-
2
-
-
14744271696
-
Software penetration testing
-
Arkin, B., Stender, S., McGraw, G., "Software penetration testing". Security & Privacy, IEEE, 3:84-87, 2005.
-
(2005)
Security & Privacy, IEEE
, vol.3
, pp. 84-87
-
-
Arkin, B.1
Stender, S.2
McGraw, G.3
-
3
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr. C., "Basic concepts and taxonomy of dependable and secure computing", Dependable and Secure Computing, IEEE Transactions on, 1:11-33, 2004.
-
(2004)
Dependable and Secure Computing, IEEE Transactions on
, vol.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
4
-
-
84879835905
-
Automotive functional safety = safety + security
-
In, pages New York, NY, USA, ACM
-
Burton, S., Likkei, J., Vembar P., Wolf, M., "Automotive functional safety = safety + security",. In First International Conference on Security of Internet of Things, pages 150-159, New York, NY, USA, 2012, ACM.
-
(2012)
First International Conference on Security of Internet of Things
, pp. 150-159
-
-
Burton, S.1
Likkei, J.2
Vembar, P.3
Wolf, M.4
-
5
-
-
84903396724
-
BYD's Two New Models and Three World-Class Technologies to Premiere at 2012 Beijing International Automotive Exhibition
-
BYD Auto, "", April
-
BYD Auto, "BYD's Two New Models and Three World-Class Technologies to Premiere at 2012 Beijing International Automotive Exhibition", http://www.energytrend.com/news/BYD_EV_20120419.html, April 2012.
-
(2012)
-
-
-
6
-
-
84891584966
-
Effective FMEAs: Achieving Safe, Reliable, and Economical Products and Processes Using Failure Mode and Effects Analysis
-
Wiley
-
Carlson, C., "Effective FMEAs: Achieving Safe, Reliable, and Economical Products and Processes Using Failure Mode and Effects Analysis". Quality and Reliability Engineering Series. Wiley, 2012.
-
(2012)
Quality and Reliability Engineering Series
-
-
Carlson, C.1
-
7
-
-
84878802635
-
System Security and System Safety Engineering: Differences and Similarities and a System Security Engineering Process Based on the ISO 26262 Process Framework
-
doi: 10.4271/2013-01-1419
-
Czerny, B., "System Security and System Safety Engineering: Differences and Similarities and a System Security Engineering Process Based on the ISO 26262 Process Framework," SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 6(1):349-359, 2013, doi:10.4271/2013-01-1419.
-
(2013)
SAE Int. J. Passeng. Cars - Electron. Electr. Syst.
, vol.6
, Issue.1
, pp. 349-359
-
-
Czerny, B.1
-
8
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D., "A lattice model of secure information flow". Communications of the ACM, 19:236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, pp. 236-243
-
-
Denning, D.1
-
9
-
-
51849131973
-
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
-
of, pages Springer Berlin Heidelberg
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M., "On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme", volume 5157 of Lecture Notes in Computer Science, pages 203-220. Springer Berlin Heidelberg, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5157
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.6
-
11
-
-
84903396726
-
Car-2-X Challenges - Dreams and Nightmares
-
In, Lausanne
-
Gansen, T., Wischhof, L., Ebner, A., "Car-2-X Challenges - Dreams and Nightmares" In Sevecom Workshop on Workshop on Results and Challenges Ahead for Vehicle Communication, Lausanne, 2008.
-
(2008)
Sevecom Workshop on Workshop on Results and Challenges Ahead for Vehicle Communication
-
-
Gansen, T.1
Wischhof, L.2
Ebner, A.3
-
13
-
-
84903376690
-
Common Criteria for Information Technology Security Evaluation
-
International Organization for Standardization, September
-
International Organization for Standardization, Common Criteria for Information Technology Security Evaluation, Technical Report ISO 15408, September 2012.
-
(2012)
Technical Report ISO 15408
-
-
-
14
-
-
77950393615
-
Road vehicles - Functional safety
-
International Organization for Standardization, November
-
International Organization for Standardization, Road vehicles - Functional safety, Technical Report ISO 26262, November 2011.
-
(2011)
Technical Report ISO 26262
-
-
-
16
-
-
20444498659
-
-
pages Springer
-
Jajodia, S., Noel, S., O'Berry. B., "Topological analysis of network attack vulnerability", pages 247-266. Springer, 2005.
-
(2005)
Topological Analysis of Network Attack Vulnerability
, pp. 247-266
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
17
-
-
84948760464
-
Two formal analyses of attack graphs
-
In, pages IEEE
-
Jha, S., Sheyner, O., Wing, J., "Two formal analyses of attack graphs", In Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE, pages 49-63. IEEE, 2002.
-
(2002)
Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE
, pp. 49-63
-
-
Jha, S.1
Sheyner, O.2
Wing, J.3
-
18
-
-
84899735434
-
Being Vulnerable to the Threat of Confusing Threats with Vulnerabilities
-
Viewpoint Paper
-
Johnston, R., "Being Vulnerable to the Threat of Confusing Threats with Vulnerabilities", Viewpoint Paper. Journal of Physical Security, 4:30-34, 2010.
-
(2010)
Journal of Physical Security
, vol.4
, pp. 30-34
-
-
Johnston, R.1
-
19
-
-
84903373937
-
Qualitative and quantitative reliability analysis of safety systems
-
Energy Laboratory and Department of Nuclear Engineering, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139, May
-
Karimi, R., Rasmussen, N., Wolf. L., "Qualitative and quantitative reliability analysis of safety systems", Technical Report MIT-EL 80-015, Energy Laboratory and Department of Nuclear Engineering, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139, May 1980.
-
(1980)
Technical Report MIT-EL 80-015
-
-
Karimi, R.1
Rasmussen, N.2
Wolf, L.3
-
20
-
-
84876010663
-
Attack-Defense Trees
-
Kordy, B., Mauw, S., Radomirovic, S., Schweitzer, P., "Attack-Defense Trees", Journal of Logic and Computation, 2012.
-
(2012)
Journal of Logic and Computation
-
-
Kordy, B.1
Mauw, S.2
Radomirovic, S.3
Schweitzer, P.4
-
21
-
-
84903396727
-
Utilization of customer-relevant driving behavior for reliable friction potential estimation by scaling nonlinear tyre models
-
In, Stuttgart, Stuttgarter Symposium
-
Kroll, H.-M., Schmidt, K., Buschardt, B., Lienkamp, M., "Utilization of customer-relevant driving behavior for reliable friction potential estimation by scaling nonlinear tyre models", In 14th Stuttgart International Symposium Automotive and Engine Technology, Stuttgart, 2014. Stuttgarter Symposium.
-
(2014)
14th Stuttgart International Symposium Automotive and Engine Technology
-
-
Kroll, H.-M.1
Schmidt, K.2
Buschardt, B.3
Lienkamp, M.4
-
22
-
-
0003414571
-
-
Springer-Verlag, Secaucus, NJ, USA
-
Laprie, J. C., Avizienis, A., Kopetz, H., "Dependability: Basic Concepts and Terminology", Springer-Verlag, Secaucus, NJ, USA, 1992.
-
(1992)
Dependability: Basic Concepts and Terminology
-
-
Laprie, J.C.1
Avizienis, A.2
Kopetz, H.3
-
24
-
-
84961819547
-
An outline of a taxonomy of computer security research and development
-
In, pages
-
Meadows, C., "An outline of a taxonomy of computer security research and development", In New Security Paradigms Workshop: Proceedings on the 1992-1993 workshop on New security paradigms, volume 1993, pages 33-35, 1993.
-
(1993)
New Security Paradigms Workshop: Proceedings on the 1992-1993 Workshop on New Security Paradigms
, vol.1993
, pp. 33-35
-
-
Meadows, C.1
-
25
-
-
0037251378
-
Language-based information flow security
-
Sabelfeld, A., Myers A.C., "Language-based information flow security", Selected Areas in Communications, IEEE Journal on, 21:5-19, 2003.
-
(2003)
Selected Areas in Communications, IEEE Journal on
, vol.21
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
26
-
-
84881205507
-
Secure Key Management - A Key Feature for Modern Vehicle Electronics
-
doi: 10.4271/2013-01-1418
-
Schleiffer, C., Wolf, M., Weimerskirch, A., and Wolleschensky, L., "Secure Key Management - A Key Feature for Modern Vehicle Electronics," SAE Technical Paper 2013-01-1418, 2013, doi:10.4271/2013-01-1418.
-
(2013)
SAE Technical Paper 2013-01-1418
-
-
Schleiffer, C.1
Wolf, M.2
Weimerskirch, A.3
Wolleschensky, L.4
-
28
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
In, pages IEEE
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing. J., "Automated generation and analysis of attack graphs". In Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, pages 273-284. IEEE, 2002.
-
(2002)
Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.5
-
29
-
-
80755131380
-
Experiences threat modeling at Microsoft
-
In. Dept. of Computing, Lancaster University, UK
-
Shostack, A., "Experiences threat modeling at Microsoft", In Modeling Security Workshop. Dept. of Computing, Lancaster University, UK, 2008.
-
(2008)
Modeling Security Workshop
-
-
Shostack, A.1
-
30
-
-
80755131380
-
Experiences Threat Modeling at Microsoft
-
In, Toulouse, September
-
Shostack, A., "Experiences Threat Modeling at Microsoft", In Workshop on Modeling Security, Toulouse, September 2008.
-
(2008)
Workshop on Modeling Security
-
-
Shostack, A.1
-
31
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl, A., "Eliciting security requirements with misuse cases", Requirements Engineering, 10:34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.2
-
32
-
-
44149112234
-
-
Pearson Education
-
Sutton, M., Greene, A., Amini P., "Fuzzing: brute force vulnerability discovery", Pearson Education, 2007.
-
(2007)
Fuzzing: Brute Force Vulnerability Discovery
-
-
Sutton, M.1
Greene, A.2
Amini, P.3
-
33
-
-
84878771276
-
Threat Analysis and Risk Assessment in Automotive Cyber Security
-
doi: 10.4271/2013-01-1415
-
Ward, D., Ibarra, I., and Ruddle, A., "Threat Analysis and Risk Assessment in Automotive Cyber Security," SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 6(2):507-513, 2013, doi:10.4271/2013-01-1415.
-
(2013)
SAE Int. J. Passeng. Cars - Electron. Electr. Syst.
, vol.6
, Issue.2
, pp. 507-513
-
-
Ward, D.1
Ibarra, I.2
Ruddle, A.3
-
34
-
-
85072499070
-
Do Vehicles Need Data Security?
-
doi: 10.4271/2011-01-0040
-
Weimerskirch, A., "Do Vehicles Need Data Security?," SAE Technical Paper 2011-01-0040, 2011, doi:10.4271/2011-01-0040.
-
(2011)
SAE Technical Paper 2011-01-0040
-
-
Weimerskirch, A.1
-
35
-
-
85072355956
-
Introduction to Vehicular Embedded Security
-
doi: 10.4271/2009-01-0916
-
Weimerskirch, A., Wolf, M., and Wollinger, T., "Introduction to Vehicular Embedded Security," SAE Technical Paper 2009-01-0916, 2009, doi:10.4271/2009-01-0916.
-
(2009)
SAE Technical Paper 2009-01-0916
-
-
Weimerskirch, A.1
Wolf, M.2
Wollinger, T.3
-
36
-
-
84874007526
-
A Systematic Approach to a Quantified Security Risk Analysis for Vehicular IT Systems
-
In, pages GI, November
-
Wolf, M. Scheibel, M., "A Systematic Approach to a Quantified Security Risk Analysis for Vehicular IT Systems", In Automotive - Safety & Security 2012, volume 210, pages 195-210. GI, November 2012.
-
(2012)
Automotive - Safety & Security 2012
, vol.210
, pp. 195-210
-
-
Wolf, M.1
Scheibel, M.2
|