-
1
-
-
84860619315
-
Reducing the window of opportunity for android malware. Gotta catch'em all
-
Apvrille, A. and Strazzere, T. (2012). Reducing the window of opportunity for android malware. gotta catch'em all. Journal in Computer Virology, 8(1-2):61-71.
-
(2012)
Journal in Computer Virology
, vol.8
, Issue.1-2
, pp. 61-71
-
-
Apvrille, A.1
Strazzere, T.2
-
2
-
-
84883705094
-
Prototyping an embedded automotive system from its uml/sysml models
-
Toulouse, France
-
Apvrille, L. and Becoulet, A. (2012). Prototyping an Embedded Automotive System from its UML/SysML Models. In ERTSS'2012, Toulouse, France.
-
(2012)
ERTSS'2012
-
-
Apvrille, L.1
Becoulet, A.2
-
3
-
-
84939482266
-
Avatar/ttool : Un environnement en mode libre pour sysml temps réel
-
Apvrille, L. and De Saqui Sannes, P. (2011). AVATAR/TTool : un environnement en mode libre pour SysML temps réel. Génie Logiciel, (98):22-26.
-
(2011)
Génie Logiciel
, vol.98
, pp. 22-26
-
-
Apvrille, L.1
De Saqui Sannes, P.2
-
5
-
-
84939525729
-
Real-time distributed systems dimensioning and validation: The turtle method
-
Apvrille, L., Mifdaoui, A., and De Saqui-Sannes, P. (2010). Real-time distributed systems dimensioning and validation: The turtle method. Studia Informatica Universalis, 8(3):47-69.
-
(2010)
Studia Informatica Universalis
, vol.8
, Issue.3
, pp. 47-69
-
-
Apvrille, L.1
Mifdaoui, A.2
De Saqui-Sannes, P.3
-
6
-
-
47349122916
-
A uml-based environment for system design space exploration
-
Apvrille, L., Muhammad, W., Ameur-Boulifa, R., Coudert, S., and Pacalet, R. (2006). A UML-Based Environment for System Design Space Exploration. In Electronics, Circuits and Systems, 2006. ICECS '06. 13th IEEE International Conference on, pages 1272-1275.
-
(2006)
Electronics, Circuits and Systems, 2006. ICECS '06. 13th IEEE International Conference on
, pp. 1272-1275
-
-
Apvrille, L.1
Muhammad, W.2
Ameur-Boulifa, R.3
Coudert, S.4
Pacalet, R.5
-
7
-
-
84939519037
-
Sysml-sec: A sysml environment for the design and development of secure embedded systems
-
Yokohama, Japan
-
Apvrille, L. and Roudier, Y. (2013). SysML-Sec: A SysML environment for the design and development of secure embedded systems. In APCOSEC 2013, Yokohama, Japan.
-
(2013)
APCOSEC 2013
-
-
Apvrille, L.1
Roudier, Y.2
-
8
-
-
26444497860
-
The avispa tool for the automated validation of internet security protocols and applications
-
In Etessami, K. and Rajamani, S., editors, of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P., Hem, P., Kouchnarenko, O., Mantovani, J., Mdersheim, S., Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Vigan, L., and Vigneron, L. (2005). The avispa tool for the automated validation of internet security protocols and applications. In Etessami, K. and Rajamani, S., editors, Computer Aided Verification, volume 3576 of Lecture Notes in Computer Science, pages 281-285. Springer Berlin Heidelberg.
-
(2005)
Computer Aided Verification
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.7
Hem, P.8
Kouchnarenko, O.9
Mantovani, J.10
Mdersheim, S.11
Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigan, L.16
Vigneron, L.17
-
10
-
-
0344951184
-
Metropolis: An integrated electronic system design environment
-
Balarin, F., Watanabe, Y., Hsieh, H., Lavagno, L., Passerone, C., and Sangiovanni-Vincentelli, A. (2003). Metropolis: An Integrated Electronic System Design Environment. Computer, 36(4):45-52.
-
(2003)
Computer
, vol.36
, Issue.4
, pp. 45-52
-
-
Balarin, F.1
Watanabe, Y.2
Hsieh, H.3
Lavagno, L.4
Passerone, C.5
Sangiovanni-Vincentelli, A.6
-
12
-
-
35048861846
-
Timed automata: Semantics, algorithms and tools
-
W. Reisig and G. Rozenberg (eds.), LNCS 3098, Springer-Verlag
-
Bengtsson, J. and Yi., W. (2004). Timed automata: Semantics, algorithms and tools. In Lecture Notes on Concurrency and Petri Nets, pages 87-124. W. Reisig and G. Rozenberg (eds.), LNCS 3098, Springer-Verlag.
-
(2004)
Lecture Notes on Concurrency and Petri Nets
, pp. 87-124
-
-
Bengtsson, J.1
Yi, W.2
-
13
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
Blanchet, B. (2009). Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security, 17(4):363-434.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
14
-
-
84961326729
-
The integration of safety and security requirements
-
D. P. Eames, D. P. and Moffett, J. (1999). The integration of safety and security requirements. In SAFECOMP, pages 468-480.
-
(1999)
SAFECOMP
, pp. 468-480
-
-
Eames, D.P.D.P.1
Moffett, J.2
-
15
-
-
84938714733
-
Exploiting the ios kernel
-
Esser, S. (2011). Exploiting the iOS Kernel. In BlackHat 2011.
-
(2011)
BlackHat 2011
-
-
Esser, S.1
-
16
-
-
46449100024
-
Cadp 2006: A toolbox for the construction and analysis of distributed processes
-
Garavel, H., Lang, F., Mateescu, R., and Serwe, W. (2007). CADP 2006: A Toolbox for the Construction and Analysis of Distributed Processes. In Proceedings of the 19th International Conference on Computer Aided Verification CAV 2007.
-
(2007)
Proceedings of the 19th International Conference on Computer Aided Verification CAV 2007
-
-
Garavel, H.1
Lang, F.2
Mateescu, R.3
Serwe, W.4
-
17
-
-
0742293360
-
-
AI Memo 2002-008, Massachusetts Institute of Technology, Artificial Intelligence Laboratory. Technical report
-
Huang, A. (2002). Keeping Secrets in Hardware: the Microsoft XBox Case Study, AI Memo 2002-008, Massachusetts Institute of Technology, Artificial Intelligence Laboratory. Technical report.
-
(2002)
Keeping Secrets in Hardware: The Microsoft Xbox Case Study
-
-
Huang, A.1
-
19
-
-
77950397788
-
-
Technical Report Deliverable D2.1, EVITA Project
-
Kelling, E., Friedewald, M., Leimbach, T., Menzel, M., Säger, P., Seudié, H., and Weyl, B. (2009). Specification and Evaluation of e-Security Relevant Use cases. Technical Report Deliverable D2.1, EVITA Project.
-
(2009)
Specification and Evaluation of e-Security Relevant Use Cases
-
-
Kelling, E.1
Friedewald, M.2
Leimbach, T.3
Menzel, M.4
Säger, P.5
Seudié, H.6
Weyl, B.7
-
20
-
-
80855147327
-
Tepe: A sysml language for time-constrained property modeling and formal verification
-
Knorreck, D., Apvrille, L., and De Saqui-Sannes, P. (2011). TEPE: A SysML Language for Time-Constrained Property Modeling and Formal Verification. ACM SIGSOFT Software Engineering Notes, 36(1):1-8.
-
(2011)
ACM SIGSOFT Software Engineering Notes
, vol.36
, Issue.1
, pp. 1-8
-
-
Knorreck, D.1
Apvrille, L.2
De Saqui-Sannes, P.3
-
22
-
-
84939549704
-
Russian cybercriminals on the move: Profiting from mobile malware
-
Vancouver, Canada
-
Maslennikov, D. (2010). Russian cybercriminals on the move: profiting from mobile malware. In The 20th Virus Bulletin Internation Conference, pages 84-89, Vancouver, Canada.
-
(2010)
The 20th Virus Bulletin Internation Conference
, pp. 84-89
-
-
Maslennikov, D.1
-
23
-
-
84939528495
-
Scada security and terrorism: We're not crying Wolf
-
available at:, USA
-
Maynor, D. (2006). Scada security and terrorism: We're not crying wolf! In Invited presentation at BlackHat BH 2006. Presentation available at: https://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Maynor-Graham-up.pdf, USA.
-
(2006)
Invited Presentation at BlackHat BH 2006. Presentation
-
-
Maynor, D.1
-
24
-
-
84885584234
-
-
Technical Report 1, The Open University
-
Nhlabatsi, A., Nuseibeh, B., and Yu, Y. (2010). Security Requirements Engineering for Evolving Software Systems: a survey. Technical Report 1, The Open University.
-
(2010)
Security Requirements Engineering for Evolving Software Systems: A Survey
-
-
Nhlabatsi, A.1
Nuseibeh, B.2
Yu, Y.3
-
25
-
-
85008523798
-
Weaving together requirements and architectures
-
Nuseibeh, B. (2001). Weaving Together Requirements and Architectures. IEEE Computer, 34(3):115-117.
-
(2001)
IEEE Computer
, vol.34
, Issue.3
, pp. 115-117
-
-
Nuseibeh, B.1
-
26
-
-
84939492956
-
Omg profile for scheduling
-
OMG
-
OMG (2005). OMG Profile for Scheduling, Performance and Time. In http://www.omg.org/spec/SPTP/.
-
(2005)
Performance and Time
-
-
-
29
-
-
84868221170
-
Crossfertilization between safety and security engineering
-
Pietre-Cambacedes, L. and Bouissou, M. (2013). Crossfertilization between safety and security engineering. Rel. Eng. & Sys. Safety, 110:110-126.
-
(2013)
Rel. Eng. & Sys. Safety
, vol.110
, pp. 110-126
-
-
Pietre-Cambacedes, L.1
Bouissou, M.2
-
31
-
-
84875249203
-
Comparing risk identification techniques for safety and security requirements
-
Raspotnig, C. and Opdahl, A. L. (2013). Comparing risk identification techniques for safety and security requirements. Journal of Systems and Software, 86(4):1124-1151.
-
(2013)
Journal of Systems and Software
, vol.86
, Issue.4
, pp. 1124-1151
-
-
Raspotnig, C.1
Opdahl, A.L.2
-
33
-
-
84936783672
-
C2x communication: Securing the last meter
-
San Francisco, USA
-
Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L., and Scheuermann, D. (2011). C2X communication: Securing the last meter. In The 4th IEEE International Symposium on Wireless Vehicular Communications: WIVEC2011, San Francisco, USA.
-
(2011)
The 4th IEEE International Symposium on Wireless Vehicular Communications: WIVEC2011
-
-
Schweppe, H.1
Roudier, Y.2
Weyl, B.3
Apvrille, L.4
Scheuermann, D.5
-
34
-
-
84889049571
-
Aircraft hacking
-
Amsterdam, The Netherlands
-
Teso, H. (2013). Aircraft Hacking. In HITB Security Conference, Amsterdam, The Netherlands.
-
(2013)
HITB Security Conference
-
-
Teso, H.1
-
35
-
-
69549136179
-
Engineering requirements for system reliability and security
-
Van Lamsweerde, A. (2007). Engineering Requirements for System Reliability and Security. Software System Reliability and Security, 9:196-238.
-
(2007)
Software System Reliability and Security
, vol.9
, pp. 196-238
-
-
Van Lamsweerde, A.1
-
36
-
-
70350043918
-
A co-design approach for embedded system modeling and code generation with uml and marte
-
Vidal, J., de Lamotte, F., Gogniat, G., Soulard, P., and Diguet, J.-P. (2009). A Co-Design Approach for Embedded System Modeling and Code Generation with UML and MARTE. In Design, Automation and Test in Europe Conference and Exhibition, 2009. DATE'09, pages 226-231.
-
(2009)
Design, Automation and Test in Europe Conference and Exhibition, 2009. DATE'09
, pp. 226-231
-
-
Vidal, J.1
De Lamotte, F.2
Gogniat, G.3
Soulard, P.4
Diguet, J.-P.5
|