Formal Modeling and Security Analysis of Security Protocols

P Modesti, R Garcia - … of Formal Analysis and Verification in …, 2023 - taylorfrancis.com
Security protocols are critical components for the construction of secure Internet services but
their design and implementation are difficult and error prone. Formal modeling and …

Evaluating the Effectiveness of Online Cybersecurity Program in Higher Education

M Salem, K Samara, J Pray… - 2024 IEEE Global …, 2024 - ieeexplore.ieee.org
There is a rapid growth of online cybersecurity programs in higher education and the
increased acceptance of online degrees among students has invigorated higher education …

[HTML][HTML] Automatic generation of security protocols attacks specifications and implementations

R Garcia, P Modesti - Cyber Security and Applications, 2024 - Elsevier
Confidence in a communication protocol's security is a key requirement for its deployment
and long-term maintenance. Checking if a vulnerability exists and is exploitable requires …

Identify and rank the key factors affecting the value acquisition based on the innovation economy in information technology knowledge-based companies

A Aliabadian, A Khamseh… - Program and …, 2023 - journaldfrc.ir
Today, the economy of innovation based on knowledge as an important and vital factor, has
attracted the attention of businesses for value acquisition and a sustainable competitive …

A System Model of Value Acquisition Based on Innovative Economics in Knowledge-Based Businesses in the Field of Information Technology

A Aliabadian, A Khamseh, A Zamani Moghadam… - Management and …, 2022 - jmdp.ir
Purpose: This study aims to present a systems model of Value Acquisition based on
innovation economics in knowledge-based businesses in the field of information technology …