Search Results

There are 15660 results for: content related to: Synthesis of attack actions using model checking for the verification of security protocols

  1. Branch-cut-price algorithms for solving a class of search problems on general graphs

    Networks

    Z. Caner Taşkin and J. Cole Smith

    Version of Record online : 17 MAR 2017, DOI: 10.1002/net.21740

  2. Surveillance using non-stealthy sensors: A new intruder model

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1900–1911, Amitabha Bagchi, Rajshekar Kalayappan and Surabhi Sankhla

    Version of Record online : 28 NOV 2013, DOI: 10.1002/sec.904

  3. The effects of fly-bys on planetary systems

    Monthly Notices of the Royal Astronomical Society

    Volume 411, Issue 2, February 2011, Pages: 859–877, Daniel Malmberg, Melvyn B. Davies and Douglas C. Heggie

    Version of Record online : 29 NOV 2010, DOI: 10.1111/j.1365-2966.2010.17730.x

  4. On the optimal detection of an underwater intruder in a channel using unmanned underwater vehicles

    Naval Research Logistics (NRL)

    Volume 58, Issue 8, December 2011, Pages: 804–820, Hoam Chung, Elijah Polak, Johannes O. Royset and Shankar Sastry

    Version of Record online : 24 OCT 2011, DOI: 10.1002/nav.20487

  5. A security enhanced authentication and key distribution protocol for wireless networks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 343–352, Chao Lv, Maode Ma, Hui Li, Jianfeng Ma and Ben Niu

    Version of Record online : 8 APR 2011, DOI: 10.1002/sec.312

  6. Time-assisted authentication protocol

    International Journal of Communication Systems

    Muhammad Bilal and Shin-Gak Kang

    Version of Record online : 6 APR 2017, DOI: 10.1002/dac.3309

  7. Statistical Disclosure Risk: Separating Potential and Harm

    International Statistical Review

    Volume 80, Issue 3, December 2012, Pages: 349–368, Chris Skinner

    Version of Record online : 21 NOV 2012, DOI: 10.1111/j.1751-5823.2012.00194.x

  8. Complete set of solutions of the generalized Bloch equation

    International Journal of Quantum Chemistry

    Volume 80, Issue 4-5, 2000, Pages: 757–781, K. Kowalski and P. Piecuch

    Version of Record online : 20 OCT 2000, DOI: 10.1002/1097-461X(2000)80:4/5<757::AID-QUA25>3.0.CO;2-A

  9. Fine Individual Specialization and Elitism among Workers of the Ant Ectatomma tuberculatum for a Highly Specific Task: Intruder Removal

    Ethology

    Volume 120, Issue 12, December 2014, Pages: 1185–1198, Franklin H. Rocha, Jean-Paul Lachaud, Javier Valle-Mora and Gabriela Pérez-Lachaud

    Version of Record online : 11 AUG 2014, DOI: 10.1111/eth.12291

  10. A novel sine-curve mobility model for intrusion detection in wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 13, Issue 17, 10 December 2013, Pages: 1555–1570, Yun Wang, Yoon Kah Leow and Jun Yin

    Version of Record online : 10 NOV 2011, DOI: 10.1002/wcm.1202

  11. Sickness and Aggressive Behavior in Dominant and Subordinate Mice

    Ethology

    Volume 115, Issue 2, February 2009, Pages: 112–121, Daniel W. H. Cohn and Luiz C. De Sá-Rocha

    Version of Record online : 16 JAN 2009, DOI: 10.1111/j.1439-0310.2008.01608.x

  12. Vibration-mediated territoriality in the warty birch caterpillar Drepana bilineata

    Physiological Entomology

    Volume 33, Issue 3, September 2008, Pages: 238–250, JACLYN L. BOWEN, 1 SHANNON J. MAHONY, 1 ANDREW C. MASON and 2 JAYNE E. YACK 1

    Version of Record online : 29 AUG 2008, DOI: 10.1111/j.1365-3032.2008.00627.x

  13. The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

    Journal of the Royal Statistical Society: Series A (Statistics in Society)

    Volume 170, Issue 1, January 2007, Pages: 195–212, C. J. Skinner

    Version of Record online : 21 DEC 2006, DOI: 10.1111/j.1467-985X.2006.00457.x

  14. Growth hormone affects behaviour of wild brown trout Salmo trutta in territorial owner–intruder conflicts

    Journal of Fish Biology

    Volume 73, Issue 10, December 2008, Pages: 2341–2351, L. Neregård, L. Sundt-Hansen, B. Th. Björnsson and J. I. Johnsson

    Version of Record online : 16 DEC 2008, DOI: 10.1111/j.1095-8649.2008.02082.x

  15. You have free access to this content
    Decreased aggression and increased repetitive behavior in Pten haploinsufficient mice

    Genes, Brain and Behavior

    Volume 14, Issue 2, February 2015, Pages: 145–157, A. E. Clipperton-Allen and D. T. Page

    Version of Record online : 10 FEB 2015, DOI: 10.1111/gbb.12192

  16. Latent Variables Affecting Behavioral Response to the Human Intruder Test in Infant Rhesus Macaques (Macaca mulatta)

    American Journal of Primatology

    Volume 75, Issue 4, April 2013, Pages: 314–323, DANIEL H. GOTTLIEB and JOHN P. CAPITANIO

    Version of Record online : 10 DEC 2012, DOI: 10.1002/ajp.22107

  17. A formal analysis of authentication protocols for mobile devices in next generation networks

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 12, 25 August 2015, Pages: 2938–2953, Mahdi Aiash

    Version of Record online : 18 MAR 2014, DOI: 10.1002/cpe.3260

  18. You have free access to this content
    The evolution of respect for property

    Journal of Evolutionary Biology

    Volume 28, Issue 6, June 2015, Pages: 1185–1202, T. N. Sherratt and M. Mesterton-Gibbons

    Version of Record online : 8 MAY 2015, DOI: 10.1111/jeb.12648

  19. You have free access to this content
    Genetic influences on behavioral inhibition and anxiety in juvenile rhesus macaques

    Genes, Brain and Behavior

    Volume 7, Issue 4, June 2008, Pages: 463–469, J. Rogers, S. E. Shelton, W. Shelledy, R. Garcia and N. H. Kalin

    Version of Record online : 27 NOV 2007, DOI: 10.1111/j.1601-183X.2007.00381.x

  20. The brazilian nut effect by void filling: an analytic model

    Complexity

    Volume 16, Issue 5, May/June 2011, Pages: 9–16, Junius André F. Balista, Dranreb Earl O. Juanico and Caesar A. Saloma

    Version of Record online : 31 AUG 2010, DOI: 10.1002/cplx.20345