-
1
-
-
63749106886
-
A methodology for mapping SysML activity diagram to time petri net for requirement validation of embedded real-time systems with energy constraints
-
Washington, DC, USA: IEEE Computer Society
-
E. Andrade, P. Maciel, G. Callou, and B. Nogueira, "A Methodology for Mapping SysML Activity Diagram to Time Petri Net for Requirement Validation of Embedded Real-Time Systems with Energy Constraints, " in ICDS '09: Proc. of the 2009 Third Int. Conf on Dig. Soc. Washington, DC, USA: IEEE Computer Society, 2009, pp. 266-271.
-
(2009)
ICDS '09: Proc. of the 2009 Third Int. Conf on Dig. Soc
, pp. 266-271
-
-
Andrade, E.1
MacIel, P.2
Callou, G.3
Nogueira, B.4
-
3
-
-
33646909480
-
-
United States
-
M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman, The Secure Real-time Transport Protocol (SRTP), United States, 2004.
-
(2004)
The Secure Real-time Transport Protocol (SRTP)
-
-
Baugher, M.1
McGrew, D.2
Naslund, M.3
Carrara, E.4
Norrman, K.5
-
4
-
-
26444451066
-
End-to-end integrated security and performance analysis on the degas choreographer platform
-
SpringerVerlag
-
M. Buchholtz, S. Gilmore, V. Haenel, and C. Montangero, "End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform, " in Proceedings of the International Symposium of Formal Methods Europe (FM 2005), number 3582 in LNCS. SpringerVerlag, 2005, pp. 286-30 I.
-
Proceedings of the International Symposium of Formal Methods Europe (FM 2005) Number 3582 in LNCS
, vol.2005
, pp. 286-30
-
-
Buchholtz, M.1
Gilmore, S.2
Haenel, V.3
Montangero, C.4
-
5
-
-
67650273271
-
Mapping sysml state machine diagram to time petri net for analysis and verification of embedded real-time systems with energy constraints
-
Washington, DC, USA: IEEE Computer Society
-
E. Carneiro, P. Maciel, G. Callou, E. Tavares, and B. Nogueira, "Mapping SysML State Machine Diagram to Time Petri Net for Analysis and Verification of Embedded Real-Time Systems with Energy Constraints, " in ENICS '08: Proc. of the 2008 Int. Confon Adv. in Elec. and Micro-elec. Washington, DC, USA: IEEE Computer Society, 2008, pp. 1-6.
-
ENICS '08: Proc. of the 2008 Int. Confon Adv. in Elec. and Micro-elec
, vol.2008
, pp. 1-6
-
-
Carneiro, E.1
MacIel, P.2
Callou, G.3
Tavares, E.4
Nogueira, B.5
-
6
-
-
51949085363
-
Measuring network security using bayesian network-based attack graphs
-
32nd Annual IEEE International, August
-
M. Frigault and L. Wang, "Measuring Network Security Using Bayesian Network-Based Attack Graphs, " in Computer Software and Applications, 2008. COMPSAC '08. 32nd Annual IEEE International, August 2008, pp. 6 98- 703.
-
(2008)
Computer Software and Applications 2008. COMPSAC '08
, pp. 698-703
-
-
Frigault, M.1
Wang, L.2
-
7
-
-
33846466500
-
On the design of more secure software-intensive systems by use of attack patterns
-
DOI 10.1016/j.infsof.2006.06.002, PII S0950584906000802
-
M. Gegick and L. Williams, "On The Design of More Secure SoftwareIntensive Systems by Use of Attack Patterns, " Irif. Softw. Techno!. , vol. 4 9, pp. 381-3 9 7, April 2007. (Pubitemid 46162190)
-
(2007)
Information and Software Technology
, vol.49
, Issue.4
, pp. 381-397
-
-
Gegick, M.1
Williams, L.2
-
8
-
-
77953120075
-
Verification and trade-off analysis of security properties in UML system models
-
G. Georg, K. Anastasakis, B. Bordbar, S. H. Houmb, I. Ray, and M. Toahchoodee, "Verification and Trade-Off Analysis of Security Properties in UML System Models, " IEEE Transactions on Software Engineering, vol. 36, pp. 338-356, 2010.
-
(2010)
IEEE Transactions on Software Engineering
, vol.36
, pp. 338-356
-
-
Georg, G.1
Anastasakis, K.2
Bordbar, B.3
Houmb, S.H.4
Ray, I.5
Toahchoodee, M.6
-
9
-
-
49049107220
-
Software security assurance, state-of-the-art report SOAR
-
July
-
K. M. Goertzel, T. Winograd, H. L. McKinley, L. O. M. Colon, T. McGibbon, E. Fedchak, and R. Vienneau, "Software Security Assurance, State-of-the-Art Report SOAR;' IATAC and DACS, State-ofthe- Art Report S P0 700- 98-D-4002, July 2007.
-
(2007)
IATAC and DACS, State-ofthe- Art Report S P0 700-98-D-4002
-
-
Goertzel, K.M.1
Winograd, T.2
McKinley, H.L.3
Colon, L.O.M.4
McGibbon, T.5
Fedchak, E.6
Vienneau, R.7
-
10
-
-
50049117473
-
Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles
-
August
-
L. Grunske and D. Joyce, "Quantitative Risk-Based Security Prediction for Component-Based Systems with Explicitly Modeled Attack Profiles, " J Syst. Softw. , vol. 81, pp. 1327-1345, August 2008.
-
(2008)
J Syst. Softw.
, vol.81
, pp. 1327-1345
-
-
Grunske, L.1
Joyce, D.2
-
13
-
-
77950516884
-
Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
-
March
-
S. H. Houmb, S. Islam, E. Knauss, J. Jiirjens, and K. Schneider, "Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec, " Requir. Eng. , vol. 15, pp. 63-93, March 2010.
-
(2010)
Requir. Eng.
, vol.15
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jiirjens, J.4
Schneider, K.5
-
15
-
-
84919356434
-
Information technology-Security techniques-Information security risk management
-
Information technology-Security techniques-Information security risk management, International Organization for Standardization (ISO), 2008.
-
(2008)
International Organization for Standardization (ISO)
-
-
-
16
-
-
84974676982
-
A probabilistic extension of UML statecharts-specification and verification
-
Springer
-
D. N. Jansen, H. Hermanns, and J. P. Katoen, "A Probabilistic Extension of UML Statecharts-Specification and Verification, " in In Formal Techniques in Real-Time and Fault-Tolerant Systems (F TRTFT), LNCS 2469: 355374. Springer, 2002, pp. 76-91.
-
(2002)
Formal Techniques in Real-Time and Fault-Tolerant Systems (F TRTFT), LNCS
, vol.2469
, Issue.355-374
, pp. 76-91
-
-
Jansen, D.N.1
Hermanns, H.2
Katoen, J.P.3
-
17
-
-
0242339588
-
A QoS-oriented extension of UML statecharts
-
-, "A QoS-Oriented Extension of UML Statecharts, " Lecture notes in computer science, vol. 2863, pp. 76-91, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2863
, pp. 76-91
-
-
Jansen, D.N.1
Hermanns, H.2
Katoen, J.P.3
-
18
-
-
67650272815
-
On the meaning of sysml activity diagrams
-
Ser. ECBS '0 9. Washington, DC, USA: IEEE Computer Society
-
Y. Jarraya, M. Debbabi, and J. Bentahar, "On the Meaning of SysML Activity Diagrams, " in Proc. of the 2009 16th Ann. IEEE Int. Corif. and Work. on the Eng. of Compo Based Sys. , ser. ECBS '0 9. Washington, DC, USA: IEEE Computer Society, 2009, pp. 95-105.
-
(2009)
Proc. of the 2009 16th Ann. IEEE Int. Corif. and Work. on the Eng. of Compo Based Sys.
, pp. 95-105
-
-
Jarraya, Y.1
Debbabi, M.2
Bentahar, J.3
-
19
-
-
34250162897
-
Automatic verification and performance analysis of time-constrained SysML activity diagrams
-
DOI 10.1109/ECBS.2007.22, 4148969, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems
-
Y. Jarraya, A. Soeanu, M. Debbabi, and F. Hassaine, "Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams, " in ECBS '07: Proc. of the 14th An. IEEE Int. Conf and Work. on the Eng. of Comp.-Bas. Sys. Washington, DC, USA: IEEE Computer Society, 2007, pp. 515-522. (Pubitemid 46900708)
-
(2007)
Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems
, pp. 515-522
-
-
Jarraya, Y.1
Soeanu, A.2
Debbabi, M.3
Hassaine, F.4
-
20
-
-
84948760464
-
Two formal analyses of attack graphs
-
IEEE
-
S. Jha, O. Sheyner, and J. Wing, "Two Formal Analyses of Attack Graphs, " in the Proceedings of the 15th Computer Security Foundation Workshop. IEEE, 2002, pp. 49-63.
-
(2002)
Proceedings of the 15th Computer Security Foundation Workshop.
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
24
-
-
35348959376
-
Tools for secure systems development with UML
-
DOI 10.1007/s10009-007-0048-8
-
-, "Tools for Secure Systems Development with UML, " Int. J Soflw. Tools Techno!. Transf, vol. 9, pp. 527-544, October 2007. (Pubitemid 47603661)
-
(2007)
International Journal on Software Tools for Technology Transfer
, vol.9
, Issue.5-6
, pp. 527-544
-
-
Jurjens, J.1
Shabalin, P.2
-
25
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
ser. UML '02. London, UK: Springer-Verlag
-
T. Lodderstedt, D. A. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security, " in the Proceedings of the 5th International Conference on The Unified Modeling Language, ser. UML '02. London, UK: Springer-Verlag, 2002, pp. 426-441.
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
26
-
-
34547444679
-
-
Ph. D. dissertation, Carnegie Mellon University
-
P. K. Manadhata, "An Attack Surface Metric, " Ph. D. dissertation, Carnegie Mellon University, 2008.
-
(2008)
An Attack Surface Metric
-
-
Manadhata, P.K.1
-
27
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
L. O. Gorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication, " Proceedings of the IEEE, vol. 91, no. 12, pp. 2021- 2040, 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
Gorman, L.O.1
-
28
-
-
80052083607
-
-
OMG, OMG Systems Modeling Language (OMG SysML) Specification, Object Management Group, September 2007, oMG Available Specification
-
OMG, OMG Systems Modeling Language (OMG SysML) Specification, Object Management Group, September 2007, oMG Available Specification.
-
-
-
-
29
-
-
80052099641
-
-
bachelor Thesis to obtain Engineering Degree from Sidi Bel Abess University
-
S. Ouchani, "Automatic Generation of Fuzzy Inference Systems, " 1 9 9 7, bachelor Thesis to obtain Engineering Degree from Sidi Bel Abess University.
-
(1997)
Automatic Generation of Fuzzy Inference Systems
-
-
Ouchani, S.1
-
30
-
-
79960020233
-
Security estimation in streaming protocols
-
Abu Dhabi, UAE, Apr.
-
S. Ouchani, Y. Jarraya, O. A. Mohamed, and M. Debbabi, "Security Estimation in Streaming Protocols," in 201 I International Conference on Innovations in Information Technology (Innovations 2011), Abu Dhabi, UAE, Apr. 2011, pp. 427-432.
-
(2011)
2011 International Conference on Innovations in Information Technology (Innovations 2011)
, pp. 427-432
-
-
Ouchani, S.1
Jarraya, Y.2
Mohamed, O.A.3
Debbabi, M.4
-
31
-
-
77952711856
-
Verification of the correctness in composed UML behavioural diagrams
-
S. Ouchani, O. A. Mohamed, M. Debbabi, and M. Pourzandi, "Verification of the Correctness in Composed UML Behavioural Diagrams, " in SERA (selected papers), 2010, pp. 163-177.
-
(2010)
SERA (Selected Papers)
, pp. 163-177
-
-
Ouchani, S.1
Mohamed, O.A.2
Debbabi, M.3
Pourzandi, M.4
-
32
-
-
34547454437
-
A weakest-adversary security metric for network configuration security analysis
-
DOI 10.1145/1179494.1179502, Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
J. Pamula, S. Jajodia, P. Ammann, and V. Swarup, "A WeakestAdversary Security Metric For Network Configuration Security Analysis, " in the Proceedings of the 2nd ACM workshop on Quality of protection, ser. QoP'06. New York, NY, USA: ACM, 2006, pp. 31-38. (Pubitemid 47165622)
-
(2006)
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 31-38
-
-
Pamula, J.1
Jajodia, S.2
Ammann, P.3
Swarup, V.4
-
34
-
-
77949338051
-
Formal verification of secure group communication protocols modelled in UML
-
P. Saqui-Sannes, T. Villemur, B. Fontan, S. Mota, M. S. Bouassida, N. Chridi, I. Chrisment, and L. Vigneron, " Formal Verification of Secure Group Communication Protocols Modelled in UML, " Innovations in Systems and Software Engineering, vol. 6, pp. 125-133, 2010.
-
Innovations in Systems and Software Engineering
, vol.6
, Issue.2010
, pp. 125-133
-
-
Saqui-Sannes, P.1
Villemur, T.2
Fontan, B.3
Mota, S.4
Bouassida, M.S.5
Chridi, N.6
Chrisment, I.7
Vigneron, L.8
-
36
-
-
0002670359
-
Attack trees: Modeling security threats
-
B. Schneier, "Attack Trees: Modeling Security Threats, " Dr. Dobb's Journal, 1999.
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
38
-
-
77950516699
-
A UML-based static verification framework for security
-
L. Siveroni, A. Zisman, and G. Spanoudakis, "A UML-Based Static Verification Framework for Security, " Requirements Engineering, vol. 15, pp. 95-118, 2010.
-
Requirements Engineering
, vol.15
, Issue.2010
, pp. 95-118
-
-
Siveroni, L.1
Zisman, A.2
Spanoudakis, G.3
|