity project.  ...  While solving simple cases like the one above is trivial, solving this problem in general is very difficult and we plan to use SAT-MAX solvers for this purpose (when given an unsatisfiable set of conditions  ...  While it is possible to collect an extensive range of telemetry data from platforms such as Collectd and SNAP, a 'collect everything' approach is inefficient and can negatively affect VNF performance in  ... 
doi:10.5281/zenodo.1230494 fatcat:sockptarwjhq7gciqicfzemm5i

Synthesis from Formal Partial Abstractions [article]

Hamid Bagheri
2014 arXiv   pre-print
This dissertation, in particular, explores the proposed approach using relational logic as expressed in Alloy as the general specification language, and the Alloy Analyzer as the general-purpose analyzer  ...  from such specifications.  ...  of an off-the-shelf constraint solver, such as a SAT or SMT Solver.  ... 
arXiv:1411.0481v1 fatcat:fi6qwflzlzdcvp35kfqky7wgru

Provably Secure Networks: Methodology and Toolset for Configuration Management [article]

Cornelius Diekmann
2017 arXiv   pre-print
Using the Isabelle interactive proof assistant, we develop two automated, formally verified tools which help uncovering and preventing bugs in network-level access control configurations.  ...  Our first tool guides the process of designing networks from scratch. Our second tool facilitates the analysis of existing iptables configurations. Combined, the two form a powerful toolset.  ...  Finally, I am also very grateful to my parents Annette and Hermann Diekmann who have supported me and always believed in me.  ... 
arXiv:1708.08228v1 fatcat:ljgwja2k6jgunl5g45jnptqx5m

Present State of CFD Softwares Application for Launch Vehicle Analysis
발사체 해석을 위한 CFD 소프트웨어 적용 현황

Hwanghui Jeong, Jae Yeol Kim, Jae-Ryul Shin
2020 Journal of the Korean Society of Propulsion Engineers  
This software program takes an XML representation of the contents of a Hierarchical Data Format-Earth Observing System (HDF-EOS) file and recreates the file from that description .  ...  of an observatory through state of health monitoring using all collected housekeeping data and (2) Dyper protects a site from unauthorized network flows .  ...  The technology has been used on the IKONOS, QuickBird, OrbView-3, and AWiFS satellite sensors .This NASA technology automatically generates code from UML/SysML state-machine models specified in the MagicDraw  ... 
doi:10.6108/kspe.2020.24.3.071 fatcat:trxkhiuqrjakll32bcjxskgwju

What has influenced computing innovation?

T.P. Hughes, J.R. Sheehan
1999 Computer  
Early developments As computing entered the commercial marketplace in the 1950s, a diversity of techniques emerged to simplify data access, ensure quality, maintain privacy, and let managers control data  ...  These lessons will be valuable input in shaping future government and industry policies. The report from CSTB (http://www.nap.edu/ readingroom/enter2.cgi?  ...  Acknowledgments This article is condensed from the CTSB report, whose authors were historians, technologists, and economists selected for their expertise in this subject area: Thomas Hughes, Gwen Bell,  ... 
doi:10.1109/2.745718 fatcat:oaqyxljxyjbc7b2qsv5oo4huhq

2020 Index IEEE Transactions on Industrial Informatics Vol. 16

2020 IEEE Transactions on Industrial Informatics  
Gharibeh, H.F., Fault Diagnosis in Photovoltaic Arrays Using GBSSL Method and Proposing a Fault Correction System; TII Aug. 2020 5300-5308  ...  Sun, D., Motion Planning and Robust Control for the Endovascular Navigation of a Microrobot; TII July 2020 4557-4566 Meng, Q., see Cai, H., TII Jan. 2020 587-594 Meng, Q., see Dong, H., TII Dec. 2020  ...  ., +, TII Jan. 2020 403-413 Automatic State Machine Reconstruction From Legacy Programmable Logic Controller Using Data Collection and SAT Solver.  ... 
doi:10.1109/tii.2021.3053362 fatcat:blfvdtsc3fdstnk6qoaazskd3i
« Previous Showing results 1 — 15 out of 113 results