메뉴 건너뛰기




Volumn 7, Issue 4, 2002, Pages 207-220

A software fault tree approach to requirements analysis of an intrusion detection system

Author keywords

Coloured Petri nets; Intrusion detection system; Mobile agents; Requirements analysis; Software fault tree

Indexed keywords


EID: 15944398393     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s007660200016     Document Type: Article
Times cited : (63)

References (29)
  • 3
    • 0003577306 scopus 로고    scopus 로고
    • Bradshaw JM (ed). MIT Press, Cambridge, MA
    • Bradshaw JM (ed). An introduction to software agents. MIT Press, Cambridge, MA, 1997
    • (1997) An Introduction to Software Agents
  • 5
    • 0029309598 scopus 로고
    • Analyzing safety requirements for process-control systems
    • De Lemos R, Saeed A, Anderson T. Analyzing safety requirements for process-control systems. IEEE Software 1995;12(3):42-53
    • (1995) IEEE Software , vol.12 , Issue.3 , pp. 42-53
    • De Lemos, R.1    Saeed, A.2    Anderson, T.3
  • 6
    • 0031499162 scopus 로고    scopus 로고
    • Requirements analysis using forward and backward search
    • Lutz R, Woodhouse RM. Requirements analysis using forward and backward search. Ann Software Eng 1997;3:459-475
    • (1997) Ann Software Eng , vol.3 , pp. 459-475
    • Lutz, R.1    Woodhouse, R.M.2
  • 9
    • 0026188075 scopus 로고
    • Safety verification of Ada programs using software fault trees
    • Leveson NG, Cha SS, Shimeall TJ. Safety verification of Ada programs using software fault trees. IEEE Software 1991;8(4):48-59
    • (1991) IEEE Software , vol.8 , Issue.4 , pp. 48-59
    • Leveson, N.G.1    Cha, S.S.2    Shimeall, T.J.3
  • 10
    • 0030231447 scopus 로고    scopus 로고
    • Targeting safety-related errors during software requirements analysis
    • Lutz RR. Targeting safety-related errors during software requirements analysis. J Syst Software 1996;34:223-230
    • (1996) J Syst Software , vol.34 , pp. 223-230
    • Lutz, R.R.1
  • 12
  • 15
    • 0031640906 scopus 로고    scopus 로고
    • Abstraction-based misuse detection: High-level specifications and adaptable strategies
    • Rockport, MA, June
    • Lin J-L, Wang XS, Jajodia S. Abstraction-based misuse detection: high-level specifications and adaptable strategies. In: Proceedings, IEEE computer security foundations workshop, Rockport, MA, June 1998, pp 190-201
    • (1998) Proceedings, IEEE Computer Security Foundations Workshop , pp. 190-201
    • Lin, J.-L.1    Wang, X.S.2    Jajodia, S.3
  • 23
    • 85077751063 scopus 로고    scopus 로고
    • Online July
    • CERT Coordination Center. Two input validation problems in FTPD. Online at http://www.cert.org/advisories/CA-2000-13.html [July 2000]
    • (2000) Two Input Validation Problems in FTPD
  • 24
    • 52649126844 scopus 로고    scopus 로고
    • Online December
    • CERT Coordination Center. FTP bounce. Online at http:// www.cert.org/advisories/CA-97.27.FTP_bounce.html [December 1997]
    • (1997) FTP Bounce


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.