과제정보
연구 과제 주관 기관 : 한국연구재단
참고문헌
- E. B. Fernandez, J. C. Pelaez, and M. M. Larrondo- Petrie, "Attack Patterns: A New Forensic and Design Tool," Proc. IFIP International Federation for Information Processing, Vol. 242, pp. 345-357, 2007.
- B. Schneier, Attack trees: Modeling security threats, Dr. Dobb's Journal, pp. 21-29, 1999.
- S. Woo, J. On, and M. Lee, "An Abstraction Method for Mobility and Interaction in Process Algebra Using Behavior Ontology," 2011 IEEE 35th Annual Computer Software and Applications Conference, pp. 128-133, 2011.
- W. Xing, O. Corcho, C. Goble, and M. Dikaiakos, "Active Ontology: An Information Integration Approach for Highly Dynamic Information Sources," The 4th European Semantic Web Conference, 2007.
-
R. Milner, Communicating and Mobile Systems: The
${\pi}$ -Calculus. Cambridge University Press, 1999. - J. On, "Onion: A Graphical Language for Process Algebra," 2011 IEEE 35th Annual Computer Software and Applications Conference, pp. 708-711, 2011.
- J. On, S. Woo, and M. Lee, "A Graphical Language to Integrate Process Algebra and State Machine Views for Specification and Verification of Distributed Real-Time Systems," 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, pp. 218-223, 2012.
- S. Lucks, "Open key exchange: How to defeat dictionary attacks without encryting public keys," The security Protocol Workshop, pp. 79-90, 1997.
- J. On, J. Choi, and M. Lee, "Visual Representation of Temporal Properties in Formal Specification and Analysis using a Spatial Process Algebra," The KIPS Transactions : Part D, Vol. 16D, Issue 3, pp. 339-352, Jun. 2009. (in Korean) https://doi.org/10.3745/KIPSTD.2009.16-D.3.339