Ritsuya Ikeda, Kensuke Narita, and Shin-ya Nishizaki
[1] R. Milner, J. Parrow, and D. Walker, A calculus for mobileprocesses, Part I and Part II. Information and Computation,100 (1) 1992, 1–77. [2] D. Sangiorgi and D. Walker, The Pi-calculus: A theory ofmobile processes (Cambridge University Press, 2004). [3] M. Abadi and A.D. Gordon, A calculus for crypto-graphicprotocols: The spi calculus. Fourth ACM Conf. on Computerand Communications Security (ACM Press: New York, NY,USA, 1997), 36–47. [4] C. Meadows, A cost-based framework for analysis of denial-of-service in networks. Journal of Computer Security, 9 (1/2),2001, 143–164. [5] D. Tomioka, S. Nishizaki, and R. Ikeda, A cost estimationcalculus for analyzing the resistance to denial-of-service attack,in Software security – theories and systems, lecture notes incomputer science, 3233 (Springer: New York, NY, USA, 2004),25–44. [6] G.J. Holzmann, The spin model checker – primer and referencemanual (Addison-Wesley: Boston, MA, USA, 2004). [7] T. Issariyakul and E. Hossain, Introduction to network simu-lator NS2 (Springer: New York, NY, USA, 2008). [8] I. Cervesato, Fine-grained MSR specifications for quantitativesecurity analysis. Fourth Workshop on Issues in the Theory ofSecurity, WITS’04, Barcelona, Spain, 3–4 April, 2004. [9] J. Haggerty, T. Berry, Q. Shi, and M. Meabti, DiDDeM: Asystem for early detection of TCP SYN flood attacks, GlobalTelecommunications Conf. 2004, GLOBECOM ’04, IEEE,2004. [10] R. Ikeda, N. Narita, and S. Nishizaki, Cooperative approachto qualitative and quantitative cost analyses of distributedsystems. Proc. 13th IASTED International Conference onSoftware Engineering and Applications (SEA), Cambridge,MA, 2009, 126–132.
Important Links:
Go Back