-
1
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
January
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11-33, January 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Malz, C.4
-
2
-
-
77952312799
-
-
Published Project Report PPR354, TRL Limited, June 2009
-
T. J. Barlow, S. Latham, I. S. McCrae, and P. G. Boulter. A reference book of driving cycles for use in the measurement of road vehicle emissions. Published Project Report PPR354, TRL Limited, June 2009.
-
Boulter. A reference book of driving cycles for use in the measurement of road vehicle emissions
-
-
Barlow, T.J.1
Latham, S.2
McCrae, I.S.3
Gupta, P.4
-
3
-
-
77950458920
-
Seamless model-based development: From isolated tools to integrated model engineering environments
-
M. Broy, M. Feilkas, M. Herrmannsdoerfer, S. Merenda, and D. Ratiu. Seamless Model-Based Development: From Isolated Tools to Integrated Model Engineering Environments. Proceedings of the IEEE, 98(4):526-545, 2010.
-
(2010)
Proceedings of the IEEE
, vol.984
, pp. 526-545
-
-
Broy, M.1
Feilkas, M.2
Herrmannsdoerfer, M.3
Merenda, S.4
Abrams, D.5
-
4
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
March
-
A. A. Cfiardenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry. Attacks Against Process Control Systems: Risk Assessment, Detection, and Response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), March 2011.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS
-
-
Cfiardenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Chakraborty, S.6
-
6
-
-
84903117949
-
Modeling timed systems
-
In C. Ptolemaeus, editor Ptolemy.org
-
J. Cardoso, P. Derler, J. C. Eidson, E. A. Lee, S. Matic, Y. Zhao, and J. Zou. Modeling timed systems. In C. Ptolemaeus, editor, System Design, Modeling, and Simulation using Ptolemy II, page 355. Ptolemy.org, 2014.
-
(2014)
System Design, Modeling, and Simulation using Ptolemy II
, pp. 355
-
-
Cardoso, J.1
Derler, P.2
Eidson, J.C.3
Lee, E.A.4
Matic, S.5
Zhao, Y.6
Zou, J.7
-
8
-
-
0242444222
-
Taming heterogeneity-The ptolemy approach
-
J. Eker, J. W. Janneck, E. A. Lee, J. Liu, X. Liu, J. Ludvig, S. Sachs, Y. Xiong, and S. Neuendorfier. Taming heterogeneity-the ptolemy approach. Proceedings of the IEEE, 91(1):127-144, 2003.
-
(2003)
Proceedings of the IEEE
, vol.911
, pp. 127-144
-
-
Eker, J.1
Janneck, J.W.2
Lee, E.A.3
Liu, J.4
Liu, X.5
Ludvig, J.6
Sachs, S.7
Xiong, Y.8
Chakraborty, S.9
-
10
-
-
0003880013
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1995.
-
(1995)
Design Patterns: Elements Of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
11
-
-
60849085437
-
An aspect-oriented methodology for designing secure applications
-
G. Georg, I. Ray, K. Anastasakis, B. Bordbar, M. Toahchoodee, and S. H. Houmb. An aspect-oriented methodology for designing secure applications. Information and Software Technology, 51(5):846-864, 2009.
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 846-864
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.H.6
-
13
-
-
0000498999
-
Aspect-oriented programming
-
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J. Marc Loingtier, and J. Irwin. Aspect-oriented programming. In ECOOP. SpringerVerlag, 1997.
-
(1997)
ECOOP. SpringerVerlag
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.5
Marc Loingtier, J.6
Irwin, J.7
-
16
-
-
77956210272
-
Cps foundations
-
New York, NY, USA, ACM
-
E. A. Lee. CPS foundations. In Proceedings of the 47th Design Automation Conference, DAC '10, pages 737-742, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 47th Design Automation Conference, DAC '10
, pp. 737-742
-
-
Lee, E.A.1
-
17
-
-
77249176767
-
Scalable semantic annotation using lattice-based ontologies
-
ACM/IEEE, October (recipient of the MODELS 2009 Distinguished Paper Award
-
J. M.-K. Leung, T. Mandl, E. A. Lee, E. Latronico, C. Shelton, S. Tripakis, and B. Lickly. Scalable semantic annotation using lattice-based ontologies. In 12th International Conference on Model Driven Engineering Languages and Systems, pages 393-407. ACM/IEEE, October 2009. (recipient of the MODELS 2009 Distinguished Paper Award).
-
(2009)
12th International Conference on Model Driven Engineering Languages and Systems
, pp. 393-407
-
-
Leung, J.M.-K.1
Mandl, T.2
Lee, E.A.3
Latronico, E.4
Shelton, C.5
Tripakis, S.6
Lickly, B.7
-
19
-
-
84887278643
-
Attack detection and identification in cyber-physical systems
-
F. Pasqualetti, F. Dorer, and F. Bullo. Attack detection and identification in cyber-physical systems. Automatic Control, IEEE Transactions on, 58(11):2715-2729, 2013.
-
(2013)
Automatic Control IEEE Transactions on
, vol.58
, Issue.11
, pp. 2715-2729
-
-
Pasqualetti, F.1
Dorer, F.2
Bullo, F.3
-
23
-
-
33646524687
-
Threat-driven modeling and verification of secure software using aspect-oriented petri nets
-
D. Xu and K. Nygard. Threat-driven modeling and verification of secure software using aspect-oriented petri nets. Software Engineering, IEEE Transactions on, 32(4):265-278, 2006.
-
(2006)
Software Engineering IEEE Transactions on
, vol.32
, Issue.4
, pp. 265-278
-
-
Xu, D.1
Nygard, K.2
|