-
2
-
-
84969857140
-
-
The SecFutur project: Design of Secure and Energy-efficient Embedded Systems for Future Internet Application
-
The SecFutur project: Design of Secure and Energy-efficient Embedded Systems for Future Internet Application. http://www.secfutur.eu
-
-
-
-
4
-
-
84969905406
-
-
DHS Risk Lexicon. Technical report
-
DHS Risk Lexicon. Technical report, DHS Risk Steering Committee (2010)
-
(2010)
DHS Risk Steering Committee
-
-
-
5
-
-
84879205852
-
A stochastic model of attack process for the evaluation of security metrics
-
(Elsevier)
-
Almasizadeh, J., Azgomi, M.A.: A stochastic model of attack process for the evaluation of security metrics. J. Compt. Networks 57(10), 2159–2180 (2013). (Elsevier)
-
(2013)
J. Compt. Networks
, vol.57
, Issue.10
, pp. 2159-2180
-
-
Almasizadeh, J.1
Azgomi, M.A.2
-
6
-
-
84900528864
-
Time-dependent analysis of attacks
-
Abadi, M., Kremer, S. (eds.), Springer, Heidelberg
-
Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014 (ETAPS 2014). LNCS, vol. 8414, pp. 285–305. Springer, Heidelberg (2014)
-
(2014)
POST 2014 (ETAPS 2014). LNCS
, vol.8414
, pp. 285-305
-
-
Arnold, F.1
Hermanns, H.2
Pulungan, R.3
Stoelinga, M.4
-
8
-
-
0028465894
-
A characterization of the stochastic process underlying a stochastic Petri net
-
Ciardo, G., German, R., Lindemann, C.: A characterization of the stochastic process underlying a stochastic Petri net. IEEE Trans. Softw. Eng. 20(7), 506–515 (1994)
-
(1994)
IEEE Trans. Softw. Eng
, vol.20
, Issue.7
, pp. 506-515
-
-
Ciardo, G.1
German, R.2
Lindemann, C.3
-
9
-
-
84885779641
-
Petri net modelling of physical vulnerability
-
Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.), Springer, Heidelberg
-
Flammini, F., Marrone, S., Mazzocca, N., Vittorini, V.: Petri net modelling of physical vulnerability. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 128–139. Springer, Heidelberg (2013)
-
(2013)
CRITIS 2011. LNCS
, vol.6983
, pp. 128-139
-
-
Flammini, F.1
Marrone, S.2
Mazzocca, N.3
Vittorini, V.4
-
10
-
-
0003684449
-
-
Springer, New York
-
Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Springer, New York (2009)
-
(2009)
The Elements of Statistical Learning: Data Mining, Inference, and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
11
-
-
84892369897
-
The COMPLEX methodology for UML/MARTE modeling and sesign space exploration of embedded systems
-
(Elsevier)
-
Herrera, F., Posadas, H., Peñil, P., Villar, E., Ferrero, F., Valencia, R., Palermo, G.: The COMPLEX methodology for UML/MARTE modeling and sesign space exploration of embedded systems. J. Syst. Archit. 60(1), 55–78 (2014). (Elsevier)
-
(2014)
J. Syst. Archit
, vol.60
, Issue.1
, pp. 55-78
-
-
Herrera, F.1
Posadas, H.2
Peñil, P.3
Villar, E.4
Ferrero, F.5
Valencia, R.6
Palermo, G.7
-
14
-
-
84927691782
-
DAG-based attack and defense modeling: Don’t miss the forest for the attack trees
-
(Elsevier)
-
Kordy, B., Piètre-Cambacèdès, L., Schweitzer, P.: DAG-based attack and defense modeling: don’t miss the forest for the attack trees. Comput. Sci. Rev. 13–14, 1–38 (2014). (Elsevier)
-
(2014)
Comput. Sci. Rev
, vol.13-14
, pp. 1-38
-
-
Kordy, B.1
Piètre-Cambacèdès, L.2
Schweitzer, P.3
-
15
-
-
84892822999
-
-
Springer, Heidelberg
-
Lund, M.S., Solhaug, B., Stølen, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer, Heidelberg (2010)
-
(2010)
Model-Driven Risk Analysis: The CORAS Approach
-
-
Lund, M.S.1
Solhaug, B.2
Stølen, K.3
-
16
-
-
1042277255
-
A method for modeling and quantifying the security attributes of intrusion tolerant systems
-
(Elsevier)
-
Madan, B.B., Goševa-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Perform. Eval. 56(1–4), 167–186 (2004). (Elsevier)
-
(2004)
Perform. Eval
, vol.56
, Issue.1-4
, pp. 167-186
-
-
Madan, B.B.1
Goševa-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
17
-
-
84890495850
-
A formal verification framework for SysML activity diagrams
-
Ouchani, S., Mohamed, O., Debbabi, M.: A formal verification framework for SysML activity diagrams. J. Expert Syst. Appl. 41(6), 2713–2728 (2014)
-
(2014)
J. Expert Syst. Appl
, vol.41
, Issue.6
, pp. 2713-2728
-
-
Ouchani, S.1
Mohamed, O.2
Debbabi, M.3
-
18
-
-
0030173192
-
Current approaches to handling imperfect information in data and knowledge bases
-
Parsons, S.: Current approaches to handling imperfect information in data and knowledge bases. IEEE Trans. Knowl. Data Eng. 8(3), 353–372 (1996)
-
(1996)
IEEE Trans. Knowl. Data Eng
, vol.8
, Issue.3
, pp. 353-372
-
-
Parsons, S.1
-
19
-
-
77955417822
-
A probabilistic relational model for security risk analysis
-
(Elsevier)
-
Sommestad, T., Ekstedt, M., Johnson, P.: A probabilistic relational model for security risk analysis. Comput. Secur. 29(6), 659–679 (2010). (Elsevier)
-
(2010)
Comput. Secur
, vol.29
, Issue.6
, pp. 659-679
-
-
Sommestad, T.1
Ekstedt, M.2
Johnson, P.3
-
20
-
-
1842829828
-
SP 800–30. Risk Management Guide for Information Technology Systems
-
Stoneburner, G., Goguen, A.Y., Feringa, A.: SP 800–30. Risk Management Guide for Information Technology Systems. In: NIST (2002)
-
(2002)
NIST
-
-
Stoneburner, G.1
Goguen, A.Y.2
Feringa, A.3
-
21
-
-
84911899842
-
Integrating security mechanisms into embedded systems by domain-specific modelling
-
(Wiley)
-
Vasilevskaya, M., Gunawan, L.A., Nadjm-Tehrani, S., Herrmann, P.: Integrating security mechanisms into embedded systems by domain-specific modelling. J. Secur. Commun. Networks 7(12), 2815–2832 (2013). (Wiley)
-
(2013)
J. Secur. Commun. Networks
, vol.7
, Issue.12
, pp. 2815-2832
-
-
Vasilevskaya, M.1
Gunawan, L.A.2
Nadjm-Tehrani, S.3
Herrmann, P.4
-
23
-
-
77950875313
-
Quantified security is a weak hypothesis: A critical survey of results and assumptions
-
Verendel, V.: Quantified security is a weak hypothesis: a critical survey of results and assumptions. In: New Security Paradigms Workshop. ACM (2009)
-
(2009)
New Security Paradigms Workshop. ACM
-
-
Verendel, V.1
|