-
2
-
-
33746896991
-
De-risking safety [military safety systems]
-
Lautieri, S.: De-risking safety [military safety systems]. Computing and Control Engineering 17, 38-41 (2006)
-
(2006)
Computing and Control Engineering
, vol.17
, pp. 38-41
-
-
Lautieri, S.1
-
5
-
-
0018504302
-
Software Failure Modes and Effects Analysis
-
Reifer, D.J.: Software Failure Modes and Effects Analysis. IEEE Transactions on Reliability 28(3), 247-249 (1979)
-
(1979)
IEEE Transactions on Reliability
, vol.28
, Issue.3
, pp. 247-249
-
-
Reifer, D.J.1
-
10
-
-
36048990709
-
F(I)MEA-technique of web services analysis and dependability ensuring
-
Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Rigorous Development of Complex Fault-Tolerant Systems. Springer, Heidelberg
-
Gorbenko, A., Kharchenko, V., Tarasyuk, O., Furmanov, A.: F(I)MEA-technique of web services analysis and dependability ensuring. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Rigorous Development of Complex Fault-Tolerant Systems. LNCS, vol. 4157, pp. 153-167. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4157
, pp. 153-167
-
-
Gorbenko, A.1
Kharchenko, V.2
Tarasyuk, O.3
Furmanov, A.4
-
13
-
-
0022250464
-
Dependable Computing: Concepts, Limits, Challenges
-
Laprie, J.-C.: Dependable Computing: Concepts, Limits, Challenges. Digest of Papers FTCS-15, 2-11 (1985)
-
(1985)
Digest of Papers FTCS-15
, pp. 2-11
-
-
Laprie, J.-C.1
-
15
-
-
0011326587
-
-
ISO/IEC 27005, International Organization for Standardization (ISO), International Electrotechnical Commission, IEC
-
ISO/IEC 27005, Information technology - Security techniques - Information security risk management. International Organization for Standardization (ISO), International Electrotechnical Commission, IEC (2008)
-
(2008)
Information Technology - Security Techniques - Information Security Risk Management
-
-
-
18
-
-
85034270484
-
Uncover Security Design Flaws Using The STRIDE Approach
-
Shostack., A., Lambert., S., Ostwald., T., Hernan, S.: Uncover Security Design Flaws Using The STRIDE Approach. MSDN Magazine (2006)
-
(2006)
MSDN Magazine
-
-
Shostack, A.1
Lambert, S.2
Ostwald, T.3
Hernan, S.4
-
22
-
-
84907066006
-
-
Viola, N., Corpino, S., Stesina, F., Fioriti, M.: Functional Analysis in Systems Engineering: methodology and applications (2012)
-
(2012)
Functional Analysis in Systems Engineering: Methodology and Applications
-
-
Viola, N.1
Corpino, S.2
Stesina, F.3
Fioriti, M.4
-
23
-
-
11244336964
-
On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks
-
Meyer, U., Wetzel, S.: On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks. In: 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004, vol. 4, pp. 2876-2883 (2004)
-
(2004)
15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004
, vol.4
, pp. 2876-2883
-
-
Meyer, U.1
Wetzel, S.2
|