Comparing formal models of IoT app coordination analysis

Clay Stevens, Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (SciVal)
    Original languageEnglish
    Title of host publicationSEAD 2020 - Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment, Co-located with ESEC/FSE 2020
    EditorsMatthias Galster, Mehdi Mirakhorli, Laurie Williams
    PublisherAssociation for Computing Machinery
    Pages3-10
    Number of pages8
    ISBN (Electronic)9781450381260
    DOIs
    Publication statusPublished (VoR) - 9 Nov 2020
    Event3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment, SEAD 2020, co-located with the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2020 - Virtual, Online, United States
    Duration: 9 Nov 2020 → …

    Publication series

    NameSEAD 2020 - Proceedings of the 3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment, Co-located with ESEC/FSE 2020

    Conference

    Conference3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment, SEAD 2020, co-located with the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2020
    Country/TerritoryUnited States
    CityVirtual, Online
    Period9/11/20 → …

    Keywords

    • Coordination Threats
    • Formal Verification
    • IoT Safety

    Fingerprint

    Dive into the research topics of 'Comparing formal models of IoT app coordination analysis'. Together they form a unique fingerprint.

    Cite this