Skip to content
GitLab
Menu
Projects
Groups
Snippets
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
PARTIES
publications
Minimal Scheduling
Commits
0f27cbd3
Commit
0f27cbd3
authored
Jun 30, 2020
by
Jaime Arias
Browse files
Add structure of the folder
parent
f175f541
Changes
1
Show whitespace changes
Inline
Side-by-side
README.md
View file @
0f27cbd3
...
@@ -9,6 +9,20 @@ git clone https://depot.lipn.univ-paris13.fr/parties/publications/minimal-schedu
...
@@ -9,6 +9,20 @@ git clone https://depot.lipn.univ-paris13.fr/parties/publications/minimal-schedu
## Folder Structure
## Folder Structure
```
.
└── results # folder with the ADTree models and the minimal assignments
├── iot-dev # compromise IoT device
│ ├── assignment
│ └── model
├── toy-example # model with many parallel assignments
│ ├── assignment
│ └── model
└── treasure-hunters # steal a treasure in a museum
├── assignment
└── model
```
## Results
## Results
### Treasure Hunters
### Treasure Hunters
...
@@ -38,17 +52,21 @@ last possibility is captured by the condition associated with the treasure
...
@@ -38,17 +52,21 @@ last possibility is captured by the condition associated with the treasure
stolen gate (TS), which states that the arrival time of the police must be
stolen gate (TS), which states that the arrival time of the police must be
greater than the time for the thieves to steal the treasure and go away.
greater than the time for the thieves to steal the treasure and go away.
#### ADTree model


### Minimal Scheduling
###
#
Minimal Scheduling


### Toy Example
### Toy Example
#### ADTree model


### Minimal Scheduling
###
#
Minimal Scheduling


...
@@ -60,9 +78,11 @@ network and has acquired the corresponding credentials, it can exploit a
...
@@ -60,9 +78,11 @@ network and has acquired the corresponding credentials, it can exploit a
software vulnerability in the IoT device to run a malicious script. Our
software vulnerability in the IoT device to run a malicious script. Our
ADTree adds defence nodes on top of the attack trees used in [4].
ADTree adds defence nodes on top of the attack trees used in [4].
#### ADTree model


### Minimal Scheduling
###
#
Minimal Scheduling


...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment