Commit 0f27cbd3 authored by Jaime Arias's avatar Jaime Arias
Browse files

Add structure of the folder

parent f175f541
...@@ -9,6 +9,20 @@ git clone https://depot.lipn.univ-paris13.fr/parties/publications/minimal-schedu ...@@ -9,6 +9,20 @@ git clone https://depot.lipn.univ-paris13.fr/parties/publications/minimal-schedu
## Folder Structure ## Folder Structure
```
.
└── results # folder with the ADTree models and the minimal assignments
├── iot-dev # compromise IoT device
│ ├── assignment
│ └── model
├── toy-example # model with many parallel assignments
│ ├── assignment
│ └── model
└── treasure-hunters # steal a treasure in a museum
├── assignment
└── model
```
## Results ## Results
### Treasure Hunters ### Treasure Hunters
...@@ -38,17 +52,21 @@ last possibility is captured by the condition associated with the treasure ...@@ -38,17 +52,21 @@ last possibility is captured by the condition associated with the treasure
stolen gate (TS), which states that the arrival time of the police must be stolen gate (TS), which states that the arrival time of the police must be
greater than the time for the thieves to steal the treasure and go away. greater than the time for the thieves to steal the treasure and go away.
#### ADTree model
![Treasure Hunters ADTree](results/treasure-hunters/model/treasure-hunters.png) ![Treasure Hunters ADTree](results/treasure-hunters/model/treasure-hunters.png)
### Minimal Scheduling #### Minimal Scheduling
![treasure-hunters Assignment](results/treasure-hunters/assignment/treasure-hunters_scheduling.png) ![treasure-hunters Assignment](results/treasure-hunters/assignment/treasure-hunters_scheduling.png)
### Toy Example ### Toy Example
#### ADTree model
![toy-example ADTree](results/toy-example/model/toy-example.png) ![toy-example ADTree](results/toy-example/model/toy-example.png)
### Minimal Scheduling #### Minimal Scheduling
![toy-example Assignment](results/toy-example/assignment/toy-example_scheduling.png) ![toy-example Assignment](results/toy-example/assignment/toy-example_scheduling.png)
...@@ -60,9 +78,11 @@ network and has acquired the corresponding credentials, it can exploit a ...@@ -60,9 +78,11 @@ network and has acquired the corresponding credentials, it can exploit a
software vulnerability in the IoT device to run a malicious script. Our software vulnerability in the IoT device to run a malicious script. Our
ADTree adds defence nodes on top of the attack trees used in [4]. ADTree adds defence nodes on top of the attack trees used in [4].
#### ADTree model
![iot-dev ADTree](results/iot-dev/model/iot-dev.png) ![iot-dev ADTree](results/iot-dev/model/iot-dev.png)
### Minimal Scheduling #### Minimal Scheduling
![iot-dev Assignment](results/iot-dev/assignment/iot-dev_scheduling.png) ![iot-dev Assignment](results/iot-dev/assignment/iot-dev_scheduling.png)
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment