-
1
-
-
68949145137
-
Attack taxonomies for the modbus protocols
-
no. 0
-
P. Huitsing, R. Chandia, M. Papa, and S. Shenoi, "Attack taxonomies for the modbus protocols," International Journal of Critical Infrastructure Protection, vol. 1, no. 0, pp. 37-44, 2008.
-
(2008)
International Journal of Critical Infrastructure Protection
, vol.1
, pp. 37-44
-
-
Huitsing, P.1
Chandia, R.2
Papa, M.3
Shenoi, S.4
-
3
-
-
79960222774
-
Security mutants for property-based testing
-
Springer
-
M. Büchler, J. Oudinet, and A. Pretschner, "Security mutants for property-based testing," in Tests and Proofs. Springer, 2011, pp. 69-77.
-
(2011)
Tests and Proofs
, pp. 69-77
-
-
Büchler, M.1
Oudinet, J.2
Pretschner, A.3
-
4
-
-
78649830160
-
Security testing by telling teststories
-
M. Felderer, B. Agreiter, R. Breu, and A. Armenteros, "Security testing by telling teststories," in Proceedings of the Modellierung, 2010.
-
Proceedings of the Modellierung, 2010
-
-
Felderer, M.1
Agreiter, B.2
Breu, R.3
Armenteros, A.4
-
5
-
-
77953758046
-
Model-Checking Driven Security Testing of Web-Based Applications
-
apr
-
A. Armando, R. Carbone, L. Compagna, K. Li, and G. Pellegrino, "Model-Checking Driven Security Testing of Web-Based Applications," 3rd. Intl. Conf. ICSTW, pp. 361-370, apr 2010.
-
(2010)
3rd. Intl. Conf. ICSTW
, pp. 361-370
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Li, K.4
Pellegrino, G.5
-
6
-
-
50949097831
-
Prevention of impersonation attack in wireless mobile ad hoc networks
-
L. Tamilselvan and D. V. Sankaranarayanan, "Prevention of impersonation attack in wireless mobile ad hoc networks," Intl. Journal of Computer Science and Network Security, vol. 7, no. 3, pp. 118-123, 2007.
-
(2007)
Intl. Journal of Computer Science and Network Security
, vol.7
, Issue.3
, pp. 118-123
-
-
Tamilselvan, L.1
Sankaranarayanan, D.V.2
-
9
-
-
80053619834
-
A survey of communication/networking in smart grids
-
J. Gao, Y. Xiao, J. Liu, W. Liang, and C. P. Chen, "A survey of communication/networking in smart grids," Future Generation Computer Systems, vol. 28, no. 2, pp. 391-404, 2012.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.2
, pp. 391-404
-
-
Gao, J.1
Xiao, Y.2
Liu, J.3
Liang, W.4
Chen, C.P.5
-
10
-
-
84856619483
-
Eliciting unitary constraints from timed sequence diagram with symbolic techniques: Application to testing
-
IEEE
-
B. Bannour, C. Gaston, and D. Servat, "Eliciting unitary constraints from timed sequence diagram with symbolic techniques: application to testing," in 18th APSEC. IEEE, 2011.
-
(2011)
18th APSEC
-
-
Bannour, B.1
Gaston, C.2
Servat, D.3
-
11
-
-
84875747087
-
Cyber security in the smart grid: Survey and challenges
-
W. Wang and Z. Lu, "Cyber security in the smart grid: Survey and challenges," Computer Networks, vol. 57, no. 5, pp. 1344-1371, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.5
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
-
12
-
-
84903595278
-
-
CEA LIST
-
CEA LIST, "Papyrus," http://www.eclipse.org/papyrus/.
-
Papyrus
-
-
-
13
-
-
84869986985
-
Off-line test case generation for timed symbolic model-based conformance testing
-
Springer
-
B. Bannour, J. P. Escobedo, C. Gaston, and P. Le Gall, "Off-line test case generation for timed symbolic model-based conformance testing," in Testing Software and Systems. Springer, 2012, pp. 119-135.
-
(2012)
Testing Software and Systems
, pp. 119-135
-
-
Bannour, B.1
Escobedo, J.P.2
Gaston, C.3
Le Gall, P.4
-
15
-
-
84871940259
-
Incremental symbolic conformance testing from uml marte sequence diagrams: Railway use case
-
IEEE
-
B. Bannour, C. Gaston, A. Lapitre, and J. P. Escobedo, "Incremental symbolic conformance testing from uml marte sequence diagrams: railway use case," in 14th Intl Symposium HASE. IEEE, 2012, pp. 9-16.
-
(2012)
14th Intl Symposium HASE
, pp. 9-16
-
-
Bannour, B.1
Gaston, C.2
Lapitre, A.3
Escobedo, J.P.4
|