메뉴 건너뛰기




Volumn , Issue , 2007, Pages 405-412

Model-based cyber security

Author keywords

[No Author keywords available]

Indexed keywords

CYBER SECURITY; NETWORK DESIGN; SECURITY TOOLS;

EID: 34250165438     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECBS.2007.50     Document Type: Conference Paper
Times cited : (5)

References (13)
  • 1
    • 0030964576 scopus 로고    scopus 로고
    • Model-Integrated Online Problem-Solving Environment for Chemical Engineering
    • G. Karsai, F. DeCaria, "Model-Integrated Online Problem-Solving Environment for Chemical Engineering," IFAC Control Engineering Practice, Vol. 5, No. 5, pp. 1-9, 1997.
    • (1997) IFAC Control Engineering Practice , vol.5 , Issue.5 , pp. 1-9
    • Karsai, G.1    DeCaria, F.2
  • 4
    • 84944677742 scopus 로고
    • PVS: A prototype verification system
    • Deepak Kapur, editor, 11th International Conference on Automated Deduction CADE, of, Saratoga, NY, June, Springer-Verlag
    • S. Owre, J. M. Rushby, and N. Shankar, "PVS: A prototype verification system," In Deepak Kapur, editor, 11th International Conference on Automated Deduction (CADE), Vol. 607 of Lecture Notes in Artificial Intelligence, pp. 748-752, Saratoga, NY, June 1992, Springer-Verlag.
    • (1992) Lecture Notes in Artificial Intelligence , vol.607 , pp. 748-752
    • Owre, S.1    Rushby, J.M.2    Shankar, N.3
  • 5
    • 85008018482 scopus 로고    scopus 로고
    • Model-Integrated Computing
    • April
    • J. Sztipanovits, G. Karsai, "Model-Integrated Computing," IEEE Computer, pp. 110-112, April, 1997.
    • (1997) IEEE Computer , pp. 110-112
    • Sztipanovits, J.1    Karsai, G.2
  • 6
    • 34250187586 scopus 로고    scopus 로고
    • UMLsec: Extending UML for Secure Systems Development, UML 2002, Dresden, Sept. 30 - Oct. 4, 2002
    • J. Jürjens, "UMLsec: Extending UML for Secure Systems Development," UML 2002, Dresden, Sept. 30 - Oct. 4, 2002, LNCS.
    • LNCS
    • Jürjens, J.1
  • 9
    • 0030084918 scopus 로고    scopus 로고
    • The NRL Protocol Analyzer: An Overview
    • C. Meadows, "The NRL Protocol Analyzer: An Overview," Journal of Logic Programming, Vol. 26(2), pp. 113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 11
    • 84949226562 scopus 로고    scopus 로고
    • The CORAS Framework for a Model-Based Risk Management Process
    • Proc. Computer Safety, Reliability and Security Safecomp, Springer
    • R. Fredriksen, M. Kristiansen, B. A. Gran, K. Stølen, T. A. Opperud, T. Dimitrakos, "The CORAS Framework for a Model-Based Risk Management Process," In Proc. Computer Safety, Reliability and Security (Safecomp 2002), LNCS 2434, pp. 94-105, Springer, 2002.
    • (2002) LNCS , vol.2434 , pp. 94-105
    • Fredriksen, R.1    Kristiansen, M.2    Gran, B.A.3    Stølen, K.4    Opperud, T.A.5    Dimitrakos, T.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.