Logic Journal of the IGPL

ISSN: 0945-9103

13 found

View year:

  1.  12
    The lattice of all 4-valued implicative expansions of Belnap–Dunn logic containing Routley and Meyer’s basic logic Bd.Gemma Robles & José M. Méndez - 2024 - Logic Journal of the IGPL 32 (3):493-516.
    The well-known logic first degree entailment logic (FDE), introduced by Belnap and Dunn, is defined with |$\wedge $|⁠, |$\vee $| and |$\sim $| as the sole primitive connectives. The aim of this paper is to establish the lattice formed by the class of all 4-valued C-extending implicative expansions of FDE verifying the axioms and rules of Routley and Meyer’s basic logic B and its useful disjunctive extension B|$^{\textrm {d}}$|⁠. It is to be noted that Boolean negation (so, classical propositional logic) (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  3
    Correction to: A note on functional relations in a certain class of implicative expansions of FDE related to Brady’s 4-valued logic BN4.Gemma Robles & José M. Méndez - 2024 - Logic Journal of the IGPL 32 (3):572-572.
    This is a correction to: Gemma Robles, José M. Méndez, A note on functional relations in a certain class of implicative expansions of FDE related to Brady’.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  8
    FCA-based reasoning for privacy.Gonzalo A. Aranda-Corral, Joaquín Borrego-Díaz & Juan Galán-Páez - 2024 - Logic Journal of the IGPL 32 (2):224-242.
    Notwithstanding the potential danger to security and privacy, sharing and publishing data has become usual in Data Science. To preserve privacy, de-identification methodologies guided by risk estimation have been designed. Two issues associated with classical risk metrics are, on the one hand, the adequacy of the metric and, on the other hand, its static nature. In this paper, we present metrics for estimating risk based on the emerging semantics provided by Formal Concept Analysis. The metrics are designed to estimate the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  25
    Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families.Nuño Basurto, Diego García-Prieto, Héctor Quintián, Daniel Urda, José Luis Calvo-Rolle & Emilio Corchado - 2024 - Logic Journal of the IGPL 32 (2):306-320.
    As it is well known, mobile phones have become a basic gadget for any individual that usually stores sensitive information. This mainly motivates the increase in the number of attacks aimed at jeopardizing smartphones, being an extreme concern above all on Android OS, which is the most popular platform in the market. Consequently, a strong effort has been devoted for mitigating mentioned incidents in recent years, even though few researchers have addressed the application of visualization techniques for the analysis of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  8
    Towards enhanced monitoring framework with smart predictions.Antonello Calabrò, Said Daoudagh & Eda Marchetti - 2024 - Logic Journal of the IGPL 32 (2):321-333.
    Context: Predicting security and trust vulnerabilities and issues is crucial for IoT interconnected systems and ecosystems, especially when integrating new, third-party or open-source components. Objective: One way to ensure timely predictions is by using a smart monitoring framework to continuously verify functional and non-functional property violations during the executions of the systems and their components. Method: This paper presents a set of guidelines for the Smart Monitoring Framework definition and its application process. Results and Conclusion: The paper provides the reference (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  7
    Good practices in designing a communication channel architecture for secure async flexible distributed collaboration.Rudolf Erdei, Daniela Delinschi, Oliviu Matei & Laura Andreica - 2024 - Logic Journal of the IGPL 32 (2):334-351.
    In this paper we present a set of good practices in the design of a security-centric architecture for a Communication Channel that can be used to secure a Loosely-Coupled distributed platform, over unreliable communication mediums. The proposed practices are derived from designing a complete architecture that is modular and designed to support principles of Service Oriented Architecture (SOA) and the common functional requirements of a wide range of applications, including cybersecurity, smart power grids and industrial Internet of Things (IoT). The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  13
    Accountability as a service for robotics: Performance assessment of different accountability strategies for autonomous robots.Laura Fernández-Becerra, Ángel Manuel Guerrero-Higueras, Francisco Javier Rodríguez-Lera & Vicente Matellán - 2024 - Logic Journal of the IGPL 32 (2):243-262.
    An essential requirement for increasing human confidence in computer systems is knowing an event’s origin. Therefore, it is necessary to have an efficient method to record such information. It is especially challenging in robotics, where unexpected behaviours can have unpredictable consequences, endangering the interests of people or even their safety. Furthermore, to analyse an incident’s cause or anticipate future behaviours, we must identify the events that cause a specific action. Although it is common to use logging systems for such purposes, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  17
    Realtime polymorphic malicious behavior detection in blockchain-based smart contracts.Darius Galiş, Ciprian Pungilǎ & Viorel Negru - 2024 - Logic Journal of the IGPL 32 (2):210-223.
    This paper proposes an innovative approach to achieving real-time polymorphic behavior detection, and its direct application to blockchain-focused smart-contracts. We devise a method based on a non-deterministic finite state machine to perform approximate pattern-matching, using a look-ahead mechanism implemented through a concept similar to that of a sliding window, and using threshold-based similarity checking at every state in the automaton. We introduce and formalize our approach, discuss the challenges we faced and then test it in a real-world environment. The experimental (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  11
    Exploiting multimodal biometrics for enhancing password security.Konstantinos Karampidis - 2024 - Logic Journal of the IGPL 32 (2):293-305.
    Digitization of every daily procedure requires trustworthy verification schemes. People tend to overlook the security of the passwords they use, i.e. they use the same password on different occasions, they neglect to change them periodically or they often forget them. This raises a major security issue, especially for elderly people who are not familiar with modern technology and its risks and challenges. To overcome these drawbacks, biometric factors were utilized, and nowadays, they have been widely adopted due to their convenience (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  39
    Detection, exploitation and mitigation of memory errors.Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez & Pablo Garcia Bringas - 2024 - Logic Journal of the IGPL 32 (2):281-292.
    Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense methods. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  5
    Evaluating the impact of different Feature as a Counter data aggregation approaches on the performance of NIDSs and their selected features.Roberto Magán-Carrión, Daniel Urda, Ignacio Diaz-Cano & Bernabé Dorronsoro - 2024 - Logic Journal of the IGPL 32 (2):263-280.
    There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role transforming network traffic raw (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  31
    Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices.Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón & José Luis Calvo-Rolle - 2024 - Logic Journal of the IGPL 32 (2):352-365.
    This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a set (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  22
    Functional completeness and primitive positive decomposition of relations on finite domains.Sergiy Koshkin - 2024 - Logic Journal of the IGPL 32.
    We give a new and elementary construction of primitive positive decomposition of higher arity relations into binary relations on finite domains. Such decompositions come up in applications to constraint satisfaction problems, clone theory and relational databases. The construction exploits functional completeness of 2-input functions in many-valued logic by interpreting relations as graphs of partially defined multivalued ‘functions’. The ‘functions’ are then composed from ordinary functions in the usual sense. The construction is computationally effective and relies on well-developed methods of functional (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
 Previous issues
  
Next issues