From Lambda Calculus to Cybersecurity Through Program Analysis最新文献

筛选
英文 中文
New Program Abstractions for Privacy 隐私的新程序抽象
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 2020-02-15 DOI: 10.1007/978-3-030-41103-9_10
Sebastian Hunt, David Sands
{"title":"New Program Abstractions for Privacy","authors":"Sebastian Hunt, David Sands","doi":"10.1007/978-3-030-41103-9_10","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_10","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132997056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users 优化网络卫生投资以保护医疗保健用户
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 2020-01-11 DOI: 10.1007/978-3-030-41103-9_11
S. Panda, E. Panaousis, G. Loukas, C. Laoudias
{"title":"Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users","authors":"S. Panda, E. Panaousis, G. Loukas, C. Laoudias","doi":"10.1007/978-3-030-41103-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_11","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cables, Trains and Types 电缆,火车和类型
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-41103-9_1
S. Gay
{"title":"Cables, Trains and Types","authors":"S. Gay","doi":"10.1007/978-3-030-41103-9_1","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_1","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122110541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cathoristic Logic Cathoristic逻辑
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-41103-9_2
R. Evans, Martin Berger
{"title":"Cathoristic Logic","authors":"R. Evans, Martin Berger","doi":"10.1007/978-3-030-41103-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_2","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correctly Slicing Extended Finite State Machines 正确切片扩展有限状态机
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-41103-9_6
Torben Amtoft, K. Androutsopoulos, D. Clark
{"title":"Correctly Slicing Extended Finite State Machines","authors":"Torben Amtoft, K. Androutsopoulos, D. Clark","doi":"10.1007/978-3-030-41103-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_6","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling the Impact of Threat Intelligence on Advanced Persistent Threat Using Games 利用游戏模拟威胁情报对高级持续威胁的影响
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-41103-9_8
Andrew Fielder
{"title":"Modelling the Impact of Threat Intelligence on Advanced Persistent Threat Using Games","authors":"Andrew Fielder","doi":"10.1007/978-3-030-41103-9_8","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_8","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Metrics at Work on the Things in IoT Systems 物联网系统中工作的安全指标
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-41103-9_9
C. Bodei, P. Degano, G. Ferrari, Letterio Galletta
{"title":"Security Metrics at Work on the Things in IoT Systems","authors":"C. Bodei, P. Degano, G. Ferrari, Letterio Galletta","doi":"10.1007/978-3-030-41103-9_9","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_9","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117071014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Incremental Abstract Interpretation 增量抽象解释
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-41103-9_5
H. Seidl, Julian Erhard, Ralf Vogler
{"title":"Incremental Abstract Interpretation","authors":"H. Seidl, Julian Erhard, Ralf Vogler","doi":"10.1007/978-3-030-41103-9_5","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_5","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Galois Connections for Recursive Types 递归类型的伽罗瓦连接
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-41103-9_4
Ahmad Salim Al-Sibahi, T. Jensen, Rasmus Ejlers Møgelberg, A. Wąsowski
{"title":"Galois Connections for Recursive Types","authors":"Ahmad Salim Al-Sibahi, T. Jensen, Rasmus Ejlers Møgelberg, A. Wąsowski","doi":"10.1007/978-3-030-41103-9_4","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_4","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"938 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133648246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His Retirement 从Lambda演算到通过程序分析的网络安全-在Chris Hankin退休之际的文章
From Lambda Calculus to Cybersecurity Through Program Analysis Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-41103-9
{"title":"From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His Retirement","authors":"","doi":"10.1007/978-3-030-41103-9","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信