-
1
-
-
84955284071
-
-
Using Model Driven Engineering to Support Multi-paradigms Security Analysis, Springer, pp. 278–292.
-
[1] R. Abdallah, A. Motii, N. Yakymets, A. Lanusse, Using Model Driven Engineering to Support Multi-paradigms Security Analysis, Springer, pp. 278–292.
-
-
-
Abdallah, R.1
Motii, A.2
Yakymets, N.3
Lanusse, A.4
-
2
-
-
85006303173
-
-
Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study, Springer, pp. 75–94.
-
[2] S. Adepu, A. Mathur, Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study, Springer, pp. 75–94.
-
-
-
Adepu, S.1
Mathur, A.2
-
3
-
-
84939519037
-
Sysml-sec: a sysml environment for the design and development of secure embedded systems
-
[3] Apvrille, L., Roudier, Y., Sysml-sec: a sysml environment for the design and development of secure embedded systems. APCOSEC 2013, 2013.
-
(2013)
APCOSEC 2013
-
-
Apvrille, L.1
Roudier, Y.2
-
4
-
-
84952786814
-
-
A Survey on Testing for Cyber Physical System, Springer, pp. 194–207.
-
[4] S.A. Asadollah, R. Inam, H. Hansson, A Survey on Testing for Cyber Physical System, Springer, pp. 194–207.
-
-
-
Asadollah, S.A.1
Inam, R.2
Hansson, H.3
-
5
-
-
85006251707
-
Models, abstractions, and architectures: the missing links in cyber-physical systems,
-
Proceedings of the 52nd Annual Design Automation Conference, ACM, p. 82.
-
[5] B. Balaji, A. Faruque, M. Abdullah, N. Dutt, R. Gupta, Y. Agarwal, Models, abstractions, and architectures: the missing links in cyber-physical systems, in: Proceedings of the 52nd Annual Design Automation Conference, ACM, p. 82.
-
-
-
Balaji, B.1
Faruque, A.2
Abdullah, M.3
Dutt, N.4
Gupta, R.5
Agarwal, Y.6
-
6
-
-
84903649434
-
Designing sequence diagram models for robustness to attacks
-
IEEE
-
[6] Bannour, B., Escobedo, J., Gaston, C., Le Gall, P., Pedroza, G., Designing sequence diagram models for robustness to attacks. Software Testing, Verification and Validation Workshops (ICSTW) IEEE Seventh International Conference on, 2014, IEEE, 26–33.
-
(2014)
Software Testing, Verification and Validation Workshops (ICSTW), IEEE Seventh International Conference on
, pp. 26-33
-
-
Bannour, B.1
Escobedo, J.2
Gaston, C.3
Le Gall, P.4
Pedroza, G.5
-
7
-
-
85006306386
-
-
A Threat Analysis Methodology for Smart Home Scenarios, Springer, pp. 94–124.
-
[7] K. Beckers, S. Faßbender, M. Heisel, S. Suppan, A Threat Analysis Methodology for Smart Home Scenarios, Springer, pp. 94–124.
-
-
-
Beckers, K.1
Faßbender, S.2
Heisel, M.3
Suppan, S.4
-
8
-
-
85006256058
-
-
Model Driven Engineering: An Emerging Technical Space, Springer, pp. 36–64.
-
[8] J. Bézivin, Model Driven Engineering: An Emerging Technical Space, Springer, pp. 36–64.
-
-
-
Bézivin, J.1
-
9
-
-
42149158539
-
Systematic review in software engineering
-
System Engineering and Computer Science Department COPPE/UFRJ
-
[9] Biolchini, J., Mian, P.G., Natali, A.C.C., Travassos, G.H., Systematic review in software engineering. Technical Report ES 679.05, 2005, System Engineering and Computer Science Department COPPE/UFRJ.
-
(2005)
Technical Report ES 679.05
-
-
Biolchini, J.1
Mian, P.G.2
Natali, A.C.C.3
Travassos, G.H.4
-
10
-
-
0013080980
-
Computer Security: Art and Science
-
Addison-Wesley
-
[10] Bishop, M., Computer Security: Art and Science. 200, 2012, Addison-Wesley.
-
(2012)
, vol.200
-
-
Bishop, M.1
-
11
-
-
84878326137
-
Model-Driven Software Engineering in Practice
-
Morgan & Claypool Publishers
-
[11] Brambilla, M., Cabot, J., Wimmer, M., Model-Driven Software Engineering in Practice. 2012, Morgan & Claypool Publishers.
-
(2012)
-
-
Brambilla, M.1
Cabot, J.2
Wimmer, M.3
-
12
-
-
84907879362
-
Cen-cenelec-etsi smart grid co-ordination group smart grid reference architecture
-
CEN, CENELEC, ETSI
-
[12] Bruinenberg, J., Colton, L., Darmois, E., Dorn, J., Doyle, J., Elloumi, O., Englert, H., Forbes, R., Heiles, J., Hermans, P., Cen-cenelec-etsi smart grid co-ordination group smart grid reference architecture. Technical Report, 2012, CEN, CENELEC, ETSI.
-
(2012)
Technical Report
-
-
Bruinenberg, J.1
Colton, L.2
Darmois, E.3
Dorn, J.4
Doyle, J.5
Elloumi, O.6
Englert, H.7
Forbes, R.8
Heiles, J.9
Hermans, P.10
-
13
-
-
51849091527
-
Secure control: towards survivable cyber-physical systems,
-
The 28th International Conference on Distributed Computing Systems Workshops, IEEE, pp. 495–500.
-
[13] A.A. Cardenas, S. Amin, S. Sastry, Secure control: towards survivable cyber-physical systems, in: The 28th International Conference on Distributed Computing Systems Workshops, IEEE, pp. 495–500.
-
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
14
-
-
84969790733
-
-
Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective, Springer, pp. 277–290.
-
[14] B. Chen, C. Schmittner, Z. Ma, W.G. Temple, X. Dong, D.L. Jones, W.H. Sanders, Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective, Springer, pp. 277–290.
-
-
-
Chen, B.1
Schmittner, C.2
Ma, Z.3
Temple, W.G.4
Dong, X.5
Jones, D.L.6
Sanders, W.H.7
-
15
-
-
82155185229
-
Petri net modeling of cyber-physical attacks on smart grid
-
[15] Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J., Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2:4 (2011), 741–749, 10.1109/TSG.2011.2160000.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 741-749
-
-
Chen, T.M.1
Sanchez-Aarnoutse, J.C.2
Buford, J.3
-
16
-
-
52349115962
-
Role-based model security access control for smart power-grids computer networks
-
IEEE
-
[16] Cheung, H., Hamlyn, A., Mander, T., Cungang, Y., Cheung, R., Role-based model security access control for smart power-grids computer networks. Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008, IEEE, 1–7 10.1109/PES.2008.4596902.
-
(2008)
Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century
, pp. 1-7
-
-
Cheung, H.1
Hamlyn, A.2
Mander, T.3
Cungang, Y.4
Cheung, R.5
-
17
-
-
80053615106
-
A classification framework for software component models
-
[17] Crnkovic, I., Sentilles, S., Vulgarakis, A., Chaudron, M.R., A classification framework for software component models. Softw. Eng., IEEE Trans. 37:5 (2011), 593–615.
-
(2011)
Softw. Eng., IEEE Trans.
, vol.37
, Issue.5
, pp. 593-615
-
-
Crnkovic, I.1
Sentilles, S.2
Vulgarakis, A.3
Chaudron, M.R.4
-
19
-
-
62949200408
-
Strength of evidence in systematic reviews in software engineering,
-
Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, ACM, pp. 178–187.
-
[19] T. Dyba, T. Dingsȹyr, Strength of evidence in systematic reviews in software engineering, in: Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, ACM, pp. 178–187.
-
-
-
Dyba, T.1
Dingsȹyr, T.2
-
20
-
-
34250158136
-
Integrating security modeling into embedded system design,
-
Engineering of Computer-Based Systems, 2007. ECBS 07. 14th Annual IEEE International Conference and Workshops on the, IEEE, pp. 221–228.
-
[20] M. Eby, J. Werner, G. Karsai, A. Ledeczi, Integrating security modeling into embedded system design, in: Engineering of Computer-Based Systems, 2007. ECBS 07. 14th Annual IEEE International Conference and Workshops on the, IEEE, pp. 221–228.
-
-
-
Eby, M.1
Werner, J.2
Karsai, G.3
Ledeczi, A.4
-
21
-
-
84962798309
-
-
Preventing and Unifying Threats in Cyberphysical Systems, IEEE, pp. 292–293.
-
[21] E.B. Fernandez, Preventing and Unifying Threats in Cyberphysical Systems, IEEE, pp. 292–293.
-
-
-
Fernandez, E.B.1
-
22
-
-
77951749326
-
Designing secure scada systems using security patterns,
-
System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1–8.
-
[22] E.B. Fernandez, M.M. Larrondo-Petrie, Designing secure scada systems using security patterns, in: System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1–8.
-
-
-
Fernandez, E.B.1
Larrondo-Petrie, M.M.2
-
23
-
-
80052996550
-
Security requirements analysis, specification, prioritization and policy development in cyber-physical systems
-
IEEE
-
[23] Fletcher, K.K., Liu, X., Security requirements analysis, specification, prioritization and policy development in cyber-physical systems. Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 5th International Conference on, 2011, IEEE, 106–113.
-
(2011)
Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 5th International Conference on
, pp. 106-113
-
-
Fletcher, K.K.1
Liu, X.2
-
24
-
-
85006314732
-
Securecps: Defending a nanosatellite cyber-physical system,
-
SPIE Defense+ Security, International Society for Optics and Photonics, pp. 90850I–90850I–15.
-
[24] L. Forbes, H. Vu, B. Udrea, H. Hagar, X.D. Koutsoukos, M. Yampolskiy, Securecps: Defending a nanosatellite cyber-physical system, in: SPIE Defense+ Security, International Society for Optics and Photonics, pp. 90850I–90850I–15.
-
-
-
Forbes, L.1
Vu, H.2
Udrea, B.3
Hagar, H.4
Koutsoukos, X.D.5
Yampolskiy, M.6
-
25
-
-
85006295029
-
Predictions 2016: Cybersecurity Swings To Prevention
-
Forrester
-
[25] Forrester, Predictions 2016: Cybersecurity Swings To Prevention. Report, 2015, Forrester.
-
(2015)
Report
-
-
Forrester1
-
26
-
-
5744230994
-
Aspect-oriented approach to early design modelling
-
[26] France, R., Ray, I., Georg, G., Ghosh, S., Aspect-oriented approach to early design modelling. IEE Proc.-Softw. 151:4 (2004), 173–185.
-
(2004)
IEE Proc.-Softw.
, vol.151
, Issue.4
, pp. 173-185
-
-
France, R.1
Ray, I.2
Georg, G.3
Ghosh, S.4
-
27
-
-
84920971178
-
A survey on concepts, applications, and challenges in cyber-physical systems
-
[27] Gunes, V., Peter, S., Givargis, T., Vahid, F., A survey on concepts, applications, and challenges in cyber-physical systems. KSII Trans. Internet Inf. Syst., 8(12), 2014.
-
(2014)
KSII Trans. Internet Inf. Syst.
, vol.8
, Issue.12
-
-
Gunes, V.1
Peter, S.2
Givargis, T.3
Vahid, F.4
-
28
-
-
84875994202
-
Model-based intrustion detection for the smart grid (minds)
-
ACM New York, NY, USA
-
[28] Hahn, A., Govindarasu, M., Model-based intrustion detection for the smart grid (minds). Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop CSIIRW ’13, 2013, ACM, New York, NY, USA, 27:1–27:4, 10.1145/2459976.2460007.
-
(2013)
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW ’13
, pp. 271-274
-
-
Hahn, A.1
Govindarasu, M.2
-
29
-
-
85006265479
-
-
Y. Le Traon, Reactive Security for Smart Grids Using Models@ Run. Time-based Simulation and Reasoning, Springer, pp. 139–153.
-
[29] T. Hartmann, F. Fouquet, J. Klein, G. Nain, Y. Le Traon, Reactive Security for Smart Grids Using Models@ Run. Time-based Simulation and Reasoning, Springer, pp. 139–153.
-
-
-
Hartmann, T.1
Fouquet, F.2
Klein, J.3
Nain, G.4
-
30
-
-
85006295020
-
Cyber-physical systems: concepts, technologies and implementation principles,
-
Proceedings of TMCE, volume 1, pp. 7–11.
-
[30] I. Horvath, B.H. Gerritsen, Cyber-physical systems: concepts, technologies and implementation principles, in: Proceedings of TMCE, volume 1, pp. 7–11.
-
-
-
Horvath, I.1
Gerritsen, B.H.2
-
31
-
-
84964318272
-
Model-based cybersecurity assessment with nescor smart grid failure scenarios
-
[31] Jauhar, S., Binbin, C., Temple, W.G., Xinshu, D., Kalbarczyk, Z., Sanders, W.H., Nicol, D.M., Model-based cybersecurity assessment with nescor smart grid failure scenarios. Dependable Computing (PRDC) IEEE 21st Pacific Rim International Symposium on, 2015, 319–324, 10.1109/PRDC.2015.37.
-
(2015)
Dependable Computing (PRDC), IEEE 21st Pacific Rim International Symposium on
, pp. 319-324
-
-
Jauhar, S.1
Binbin, C.2
Temple, W.G.3
Xinshu, D.4
Kalbarczyk, Z.5
Sanders, W.H.6
Nicol, D.M.7
-
32
-
-
80052469409
-
A model-based design methodology for cyber-physical systems,
-
Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, IEEE, pp. 1666–1671.
-
[32] J.C. Jensen, D.H. Chang, E.A. Lee, A model-based design methodology for cyber-physical systems, in: Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, IEEE, pp. 1666–1671.
-
-
-
Jensen, J.C.1
Chang, D.H.2
Lee, E.A.3
-
33
-
-
84983356303
-
-
Attack-defense trees based cyber security analysis for CPSs, IEEE, pp. 693–698.
-
[33] X. Ji, H. Yu, G. Fan, W. Fu, Attack-defense trees based cyber security analysis for CPSs, IEEE, pp. 693–698.
-
-
-
Ji, X.1
Yu, H.2
Fan, G.3
Fu, W.4
-
34
-
-
85006250660
-
-
Model-based security analysis of a water treatment system, ACM, pp. 22–28.
-
[34] E. Kang, S. Adepu, D. Jackson, A.P. Mathur, Model-based security analysis of a water treatment system, ACM, pp. 22–28.
-
-
-
Kang, E.1
Adepu, S.2
Jackson, D.3
Mathur, A.P.4
-
35
-
-
84856512439
-
Stuxnet worm impact on industrial cyber-physical system security,
-
IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society, IEEE, pp. 4490–4494.
-
[35] S. Karnouskos, Stuxnet worm impact on industrial cyber-physical system security, in: IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society, IEEE, pp. 4490–4494.
-
-
-
Karnouskos, S.1
-
36
-
-
85028199291
-
Design techniques and applications of cyberphysical systems: a survey
-
[36] Khaitan, S.K., McCalley, J.D., Design techniques and applications of cyberphysical systems: a survey. Syst. J., IEEE 9:2 (2015), 350–365.
-
(2015)
Syst. J., IEEE
, vol.9
, Issue.2
, pp. 350-365
-
-
Khaitan, S.K.1
McCalley, J.D.2
-
37
-
-
44649122227
-
Guidelines for performing systematic literature reviews in software engineering
-
EBSE
-
[37] Kitchenham, B., Guidelines for performing systematic literature reviews in software engineering. Technical Report, 2007, EBSE.
-
(2007)
Technical Report
-
-
Kitchenham, B.1
-
38
-
-
79953724329
-
Using mapping studies as the basis for further research–a participant-observer case study
-
[38] Kitchenham, B.A., Budgen, D., Brereton, O.P., Using mapping studies as the basis for further research–a participant-observer case study. Inf. Softw. Technol. 53:6 (2011), 638–651.
-
(2011)
Inf. Softw. Technol.
, vol.53
, Issue.6
, pp. 638-651
-
-
Kitchenham, B.A.1
Budgen, D.2
Brereton, O.P.3
-
39
-
-
84955270795
-
-
Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid, Springer, pp. 89–106.
-
[39] F. Knirsch, D. Engel, C. Neureiter, M. Frincu, V. Prasanna, Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid, Springer, pp. 89–106.
-
-
-
Knirsch, F.1
Engel, D.2
Neureiter, C.3
Frincu, M.4
Prasanna, V.5
-
40
-
-
84973555381
-
A sysml extension for security analysis of industrial control systems
-
BCS
-
[40] Lemaire, L., Lapon, J., De Decker, B., Naessens, V., A sysml extension for security analysis of industrial control systems. Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research, 2014, BCS, 1–9.
-
(2014)
Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research
, pp. 1-9
-
-
Lemaire, L.1
Lapon, J.2
De Decker, B.3
Naessens, V.4
-
41
-
-
85006272322
-
-
Extracting Vulnerabilities in Industrial Control Systems Using a Knowledge-Based System, British Computer Society, pp. 1–10.
-
[41] L. Lemaire, J. Vossaert, J. Jansen, V. Naessens, Extracting Vulnerabilities in Industrial Control Systems Using a Knowledge-Based System, British Computer Society, pp. 1–10.
-
-
-
Lemaire, L.1
Vossaert, J.2
Jansen, J.3
Naessens, V.4
-
42
-
-
85006264195
-
-
Security Attack Analysis Using Attack Patterns, IEEE, pp. 1–13.
-
[42] T. Li, E. Paja, J. Mylopoulos, J. Horkoff, K. Beckers, Security Attack Analysis Using Attack Patterns, IEEE, pp. 1–13.
-
-
-
Li, T.1
Paja, E.2
Mylopoulos, J.3
Horkoff, J.4
Beckers, K.5
-
43
-
-
84894657237
-
Advances in Model-Driven Security
-
Elsevier
-
[43] Lucio, L., Zhang, Q., Nguyen, P.H., Amrani, M., Klein, J., Vangheluwe, H., Le Traon, Y., Advances in Model-Driven Security. Advances in Computer, 2014, Elsevier.
-
(2014)
Advances in Computer
-
-
Lucio, L.1
Zhang, Q.2
Nguyen, P.H.3
Amrani, M.4
Klein, J.5
Vangheluwe, H.6
Le Traon, Y.7
-
44
-
-
85006321015
-
-
M.D. Di Benedetto, Cyber-physical systems security: a systematic mapping study, arXiv preprint arXiv: (2016).
-
[44] Y.Z. Lun, A. D Innocenzo, I. Malavolta, M.D. Di Benedetto, Cyber-physical systems security: a systematic mapping study, arXiv preprint arXiv: 1605.09641 (2016).
-
-
-
Lun, Y.Z.1
Innocenzo, A.D.2
Malavolta, I.3
-
45
-
-
85006306379
-
-
Understanding denial-of-service attacks, National Cyber Alert System, Cyber Security Tip ST04-015.2004 (2004).
-
[45] M. McDowell, Understanding denial-of-service attacks, National Cyber Alert System, Cyber Security Tip ST04-015.2004 (2004).
-
-
-
McDowell, M.1
-
46
-
-
34547700307
-
Software Security: Building Security in
-
Addison-Wesley Professional
-
[46] McGraw, G., Software Security: Building Security in. vol. 1, 2006, Addison-Wesley Professional.
-
(2006)
, vol.1
-
-
McGraw, G.1
-
47
-
-
85006265867
-
-
Microsoft, Security development lifecycle,.
-
[47] Microsoft, Security development lifecycle, http://www.microsoft.com/en-us/sdl/.
-
-
-
-
48
-
-
85006250687
-
-
MIT, Alloy analyzer,.
-
[48] MIT, Alloy analyzer, http://alloy.mit.edu.
-
-
-
-
49
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
[49] Mitchell, R., Chen, I.-R., A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR), 46(4), 2014, 55.
-
(2014)
ACM Comput. Surv. (CSUR)
, vol.46
, Issue.4
, pp. 55
-
-
Mitchell, R.1
Chen, I.-R.2
-
50
-
-
84962855652
-
-
A holistic viewpoint-based sysml profile to design systems-of-systems, IEEE, pp. 276–283.
-
[50] M. Mori, A. Ceccarelli, P. Lollini, A. Bondavalli, B. Fr, A holistic viewpoint-based sysml profile to design systems-of-systems, IEEE, pp. 276–283.
-
-
-
Mori, M.1
Ceccarelli, A.2
Lollini, P.3
Bondavalli, A.4
Fr, B.5
-
51
-
-
85013764660
-
Cyber-physical systems challenges: a needs analysis for collaborating embedded software systems
-
[51] Mosterman, P.J., Zander, J., Cyber-physical systems challenges: a needs analysis for collaborating embedded software systems. Softw. Syst. Model., 2016, 1–12.
-
(2016)
Softw. Syst. Model.
, pp. 1-12
-
-
Mosterman, P.J.1
Zander, J.2
-
52
-
-
84921033095
-
Petri net model of insider attacks in scada system
-
[52] Nasr, P.M., Varjani, A.Y., Petri net model of insider attacks in scada system. 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC, 2014, 55–60 10.1109/ISCISC.2014.6994022.
-
(2014)
2014 11th International ISC Conference on Information Security and Cryptology, ISCISC
, pp. 55-60
-
-
Nasr, P.M.1
Varjani, A.Y.2
-
53
-
-
85006294008
-
-
Demo abstract: sure: an experimentation and evaluation testbed for cps security and resilience, IEEE, pp. 1–1.
-
[53] H. Neema, P. Volgyesi, B. Potteiger, W. Emfinger, X. Koutsoukos, G. Karsai, Y. Vorobeychik, J. Sztipanovits, Demo abstract: sure: an experimentation and evaluation testbed for cps security and resilience, IEEE, pp. 1–1.
-
-
-
Neema, H.1
Volgyesi, P.2
Potteiger, B.3
Emfinger, W.4
Koutsoukos, X.5
Karsai, G.6
Vorobeychik, Y.7
Sztipanovits, J.8
-
54
-
-
84973924994
-
A concept for engineering smart grid security requirements based on sgam models
-
[54] Neureiter, C., Eibl, G., Engel, D., Schlegel, S., Uslar, M., A concept for engineering smart grid security requirements based on sgam models. Comput. Sci.-Res. Dev., 2014, 1–7.
-
(2014)
Comput. Sci.-Res. Dev.
, pp. 1-7
-
-
Neureiter, C.1
Eibl, G.2
Engel, D.3
Schlegel, S.4
Uslar, M.5
-
55
-
-
84973889966
-
Domain specific and model based systems engineering in the smart grid as prerequesite for security by design
-
[55] Neureiter, C., Engel, D., Uslar, M., Domain specific and model based systems engineering in the smart grid as prerequesite for security by design. Electronics, 5(2), 2016, 24.
-
(2016)
Electronics
, vol.5
, Issue.2
, pp. 24
-
-
Neureiter, C.1
Engel, D.2
Uslar, M.3
-
56
-
-
84936886921
-
A systematic review of model-driven security
-
IEEE
-
[56] Nguyen, P.H., Klein, J., Le Traon, Y., Kramer, M.E., A systematic review of model-driven security. 2013 20th Asia-Pacific Software Engineering Conference (APSEC), vol. 1, 2013, IEEE, 432–441.
-
(2013)
2013 20th Asia-Pacific Software Engineering Conference (APSEC)
, vol.1
, pp. 432-441
-
-
Nguyen, P.H.1
Klein, J.2
Le Traon, Y.3
Kramer, M.E.4
-
57
-
-
84942611940
-
An extensive systematic review on the model-driven development of secure systems
-
[57] Nguyen, P.H., Kramer, M.E., Klein, J., Le Traon, Y., An extensive systematic review on the model-driven development of secure systems. Inf. Softw. Technol. 68 (2015), 62–81.
-
(2015)
Inf. Softw. Technol.
, vol.68
, pp. 62-81
-
-
Nguyen, P.H.1
Kramer, M.E.2
Klein, J.3
Le Traon, Y.4
-
58
-
-
84961642292
-
Sospa: a system of security design patterns for systematically engineering secure systems
-
IEEE
-
[58] Nguyen, P.H., Yskout, K., Heyman, T., Klein, J., Scandariato, R., Le Traon, Y., Sospa: a system of security design patterns for systematically engineering secure systems. Model Driven Engineering Languages and Systems (MODELS), 2015 ACM/IEEE 18th International Conference on, 2015, IEEE, 246–255.
-
(2015)
Model Driven Engineering Languages and Systems (MODELS), 2015 ACM/IEEE 18th International Conference on
, pp. 246-255
-
-
Nguyen, P.H.1
Yskout, K.2
Heyman, T.3
Klein, J.4
Scandariato, R.5
Le Traon, Y.6
-
59
-
-
84942794318
-
Systems of systems engineering: basic concepts, model-based techniques, and research directions
-
[59] Nielsen, C.B., Larsen, P.G., Fitzgerald, J., Woodcock, J., Peleska, J., Systems of systems engineering: basic concepts, model-based techniques, and research directions. ACM Comput. Surv. (CSUR), 48(2), 2015, 18.
-
(2015)
ACM Comput. Surv. (CSUR)
, vol.48
, Issue.2
, pp. 18
-
-
Nielsen, C.B.1
Larsen, P.G.2
Fitzgerald, J.3
Woodcock, J.4
Peleska, J.5
-
60
-
-
85006320247
-
-
NSF, Cyber-physical systems (cps) program solicitation, 2016.
-
[60] NSF, Cyber-physical systems (cps) program solicitation, 2016 http://www.nsf.gov/pubs/2016/nsf16549/nsf16549.html.
-
-
-
-
61
-
-
84973516313
-
Security-aware, model-based systems engineering with sysml
-
BCS
-
[61] Oates, R., Thom, F., Herries, G., Security-aware, model-based systems engineering with sysml. Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research, 2013, BCS, 78–87.
-
(2013)
Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research
, pp. 78-87
-
-
Oates, R.1
Thom, F.2
Herries, G.3
-
62
-
-
84921047403
-
A method for modeling and evaluation of the security of cyber-physical systems
-
[62] Orojloo, H., Azgomi, M.A., A method for modeling and evaluation of the security of cyber-physical systems. 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC, 2014, 131–136, 10.1109/ISCISC.2014.6994036.
-
(2014)
2014 11th International ISC Conference on Information Security and Cryptology, ISCISC
, pp. 131-136
-
-
Orojloo, H.1
Azgomi, M.A.2
-
63
-
-
80051991023
-
Avatar: a sysml environment for the formal verification of safety and security properties
-
IEEE
-
[63] Pedroza, G., Apvrille, L., Knorreck, D., Avatar: a sysml environment for the formal verification of safety and security properties. New Technologies of Distributed Systems (NOTERE) 11th Annual International Conference on, 2011, IEEE, 1–10.
-
(2011)
New Technologies of Distributed Systems (NOTERE), 11th Annual International Conference on
, pp. 1-10
-
-
Pedroza, G.1
Apvrille, L.2
Knorreck, D.3
-
64
-
-
85006264219
-
-
P. Le Gall, C. Gaston, F. Bersey, Timed-model-based method for security analysis and testing of smart grid systems
-
[64] G. Pedroza, P. Le Gall, C. Gaston, F. Bersey, Timed-model-based method for security analysis and testing of smart grid systems,.
-
-
-
Pedroza, G.1
-
65
-
-
85006268511
-
Systematic mapping studies in software engineering,
-
12th International Conference on Evaluation and Assessment in Software Engineering, volume 17, sn.
-
[65] K. Petersen, R. Feldt, S. Mujtaba, M. Mattsson, Systematic mapping studies in software engineering, in: 12th International Conference on Evaluation and Assessment in Software Engineering, volume 17, sn.
-
-
-
Petersen, K.1
Feldt, R.2
Mujtaba, S.3
Mattsson, M.4
-
66
-
-
84929464206
-
Guidelines for conducting systematic mapping studies in software engineering: an update
-
[66] Petersen, K., Vakkalanka, S., Kuzniarz, L., Guidelines for conducting systematic mapping studies in software engineering: an update. Inf. Softw. Technol. 64 (2015), 1–18.
-
(2015)
Inf. Softw. Technol.
, vol.64
, pp. 1-18
-
-
Petersen, K.1
Vakkalanka, S.2
Kuzniarz, L.3
-
67
-
-
85006293839
-
-
Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment, ACM, pp. 99–108.
-
[67] B. Potteiger, G. Martins, X. Koutsoukos, Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment, ACM, pp. 99–108.
-
-
-
Potteiger, B.1
Martins, G.2
Koutsoukos, X.3
-
68
-
-
77956217277
-
Cyber-physical systems: the next computing revolution,
-
Proceedings of the 47th Design Automation Conference, ACM, pp. 731–736.
-
[68] R.R. Rajkumar, I. Lee, L. Sha, J. Stankovic, Cyber-physical systems: the next computing revolution, in: Proceedings of the 47th Design Automation Conference, ACM, pp. 731–736.
-
-
-
Rajkumar, R.R.1
Lee, I.2
Sha, L.3
Stankovic, J.4
-
70
-
-
84939500992
-
Sysml-sec: a model driven approach for designing safe and secure systems
-
IEEE
-
[70] Roudier, Y., Apvrille, L., Sysml-sec: a model driven approach for designing safe and secure systems. Model-Driven Engineering and Software Development (MODELSWARD) 3rd International Conference on, 2015, IEEE, 655–664.
-
(2015)
Model-Driven Engineering and Software Development (MODELSWARD), 3rd International Conference on
, pp. 655-664
-
-
Roudier, Y.1
Apvrille, L.2
-
71
-
-
84862143068
-
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
-
IEEE
-
[71] Ruiz, J.F., Harjani, R., Mana, A., Desnitsky, V., Kotenko, I., Chechulin, A., A methodology for the analysis and modeling of security threats and attacks for systems of embedded components. Parallel, Distributed and Network-Based Processing (PDP) 20th Euromicro International Conference on, 2012, IEEE, 261–268.
-
(2012)
Parallel, Distributed and Network-Based Processing (PDP), 20th Euromicro International Conference on
, pp. 261-268
-
-
Ruiz, J.F.1
Harjani, R.2
Mana, A.3
Desnitsky, V.4
Kotenko, I.5
Chechulin, A.6
-
72
-
-
85006241289
-
Managing timing implications of security aspects in model-driven development of real-time embedded systems
-
[72] Saadatmand, M., Cicchetti, A., Sjödin, M., Leveque, T., Managing timing implications of security aspects in model-driven development of real-time embedded systems. Int. J. Adv. Secur. 5:3/4 (2012), 68–80.
-
(2012)
Int. J. Adv. Secur.
, vol.5
, Issue.3/4
, pp. 68-80
-
-
Saadatmand, M.1
Cicchetti, A.2
Sjödin, M.3
Leveque, T.4
-
73
-
-
84963978859
-
Authentication and authorization scheme for various user roles and devices in smart grid
-
[73] Saxena, N., Choi, B.J., Lu, R., Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Trans. Inf. Forensics Secur. 11:5 (2016), 907–921.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.5
, pp. 907-921
-
-
Saxena, N.1
Choi, B.J.2
Lu, R.3
-
74
-
-
0141725642
-
Model transformation: the heart and soul of model-driven software development
-
[74] Sendall, S., Kozaczynski, W., Model transformation: the heart and soul of model-driven software development. Softw., IEEE 20:5 (2003), 42–45.
-
(2003)
Softw., IEEE
, vol.20
, Issue.5
, pp. 42-45
-
-
Sendall, S.1
Kozaczynski, W.2
-
76
-
-
84155167085
-
Cyber–physical system security for the electric power grid
-
[76] Sridhar, S., Hahn, A., Govindarasu, M., Cyber–physical system security for the electric power grid. Proc. IEEE 100:1 (2012), 210–224.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
77
-
-
84933679507
-
Integrated smart grid systems security threat model
-
[77] Suleiman, H., Alqassem, I., Diabat, A., Arnautovic, E., Svetinovic, D., Integrated smart grid systems security threat model. Inf. Syst. 53 (2015), 147–160.
-
(2015)
Inf. Syst.
, vol.53
, pp. 147-160
-
-
Suleiman, H.1
Alqassem, I.2
Diabat, A.3
Arnautovic, E.4
Svetinovic, D.5
-
78
-
-
84881611525
-
Evaluating the effectiveness of the security quality requirements engineering (square) method: a case study using smart grid advanced metering infrastructure
-
[78] Suleiman, H., Svetinovic, D., Evaluating the effectiveness of the security quality requirements engineering (square) method: a case study using smart grid advanced metering infrastructure. Requirements Eng. 18:3 (2013), 251–279.
-
(2013)
Requirements Eng.
, vol.18
, Issue.3
, pp. 251-279
-
-
Suleiman, H.1
Svetinovic, D.2
-
79
-
-
84880891407
-
A model for security analysis of smart meters, in: Proceedings of the International Conference on Dependable Systems and Networks,
-
[79] F.M. Tabrizi, K. Pattabiraman, A model for security analysis of smart meters, in: Proceedings of the International Conference on Dependable Systems and Networks, 10.1109/DSNW.2012.6264682.
-
-
-
Tabrizi, F.M.1
Pattabiraman, K.2
-
80
-
-
84898638471
-
A model-based intrusion detection system for smart meters
-
[80] Tabrizi, F.M., Pattabiraman, K., A model-based intrusion detection system for smart meters. Proceedings - 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, HASE, 2014, 17–24 10.1109/HASE.2014.12.
-
(2014)
Proceedings - 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, HASE
, pp. 17-24
-
-
Tabrizi, F.M.1
Pattabiraman, K.2
-
81
-
-
84911899842
-
Integrating security mechanisms into embedded systems by domainspecific modelling
-
[81] Vasilevskaya, M., Gunawan, L.A., Nadjm-Tehrani, S., Herrmann, P., Integrating security mechanisms into embedded systems by domainspecific modelling. Secur. Commun. Netw. 7:12 (2014), 2815–2832.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.12
, pp. 2815-2832
-
-
Vasilevskaya, M.1
Gunawan, L.A.2
Nadjm-Tehrani, S.3
Herrmann, P.4
-
82
-
-
84969802885
-
-
Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design, Springer, pp. 347–361.
-
[82] M. Vasilevskaya, S. Nadjm-Tehrani, Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design, Springer, pp. 347–361.
-
-
-
Vasilevskaya, M.1
Nadjm-Tehrani, S.2
-
83
-
-
84907333136
-
-
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-physical Systems, Springer, pp. 384–387.
-
[83] A.H. Vu, N.O. Tippenhauer, B. Chen, D.M. Nicol, Z. Kalbarczyk, CyberSAGE: A Tool for Automatic Security Assessment of Cyber-physical Systems, Springer, pp. 384–387.
-
-
-
Vu, A.H.1
Tippenhauer, N.O.2
Chen, B.3
Nicol, D.M.4
Kalbarczyk, Z.5
-
84
-
-
79953117676
-
Security issues and challenges for cyber physical system,
-
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, IEEE Computer Society, pp. 733–738.
-
[84] E.K. Wang, Y. Ye, X. Xu, S.-M. Yiu, L.C.K. Hui, K.-P. Chow, Security issues and challenges for cyber physical system, in: Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, IEEE Computer Society, pp. 733–738.
-
-
-
Wang, E.K.1
Ye, Y.2
Xu, X.3
Yiu, S.-M.4
Hui, L.C.K.5
Chow, K.-P.6
-
85
-
-
84875747087
-
Cyber security in the smart grid: survey and challenges
-
[85] Wang, W., Lu, Z., Cyber security in the smart grid: survey and challenges. Comput. Netw. 57:5 (2013), 1344–1371.
-
(2013)
Comput. Netw.
, vol.57
, Issue.5
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
-
86
-
-
84903220294
-
Aspect-oriented modeling of attacks in automotive cyber-physical systems,
-
Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE, IEEE, pp. 1–6.
-
[86] A. Wasicek, P. Derler, E. Lee, Aspect-oriented modeling of attacks in automotive cyber-physical systems, in: Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE, IEEE, pp. 1–6.
-
-
-
Wasicek, A.1
Derler, P.2
Lee, E.3
-
87
-
-
33845442417
-
Practical experiences in using model-driven engineering to develop trustworthy computing systems
-
IEEE
-
[87] Weigert, T., Weil, F., Practical experiences in using model-driven engineering to develop trustworthy computing systems. Sensor Networks, Ubiquitous, and Trustworthy Computing IEEE International Conference on, vol. 1, 2006, IEEE, 8.
-
(2006)
Sensor Networks, Ubiquitous, and Trustworthy Computing, IEEE International Conference on
, vol.1
, pp. 8
-
-
Weigert, T.1
Weil, F.2
-
88
-
-
31044444123
-
Requirements engineering paper classification and evaluation criteria: a proposal and a discussion
-
[88] Wieringa, R., Maiden, N., Mead, N., Rolland, C., Requirements engineering paper classification and evaluation criteria: a proposal and a discussion. Requirements Engineering 11:1 (2006), 102–107.
-
(2006)
Requirements Engineering
, vol.11
, Issue.1
, pp. 102-107
-
-
Wieringa, R.1
Maiden, N.2
Mead, N.3
Rolland, C.4
-
89
-
-
84907829939
-
Guidelines for snowballing in systematic literature studies and a replication in software engineering,
-
Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, ACM, p. 38.
-
[89] C. Wohlin, Guidelines for snowballing in systematic literature studies and a replication in software engineering, in: Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, ACM, p. 38.
-
-
-
Wohlin, C.1
-
90
-
-
84876283132
-
Systematic literature reviews in software engineering
-
[90] Wohlin, C., Prikladnicki, R., Systematic literature reviews in software engineering. Inf. Softw. Technol. 55:6 (2013), 919–920.
-
(2013)
Inf. Softw. Technol.
, vol.55
, Issue.6
, pp. 919-920
-
-
Wohlin, C.1
Prikladnicki, R.2
-
91
-
-
84956833000
-
A method for describing industrial control system network attack using object petri net
-
[91] Wu, K., Li, Y., Chen, F., Chen, L., A method for describing industrial control system network attack using object petri net. IEEJ Trans. Electr. Electron. Eng. 11:2 (2016), 216–227.
-
(2016)
IEEJ Trans. Electr. Electron. Eng.
, vol.11
, Issue.2
, pp. 216-227
-
-
Wu, K.1
Li, Y.2
Chen, F.3
Chen, L.4
-
92
-
-
84922266749
-
A language for describing attacks on cyber-physical systems
-
[92] Yampolskiy, M., Horvath, P., Koutsoukos, X.D., Xue, Y., Sztipanovits, J., A language for describing attacks on cyber-physical systems. Int. J. Crit. Infrastruct. Prot. 8 (2015), 40–52.
-
(2015)
Int. J. Crit. Infrastruct. Prot.
, vol.8
, pp. 40-52
-
-
Yampolskiy, M.1
Horvath, P.2
Koutsoukos, X.D.3
Xue, Y.4
Sztipanovits, J.5
-
93
-
-
84868596713
-
Systematic analysis of cyber-attacks on cps-evaluating applicability of dfd-based approach,
-
Resilient Control Systems (ISRCS), 2012 5th International Symposium on, IEEE, pp. 55–62.
-
[93] M. Yampolskiy, P. Horvath, X.D. Koutsoukos, Y. Xue, J. Sztipanovits, Systematic analysis of cyber-attacks on cps-evaluating applicability of dfd-based approach, in: Resilient Control Systems (ISRCS), 2012 5th International Symposium on, IEEE, pp. 55–62.
-
-
-
Yampolskiy, M.1
Horvath, P.2
Koutsoukos, X.D.3
Xue, Y.4
Sztipanovits, J.5
-
94
-
-
84893670581
-
System security requirements analysis: a smart grid case study
-
[94] Zafar, N., Arnautovic, E., Diabat, A., Svetinovic, D., System security requirements analysis: a smart grid case study. Systems Engineering 17:1 (2014), 77–88.
-
(2014)
Systems Engineering
, vol.17
, Issue.1
, pp. 77-88
-
-
Zafar, N.1
Arnautovic, E.2
Diabat, A.3
Svetinovic, D.4
-
95
-
-
84977479326
-
Understanding uncertainty in cyber-physical systems: A conceptual model
-
Springer
-
[95] Zhang, M., Selic, B., Ali, S., Yue, T., Okariz, O., Norgren, R., Understanding uncertainty in cyber-physical systems: A conceptual model. 12th European Conference on Modelling Foundations and Applications (ECMFA 2016), 2016, Springer, 247–264.
-
(2016)
12th European Conference on Modelling Foundations and Applications (ECMFA 2016)
, pp. 247-264
-
-
Zhang, M.1
Selic, B.2
Ali, S.3
Yue, T.4
Okariz, O.5
Norgren, R.6
-
96
-
-
84946043928
-
On the state of the art in verification and validation in cyber physical systems
-
The University of Texas at Austin, The Center for Advanced Research in Software Engineering
-
[96] Zheng, X., Julien, C., Kim, M., Khurshid, S., On the state of the art in verification and validation in cyber physical systems. Technical Report TR-ARiSE-2014-001, 2014, The University of Texas at Austin, The Center for Advanced Research in Software Engineering.
-
(2014)
Technical Report TR-ARiSE-2014-001
-
-
Zheng, X.1
Julien, C.2
Kim, M.3
Khurshid, S.4
|