Order:
  1.  29
    Decidability and incompleteness results for first-order temporal logics of linear time.Stephan Merz - 1992 - Journal of Applied Non-Classical Logics 2 (2):139-156.
    ABSTRACT The question of axiomatizability of first-order temporal logics is studied w.r.t. different semantics and several restrictions on the language. The validity problem for logics admitting flexible interpretations of the predicate symbols or allowing at least binary predicate symbols is shown to be ?1 1-complete. In contrast, it is decidable for temporal logics with rigid monadic predicate symbols but without function symbols and identity.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  2.  67
    Model checking techniqes for the analysis of reactive systems.Stephan Merz - 2002 - Synthese 133 (1-2):173 - 201.
    Model checking is a widely used technique that aids in the designand debugging of reactive systems. This paper gives an overview onthe theory and algorithms used for model checking, with a biastowards automata-theoretic approaches and linear-time temporallogic. We also describe elementary abstraction techniques useful forlarge systems that cannot be directly handled by model checking.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  3.  3
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This chapter describes an (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark