{"id":898,"date":"2020-12-01T11:00:43","date_gmt":"2020-12-01T16:00:43","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=898"},"modified":"2026-01-26T10:41:50","modified_gmt":"2026-01-26T15:41:50","slug":"new-publication-reusable-formal-models-for-threat-specification-detection-and-treatment","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2020\/new-publication-reusable-formal-models-for-threat-specification-detection-and-treatment\/","title":{"rendered":"New Publication: Reusable Formal Models for Threat Specification, Detection, and Treatment"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: Reusable Formal Models for Threat Specification, Detection, and Treatment\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our new publication &#8220;<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-64694-3_4\">Reusable Formal Models for Threat Specification, Detection, and Treatment<\/a>&#8221; is now published online and will be presented virtually at the <a href=\"https:\/\/icsr2020.wordpress.com\/\">19th <span data-test=\"ConfSeriesName\">International Conference on <\/span><span data-test=\"ConfSeriesName\">Software<\/span><span data-test=\"ConfSeriesName\"> and Software Reuse (ICSR 2020)<\/span><\/a> this week. This work is the result of&nbsp; collaboration with colleagues at <a href=\"https:\/\/www.irit.fr\/en\/home\/\">IRIT<\/a>. The paper proposes an integrated approach &nbsp;on metamodeling techniques that enable the specification of the software architecture structure and on formal techniques for the purposes of precise specification and verification of security aspects as properties of a modeled system. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a> for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our new publication &#8220;Reusable Formal Models for Threat Specification, Detection, and Treatment&#8221; is now published online and will be presented virtually at the 19th International Conference on Software and Software Reuse (ICSR 2020) this week. This work is the result of&nbsp; collaboration with colleagues at IRIT. The paper proposes an integrated approach &nbsp;on metamodeling techniques [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=898"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/898\/revisions"}],"predecessor-version":[{"id":900,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/898\/revisions\/900"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}