-
1
-
-
51849136859
-
The fuzzy integrated evaluation of embedded system security
-
IEEE
-
S. Zhang, N. Zhou, J. Wu, "The Fuzzy Integrated Evaluation of Embedded System Security", 2008 International Conference on Embedded Software and System Security, IEEE, 2008, pp 157-162
-
(2008)
2008 International Conference on Embedded Software and System Security
, pp. 157-162
-
-
Zhang, S.1
Zhou, N.2
Wu, J.3
-
3
-
-
34250158136
-
Integrating security modeling into embedded system design
-
DOI 10.1109/ECBS.2007.45, 4148937, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems
-
M. Eby, J. Werner, G. Karsai, A. Ledeczi, "Integrating Security Modeling in Embedded System Design", Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, IEEE, 2007, pp 221-228 (Pubitemid 46900676)
-
(2007)
Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems
, pp. 221-228
-
-
Eby, M.1
Werner, J.2
Karsai, G.3
Ledeczi, A.4
-
4
-
-
34548836760
-
The architecture analysis and design language (AADL): An introduction
-
Software Engineering Institute
-
P. Feiler, D. Gluch, "The Architecture Analysis and Design Language (AADL): An Introduction", Technical Note CMU/SEI-2006-TN-011, 2006, Software Engineering Institute.
-
(2006)
Technical Note CMU/SEI-2006-TN-011
-
-
Feiler, P.1
Gluch, D.2
-
5
-
-
50849110201
-
Building secure systems using model-based engineering and architectural models
-
September
-
J.F. Hansson, P. Feiler, J. Morley, "Building Secure Systems Using Model-Based Engineering and Architectural Models", Crosstalk, September 2008, pp 10-15
-
(2008)
Crosstalk
, pp. 10-15
-
-
Hansson, J.F.1
Feiler, P.2
Morley, J.3
-
6
-
-
0036143326
-
Composing security-aware software
-
DOI 10.1109/52.976939
-
K.M. Khan, J. Han, "Composing Security-Aware Software", IEEE Software, January 2002, pp 34-41 (Pubitemid 34078171)
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 34-41
-
-
Khan, K.M.1
Han, J.2
-
8
-
-
80055020497
-
-
Michigan State University, October 11, 2006, Retrieved March 3, 2010
-
Michigan State University, October 11, 2006, Retrieved March 3, 2010, http://www.cse.msu.edu/~chengb/RE-491/Projects/cacc-msu-ford.pdf
-
-
-
-
9
-
-
80054998665
-
Cooperative adaptive cruise control (CACC): Team project - Interim report
-
ERAU, Fall
-
A. Dobre, A. King, B. Langpap, W. Stevenson, "Cooperative Adaptive Cruise Control (CACC): Team Project - Interim Report", SE610: Software Architecture and Design, ERAU, Fall 2009
-
(2009)
SE610: Software Architecture and Design
-
-
Dobre, A.1
King, A.2
Langpap, B.3
Stevenson, W.4
-
11
-
-
80055022928
-
-
Retrieved March 18, 2010
-
J. Deepakumara, H.M. Heys, R. Venkatesan, "Performance Comparison of Message Authentication Code (MAC) Algorithms for the Internet Protocol Security (IPSEC)", Retrieved March 18, 2010, http://www.engr.mun.ca/~howard/PAPERS/ necec-2003b.pdf
-
Performance Comparison of Message Authentication Code (MAC) Algorithms for the Internet Protocol Security (IPSEC)
-
-
Deepakumara, J.1
Heys, H.M.2
Venkatesan, R.3
-
12
-
-
84992029563
-
-
Original October 28, 2002, Modified May 18, 2009, Retrieved April 7, 2010
-
G. Darby, "Discrete Event Simulator", Delphi, Original October 28, 2002, Modified May 18, 2009, Retrieved April 7, 2010, http://www. delphiforfun.org/Programs/discrete-sim.htm
-
Discrete Event Simulator
-
-
Darby, G.1
|