-
3
-
-
67649665413
-
Modelling with generalized stochastic petri nets
-
Ajmone Marsan, M., Balbo, G., Conte, G., Donatelli, S., Franceschinis, G.: Modelling with generalized stochastic petri nets. SIGMETRICS Perform. Eval. Rev. 26, 2 (1998)
-
(1998)
SIGMETRICS Perform. Eval. Rev.
, vol.26
, pp. 2
-
-
Ajmone Marsan, M.1
Balbo, G.2
Conte, G.3
Donatelli, S.4
Franceschinis, G.5
-
5
-
-
80052974180
-
Model-driven availability evaluation of railway control systems
-
Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. Springer, Heidelberg
-
Bernardi, S., Flammini, F., Marrone, S., Merseguer, J., Papa, C., Vittorini, V.: Model-driven availability evaluation of railway control systems. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol. 6894, pp. 15-28. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6894
, pp. 15-28
-
-
Bernardi, S.1
Flammini, F.2
Marrone, S.3
Merseguer, J.4
Papa, C.5
Vittorini, V.6
-
7
-
-
33847411543
-
A policy-based methodology for security evaluation: A security metric for public key infrastructures
-
Casola, V., Mazzeo, A., Mazzocca, N., Vittorini, V.: A policy-based methodology for security evaluation: A security metric for public key infrastructures. Journal of Computer Security 15(2), 197-229 (2007)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.2
, pp. 197-229
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Vittorini, V.4
-
8
-
-
23844470859
-
A reference model for security level evaluation: Policy and fuzzy techniques
-
Casola, V., Preziosi, R., Rak, M., Troiano, L.: A reference model for security level evaluation: Policy and fuzzy techniques. Journal of Universal Computer Science 11(1), 150-174 (2005)
-
(2005)
Journal of Universal Computer Science
, vol.11
, Issue.1
, pp. 150-174
-
-
Casola, V.1
Preziosi, R.2
Rak, M.3
Troiano, L.4
-
9
-
-
84885727452
-
-
Risk Steering Committee
-
Risk Steering Committee. DHS risk lexicon, http://www.dhs.gov/xlibrary/ assets/dhs-risk-lexicon.pdf
-
DHS Risk Lexicon
-
-
-
10
-
-
70349312712
-
Quantitative security risk assessment and management for railway transportation infrastructures
-
Setola, R., Geretshuber, S. (eds.) CRITIS 2008. Springer, Heidelberg
-
Flammini, F., Gaglione, A., Mazzocca, N., Pragliola, C.: Quantitative security risk assessment and management for railway transportation infrastructures. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 180-189. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5508
, pp. 180-189
-
-
Flammini, F.1
Gaglione, A.2
Mazzocca, N.3
Pragliola, C.4
-
12
-
-
35348974118
-
Security simulation for vulnerability assessment
-
Hennessey, B., Wesson, R.B., Norman, B.: Security simulation for vulnerability assessment. IEEE Aerospace and Electronic Systems Magazine 22(9), 11-16 (2007)
-
(2007)
IEEE Aerospace and Electronic Systems Magazine
, vol.22
, Issue.9
, pp. 11-16
-
-
Hennessey, B.1
Wesson, R.B.2
Norman, B.3
-
13
-
-
55349106566
-
Some limitations of risk = threat x vulnerability x consequence for risk analysis of terrorist attacks
-
Cox Jr., L.A.: Some limitations of risk = threat x vulnerability x consequence for risk analysis of terrorist attacks. Risk Analysis 28(6) (2008)
-
(2008)
Risk Analysis
, vol.28
, Issue.6
-
-
Cox Jr., L.A.1
-
14
-
-
84885783829
-
-
Critical Infrastructure Security - WIT Press
-
Lewis, T.G., Darken, R.P., Mackin, T., Dudenhoeffer, D.: Model-Based Risk Analysis for Critical Infrastructures. Critical Infrastructure Security - WIT Press (2011)
-
(2011)
Model-Based Risk Analysis for Critical Infrastructures
-
-
Lewis, T.G.1
Darken, R.P.2
Mackin, T.3
Dudenhoeffer, D.4
-
15
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: From dependability to security. IEEE Trans. Dependable Secur. Comput. 1, 48-65 (2004)
-
(2004)
IEEE Trans. Dependable Secur. Comput.
, vol.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
16
-
-
12344298391
-
Modeling and simulating critical infrastructures and their interdependencies
-
IEEE Computer Society, Washington, DC
-
Rinaldi, S.M.: Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th HICSS 2004 - Track 2, vol. 2. IEEE Computer Society, Washington, DC (2004)
-
(2004)
Proceedings of the 37th HICSS 2004 - Track 2
, vol.2
-
-
Rinaldi, S.M.1
-
18
-
-
77953148489
-
A framework for evaluating deployed security systems: Is there a chink in your armor?
-
Special Issue on Quantitative Risk Analysis Techniques for Security Applications
-
Taylor, M.E., Kiekintveld, C., Western, C., Tambe, M.: A framework for evaluating deployed security systems: Is there a chink in your armor? Informatica 34 (2010), Special Issue on Quantitative Risk Analysis Techniques for Security Applications
-
(2010)
Informatica
, vol.34
-
-
Taylor, M.E.1
Kiekintveld, C.2
Western, C.3
Tambe, M.4
-
19
-
-
68549104046
-
Physical security devices for computer subsystems: A survey of attacks and defenses
-
Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
-
Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 302-317. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1965
, pp. 302-317
-
-
Weingart, S.H.1
-
20
-
-
84958773306
-
Petri net modelling and performability evaluation with timeNET 3.0
-
Haverkort, B.R., Bohnenkamp, H.C., Smith, C.U. (eds.) TOOLS 2000. Springer, Heidelberg
-
Zimmermann, A., Freiheit, J., German, R., Hommel, G.: Petri net modelling and performability evaluation with timeNET 3.0. In: Haverkort, B.R., Bohnenkamp, H.C., Smith, C.U. (eds.) TOOLS 2000. LNCS, vol. 1786, pp. 188-202. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1786
, pp. 188-202
-
-
Zimmermann, A.1
Freiheit, J.2
German, R.3
Hommel, G.4
|