![]() | Up a level |
Ammar, I., El Touati, Y., Yeddes, M., & Mullins, J. (2021). Bounded opacity for timed systems. Journal of Information Security and Applications, 61, 13 pages. External link
Ammar, I., El Touati, Y., Mullins, J., & Yeddes, M. (2021). Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language. International Journal of Foundations of Computer Science, 32(2), 175-202. External link
Hadj-Alouane Nejib, B. E. N., Lafrance, S., Feng, L. I. N., Mullins, J., & Yeddes, M. (2005). Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Transactions on Automatic Control, 50(6), 920-925. External link
Lauer, M., Mullins, J., & Yeddes, M. (2013, July). Cost optimization strategy for iterative integration of multi-critical functions in IMA and TTethernet architecture [Paper]. 37th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2013), Kyoto, Japan. External link
Mullins, J., & Yeddes, M. (2014, May). Opacity with Orwellian observers and intransitive non-interference [Paper]. 12th IFAC/IEEE Workshop on Discrete Event Systems (WODES 2014), Cachan, France. External link
Yeddes, M., Alla, H., & Mullins, J. (2002). Analyse structurelle d'un fonctionnement séquentiel. Journal Européen des Systèmes Automatisés, 36(8), 1101-1118. Unavailable