Jason Jaskolka
Cited by
Cited by
Exploring covert channels
J Jaskolka, R Khedri
44th Hawaii International Conference on System Sciences (HICSS),, 1-10, 2011
Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support
Q Rouland, B Hamid, J Jaskolka
Journal of Systems Architecture 117, 102073, 2021
Formal specification and verification of reusable communication models for distributed systems architecture
Q Rouland, B Hamid, J Jaskolka
Future Generation Computer Systems 108, 178-197, 2020
Software Engineering for Model-Based Development by Domain Experts
M Bialy, V Pantelic, J Jaskolka, A Schaap, LM Patcas, M Lawford, ...
Handbook of System Safety and Security: Cyber Risk and Risk Management …, 2016
Verification of information flow in agent-based systems
KE Sabri, R Khedri, J Jaskolka
E-Technologies: Innovation in an Open World: 4th International Conference …, 2009
Recommendations for effective security assurance of software-dependent systems
J Jaskolka
Intelligent Computing: Proceedings of the 2020 Computing Conference, Volume …, 2020
Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems
J Jaskolka, J Villasenor
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Endowing concurrent Kleene algebra with communication actions
J Jaskolka, R Khedri, Q Zhang
Relational and Algebraic Methods in Computer Science: 14th International …, 2014
On the necessary conditions for covert channel existence: A state-of-the-art survey
J Jaskolka, R Khedri, Q Zhang
Procedia Computer Science 10, 458-465, 2012
An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems
J Jaskolka, J Villasenor
IEEE Transactions on Reliability 66 (2), 529-546, 2017
Analyzing the Impact of Cyberattacks on Industrial Control Systems using Timed Automata
A Jawad, J Jaskolka
2021 IEEE 21st International Conference on Software Quality, Reliability and …, 2021
Modeling, analysis, and detection of information leakage via protocol-based covert channels
J Jaskolka
Towards an Ontology Design Architecture
J Jaskolka, W MacCaull, R Khedri
2015 International Conference on Computational Science and Computational …, 2015
A Formulation of the Potential for Communication Condition using C2KA
J Jaskolka, R Khedri
arXiv preprint arXiv:1408.5964, 2014
An aspect-oriented language for feature-modeling
Q Zhang, R Khedri, J Jaskolka
Journal of Ambient Intelligence and Humanized Computing 5 (3), 343-356, 2014
On the Modelling, Analysis, and Mitigation of Distributed Covert Channels
J Jaskolka
An Aspect-Oriented Language for Product Family Specification
Q Zhang, R Khedri, J Jaskolka
Procedia Computer Science 10, 482-489, 2012
A formal test for detecting information leakage via covert channels
J Jaskolka, R Khedri, KE Sabri
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
Mitigating covert channels based on analysis of the potential for communication
J Jaskolka, R Khedri
Theoretical Computer Science 643, 1-37, 2016
Verification of aspectual composition in feature-modeling
Q Zhang, R Khedri, J Jaskolka
International Conference on Software Engineering and Formal Methods, 109-125, 2012
The system can't perform the operation now. Try again later.
Articles 1–20