Towards formal verification of IoT protocols: A Review

K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …

An efficient clustering strategy avoiding buffer overflow in IoT sensors: A bio-inspired based approach

R Hamidouche, Z Aliouat, AAA Ari, M Gueroui - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) invention has taken the growth of sensors technology to a
completely high step. New challenges in terms of data delivery have emerged due to strict …

Analyzing the impact of cyberattacks on industrial control systems using timed automata

A Jawad, J Jaskolka - 2021 IEEE 21st international conference …, 2021 - ieeexplore.ieee.org
Many of today's critical infrastructures, including industrial control systems (ICS), are
evolving with the integration of numerous connected cyber components with legacy systems …

Threat modelling and beyond-novel approaches to cyber secure the smart energy system

H Vallant, B Stojanović, J Božić, K Hofer-Schmitz - Applied Sciences, 2021 - mdpi.com
Smart Grids (SGs) represent electrical power systems that incorporate increased information
processing and efficient technological solutions. The integration of local prosumers, demand …

Implementation of automation system-based model checking for managing imperfect maintenance actions in chemical plant projects

ZA Ismail - Industrial Management & Data Systems, 2023 - emerald.com
Purpose The chemical plant (CP) maintenance industry has been under increasing pressure
by process designers to demonstrate its evaluation and information management of model …

Robust financial fraud alerting system based in the cloud environment

B Stojanović, J Božić - Sensors, 2022 - mdpi.com
The digitalisation of finance influenced the emergence of new technological concepts for
existing user needs. Financial technology, or fintech, provides improved services for …

Safety verification of multiple industrial robot manipulators with path conflicts using model checking

M Ozkan, Z Demirci, Ö Aslan, A Yazıcı - Machines, 2023 - mdpi.com
Software development for robotic systems is traditionally performed based on simulations,
manual code implementation, and testing. However, this software development approach …

Enhancing Expressiveness in Stochastic Modelling of Cyber-Physical Systems

R Metere, RM Czekster… - 2024 13th Mediterranean …, 2024 - ieeexplore.ieee.org
Cyber-physical systems (CPS) that exhibit stochastic behaviours and uncertainties can be
modelled in various formalisms, that can be analysed and validated by model-checking …

A cyberattack impact analysis approach for industrial control systems

A Jawad - 2022 - repository.library.carleton.ca
Many of today's critical infrastructures, including Industrial Control Systems (ICSs), are
evolving with the integration of numerous connected cyber components with legacy systems …

基于模型检测的硬件木马检测技术研究

张启智, 赵毅强, 高雅, 马浩诚 - 网络与信息安全学报, 2021 - infocomm-journal.com
硬件木马对原始电路的恶意篡改, 已成为集成电路面临的核心安全威胁. 为了保障集成电路的
安全可信, 研究人员提出了诸多硬件木马检测方法. 其中, 模型检测作为一种形式化验证方法 …