LEADER 03871nam 22006015 450 001 996465884403316 005 20230405233849.0 024 7 $a10.1007/11537328 035 $a(CKB)1000000000213174 035 $a(SSID)ssj0000318970 035 $a(PQKBManifestationID)11240032 035 $a(PQKBTitleCode)TC0000318970 035 $a(PQKBWorkID)10336290 035 $a(PQKB)11318861 035 $a(DE-He213)978-3-540-31899-6 035 $a(MiAaPQ)EBC3067914 035 $a(PPN)123096669 035 $a(EXLCZ)991000000000213174 100 $a20100723d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aModel Checking Software$b[electronic resource] $e12th International SPIN Workshop, San Francisco, CA, USA, August 22-24, 2005, Proceedings /$fedited by Patrick Godefroid 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 292 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v3639 300 $aAlso available on the Internet. 311 08$aPrinted edition: 9783540281955 320 $aIncludes bibliographical references. 327 $aInvited Talks/Papers -- Pushdown Model Checking for Security -- Execution Generated Test Cases: How to Make Systems Code Crash Itself -- Invited Tutorials -- Effective Bug Hunting with Spin and Modex -- The BLAST Software Verification System -- Model Checking Programs with Java PathFinder -- State Representation and Abstraction -- An Incremental Heap Canonicalization Algorithm -- Memory Efficient State Space Storage in Explicit Software Model Checking -- Counterexample-Based Refinement for a Boundedness Test for CFSM Languages -- Dealing with Concurrency -- Symbolic Model Checking for Asynchronous Boolean Programs -- Improving Spin?s Partial-Order Reduction for Breadth-First Search -- Sound Transaction-Based Reduction Without Cycle Detection -- Dealing with Complex Data -- Repairing Structurally Complex Data -- Crafting a Promela Front-End with Abstract Data Types to Mitigate the Sensitivity of (Compositional) Analysis to Implementation Choices -- Behavioural Models for Hierarchical Components -- Checking Temporal Properties -- On-the-Fly Emptiness Checks for Generalized Büchi Automata -- Stuttering Congruence for ? -- Verifying Pattern-Generated LTL Formulas: A Case Study -- Checking Security and Real-Time Properties -- Generic Verification of Security Protocols -- Using SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models -- Model Checking Machine Code with the GNU Debugger -- Tool Papers -- Etch: An Enhanced Type Checking Tool for Promela -- Enhanced Probabilistic Verification with 3Spin and 3Murphi -- SPLAT: A Tool for Model-Checking and Dynamically-Enforcing Abstractions -- Learning-Based Assume-Guarantee Verification (Tool Paper). 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v3639 606 $aSoftware engineering 606 $aCompilers (Computer programs) 606 $aComputer science 606 $aSoftware Engineering 606 $aCompilers and Interpreters 606 $aComputer Science Logic and Foundations of Programming 615 0$aSoftware engineering. 615 0$aCompilers (Computer programs). 615 0$aComputer science. 615 14$aSoftware Engineering. 615 24$aCompilers and Interpreters. 615 24$aComputer Science Logic and Foundations of Programming. 676 $a005.1/4 702 $aGodefroid$b Patrick$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 02$aLINK (Online service) 906 $aBOOK 912 $a996465884403316 996 $aModel Checking Software$9771961 997 $aUNISA LEADER 02738nam 2200493 450 001 9910806217203321 005 20240131143810.0 010 $a1-4438-9184-3 035 $a(CKB)3710000001365087 035 $a(MiAaPQ)EBC4857967 035 $a(Au-PeEL)EBL4857967 035 $a(CaPaEBR)ebr11384857 035 $a(CaONFJC)MIL1010069 035 $a(OCoLC)987251189 035 $a(FINmELB)ELB150396 035 $a(EXLCZ)993710000001365087 100 $a20170607h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aEurope's hybrid threats $ewhat kinds of power does the EU need in the 21st century? /$fedited by Giray Sadik 210 1$aNewcastle upon Tyne, England :$cCambridge Scholars Publishing,$d2017. 210 4$d©2017 215 $a1 online resource (123 p.) 311 $a1-4438-8179-1 320 $aIncludes bibliographical references 327 $aIntroduction: Hybrid Threats and European Security / Giray Sad?k -- War in Ukraine and European Security: Reset, Reverse or Revoke? / Maria Raquel Freire -- Hybrid Threats and Justice and Home Affairs: The Case of Migration Policy / Zeynep Arkan-Tuncel -- The Visible and Invisible Story of the European Migrant Crisis / Hélène Cristini and Claudio Lanza -- The Strategic Consequences of Brexit: The Challenges of the Common European Security and Defence Policy in the Post-Brexit Era / Filiz Çoban -- Turkey and the EU: The Challenges of the Middle Eastern Crises / K?vanç Ulusoy -- Conclusion: In Search of Hybrid Policy Implications / Giray Sad?k 330 $aHybrid threats posed by various combinations of state and non-state actors have presented considerable transnational challenges to EU-members and NATO-allies. This ongoing rise of hybrid threats, ranging from political instability in Eastern Europe and the Middle East to the resulting mass refugee influx and terrorism in the European neighborhood, stress the need to timely discuss important questions about hybrid threats and the venues for effective Euro-Atlantic cooperation, including post-Brexit policy implications. This edited volume presents comprehensive analyses from various experts. 606 $aSecurity, International 606 $aSecurity, International$xPolitical aspects$zEuropean Union countries 615 0$aSecurity, International. 615 0$aSecurity, International$xPolitical aspects 676 $a355.033 686 $a08.16$2EP-CLASS 702 $aSadik$b Giray 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910806217203321 996 $aEurope's hybrid threats$94107364 997 $aUNINA