메뉴 건너뛰기




Volumn 83, Issue , 2017, Pages 116-135

Model-based security engineering for cyber-physical systems: A systematic mapping study

Author keywords

Cyber physical systems; Model based engineering; Security; Security engineering; Snowballing; Survey; Systematic mapping

Indexed keywords

CYBER PHYSICAL SYSTEM; DIGITAL SUBSCRIBER LINES; EMBEDDED SYSTEMS; MAPPING; MODELING LANGUAGES; PROBLEM ORIENTED LANGUAGES; SECURITY SYSTEMS; SURVEYING;

EID: 85006307160     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2016.11.004     Document Type: Review
Times cited : (84)

References (96)
  • 1
    • 84955284071 scopus 로고    scopus 로고
    • Using Model Driven Engineering to Support Multi-paradigms Security Analysis, Springer, pp. 278–292.
    • [1] R. Abdallah, A. Motii, N. Yakymets, A. Lanusse, Using Model Driven Engineering to Support Multi-paradigms Security Analysis, Springer, pp. 278–292.
    • Abdallah, R.1    Motii, A.2    Yakymets, N.3    Lanusse, A.4
  • 2
    • 85006303173 scopus 로고    scopus 로고
    • Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study, Springer, pp. 75–94.
    • [2] S. Adepu, A. Mathur, Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study, Springer, pp. 75–94.
    • Adepu, S.1    Mathur, A.2
  • 3
    • 84939519037 scopus 로고    scopus 로고
    • Sysml-sec: a sysml environment for the design and development of secure embedded systems
    • [3] Apvrille, L., Roudier, Y., Sysml-sec: a sysml environment for the design and development of secure embedded systems. APCOSEC 2013, 2013.
    • (2013) APCOSEC 2013
    • Apvrille, L.1    Roudier, Y.2
  • 4
    • 84952786814 scopus 로고    scopus 로고
    • A Survey on Testing for Cyber Physical System, Springer, pp. 194–207.
    • [4] S.A. Asadollah, R. Inam, H. Hansson, A Survey on Testing for Cyber Physical System, Springer, pp. 194–207.
    • Asadollah, S.A.1    Inam, R.2    Hansson, H.3
  • 5
    • 85006251707 scopus 로고    scopus 로고
    • Models, abstractions, and architectures: the missing links in cyber-physical systems,
    • Proceedings of the 52nd Annual Design Automation Conference, ACM, p. 82.
    • [5] B. Balaji, A. Faruque, M. Abdullah, N. Dutt, R. Gupta, Y. Agarwal, Models, abstractions, and architectures: the missing links in cyber-physical systems, in: Proceedings of the 52nd Annual Design Automation Conference, ACM, p. 82.
    • Balaji, B.1    Faruque, A.2    Abdullah, M.3    Dutt, N.4    Gupta, R.5    Agarwal, Y.6
  • 7
    • 85006306386 scopus 로고    scopus 로고
    • A Threat Analysis Methodology for Smart Home Scenarios, Springer, pp. 94–124.
    • [7] K. Beckers, S. Faßbender, M. Heisel, S. Suppan, A Threat Analysis Methodology for Smart Home Scenarios, Springer, pp. 94–124.
    • Beckers, K.1    Faßbender, S.2    Heisel, M.3    Suppan, S.4
  • 8
    • 85006256058 scopus 로고    scopus 로고
    • Model Driven Engineering: An Emerging Technical Space, Springer, pp. 36–64.
    • [8] J. Bézivin, Model Driven Engineering: An Emerging Technical Space, Springer, pp. 36–64.
    • Bézivin, J.1
  • 9
    • 42149158539 scopus 로고    scopus 로고
    • Systematic review in software engineering
    • System Engineering and Computer Science Department COPPE/UFRJ
    • [9] Biolchini, J., Mian, P.G., Natali, A.C.C., Travassos, G.H., Systematic review in software engineering. Technical Report ES 679.05, 2005, System Engineering and Computer Science Department COPPE/UFRJ.
    • (2005) Technical Report ES 679.05
    • Biolchini, J.1    Mian, P.G.2    Natali, A.C.C.3    Travassos, G.H.4
  • 10
    • 0013080980 scopus 로고    scopus 로고
    • Computer Security: Art and Science
    • Addison-Wesley
    • [10] Bishop, M., Computer Security: Art and Science. 200, 2012, Addison-Wesley.
    • (2012) , vol.200
    • Bishop, M.1
  • 11
    • 84878326137 scopus 로고    scopus 로고
    • Model-Driven Software Engineering in Practice
    • Morgan & Claypool Publishers
    • [11] Brambilla, M., Cabot, J., Wimmer, M., Model-Driven Software Engineering in Practice. 2012, Morgan & Claypool Publishers.
    • (2012)
    • Brambilla, M.1    Cabot, J.2    Wimmer, M.3
  • 13
    • 51849091527 scopus 로고    scopus 로고
    • Secure control: towards survivable cyber-physical systems,
    • The 28th International Conference on Distributed Computing Systems Workshops, IEEE, pp. 495–500.
    • [13] A.A. Cardenas, S. Amin, S. Sastry, Secure control: towards survivable cyber-physical systems, in: The 28th International Conference on Distributed Computing Systems Workshops, IEEE, pp. 495–500.
    • Cardenas, A.A.1    Amin, S.2    Sastry, S.3
  • 14
    • 84969790733 scopus 로고    scopus 로고
    • Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective, Springer, pp. 277–290.
    • [14] B. Chen, C. Schmittner, Z. Ma, W.G. Temple, X. Dong, D.L. Jones, W.H. Sanders, Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective, Springer, pp. 277–290.
    • Chen, B.1    Schmittner, C.2    Ma, Z.3    Temple, W.G.4    Dong, X.5    Jones, D.L.6    Sanders, W.H.7
  • 15
    • 82155185229 scopus 로고    scopus 로고
    • Petri net modeling of cyber-physical attacks on smart grid
    • [15] Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J., Petri net modeling of cyber-physical attacks on smart grid. IEEE Trans. Smart Grid 2:4 (2011), 741–749, 10.1109/TSG.2011.2160000.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 741-749
    • Chen, T.M.1    Sanchez-Aarnoutse, J.C.2    Buford, J.3
  • 19
    • 62949200408 scopus 로고    scopus 로고
    • Strength of evidence in systematic reviews in software engineering,
    • Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, ACM, pp. 178–187.
    • [19] T. Dyba, T. Dingsȹyr, Strength of evidence in systematic reviews in software engineering, in: Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, ACM, pp. 178–187.
    • Dyba, T.1    Dingsȹyr, T.2
  • 20
    • 34250158136 scopus 로고    scopus 로고
    • Integrating security modeling into embedded system design,
    • Engineering of Computer-Based Systems, 2007. ECBS 07. 14th Annual IEEE International Conference and Workshops on the, IEEE, pp. 221–228.
    • [20] M. Eby, J. Werner, G. Karsai, A. Ledeczi, Integrating security modeling into embedded system design, in: Engineering of Computer-Based Systems, 2007. ECBS 07. 14th Annual IEEE International Conference and Workshops on the, IEEE, pp. 221–228.
    • Eby, M.1    Werner, J.2    Karsai, G.3    Ledeczi, A.4
  • 21
    • 84962798309 scopus 로고    scopus 로고
    • Preventing and Unifying Threats in Cyberphysical Systems, IEEE, pp. 292–293.
    • [21] E.B. Fernandez, Preventing and Unifying Threats in Cyberphysical Systems, IEEE, pp. 292–293.
    • Fernandez, E.B.1
  • 22
    • 77951749326 scopus 로고    scopus 로고
    • Designing secure scada systems using security patterns,
    • System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1–8.
    • [22] E.B. Fernandez, M.M. Larrondo-Petrie, Designing secure scada systems using security patterns, in: System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1–8.
    • Fernandez, E.B.1    Larrondo-Petrie, M.M.2
  • 24
    • 85006314732 scopus 로고    scopus 로고
    • Securecps: Defending a nanosatellite cyber-physical system,
    • SPIE Defense+ Security, International Society for Optics and Photonics, pp. 90850I–90850I–15.
    • [24] L. Forbes, H. Vu, B. Udrea, H. Hagar, X.D. Koutsoukos, M. Yampolskiy, Securecps: Defending a nanosatellite cyber-physical system, in: SPIE Defense+ Security, International Society for Optics and Photonics, pp. 90850I–90850I–15.
    • Forbes, L.1    Vu, H.2    Udrea, B.3    Hagar, H.4    Koutsoukos, X.D.5    Yampolskiy, M.6
  • 25
    • 85006295029 scopus 로고    scopus 로고
    • Predictions 2016: Cybersecurity Swings To Prevention
    • Forrester
    • [25] Forrester, Predictions 2016: Cybersecurity Swings To Prevention. Report, 2015, Forrester.
    • (2015) Report
    • Forrester1
  • 26
    • 5744230994 scopus 로고    scopus 로고
    • Aspect-oriented approach to early design modelling
    • [26] France, R., Ray, I., Georg, G., Ghosh, S., Aspect-oriented approach to early design modelling. IEE Proc.-Softw. 151:4 (2004), 173–185.
    • (2004) IEE Proc.-Softw. , vol.151 , Issue.4 , pp. 173-185
    • France, R.1    Ray, I.2    Georg, G.3    Ghosh, S.4
  • 27
    • 84920971178 scopus 로고    scopus 로고
    • A survey on concepts, applications, and challenges in cyber-physical systems
    • [27] Gunes, V., Peter, S., Givargis, T., Vahid, F., A survey on concepts, applications, and challenges in cyber-physical systems. KSII Trans. Internet Inf. Syst., 8(12), 2014.
    • (2014) KSII Trans. Internet Inf. Syst. , vol.8 , Issue.12
    • Gunes, V.1    Peter, S.2    Givargis, T.3    Vahid, F.4
  • 29
    • 85006265479 scopus 로고    scopus 로고
    • Y. Le Traon, Reactive Security for Smart Grids Using Models@ Run. Time-based Simulation and Reasoning, Springer, pp. 139–153.
    • [29] T. Hartmann, F. Fouquet, J. Klein, G. Nain, Y. Le Traon, Reactive Security for Smart Grids Using Models@ Run. Time-based Simulation and Reasoning, Springer, pp. 139–153.
    • Hartmann, T.1    Fouquet, F.2    Klein, J.3    Nain, G.4
  • 30
    • 85006295020 scopus 로고    scopus 로고
    • Cyber-physical systems: concepts, technologies and implementation principles,
    • Proceedings of TMCE, volume 1, pp. 7–11.
    • [30] I. Horvath, B.H. Gerritsen, Cyber-physical systems: concepts, technologies and implementation principles, in: Proceedings of TMCE, volume 1, pp. 7–11.
    • Horvath, I.1    Gerritsen, B.H.2
  • 32
    • 80052469409 scopus 로고    scopus 로고
    • A model-based design methodology for cyber-physical systems,
    • Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, IEEE, pp. 1666–1671.
    • [32] J.C. Jensen, D.H. Chang, E.A. Lee, A model-based design methodology for cyber-physical systems, in: Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, IEEE, pp. 1666–1671.
    • Jensen, J.C.1    Chang, D.H.2    Lee, E.A.3
  • 33
    • 84983356303 scopus 로고    scopus 로고
    • Attack-defense trees based cyber security analysis for CPSs, IEEE, pp. 693–698.
    • [33] X. Ji, H. Yu, G. Fan, W. Fu, Attack-defense trees based cyber security analysis for CPSs, IEEE, pp. 693–698.
    • Ji, X.1    Yu, H.2    Fan, G.3    Fu, W.4
  • 34
    • 85006250660 scopus 로고    scopus 로고
    • Model-based security analysis of a water treatment system, ACM, pp. 22–28.
    • [34] E. Kang, S. Adepu, D. Jackson, A.P. Mathur, Model-based security analysis of a water treatment system, ACM, pp. 22–28.
    • Kang, E.1    Adepu, S.2    Jackson, D.3    Mathur, A.P.4
  • 35
    • 84856512439 scopus 로고    scopus 로고
    • Stuxnet worm impact on industrial cyber-physical system security,
    • IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society, IEEE, pp. 4490–4494.
    • [35] S. Karnouskos, Stuxnet worm impact on industrial cyber-physical system security, in: IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society, IEEE, pp. 4490–4494.
    • Karnouskos, S.1
  • 36
    • 85028199291 scopus 로고    scopus 로고
    • Design techniques and applications of cyberphysical systems: a survey
    • [36] Khaitan, S.K., McCalley, J.D., Design techniques and applications of cyberphysical systems: a survey. Syst. J., IEEE 9:2 (2015), 350–365.
    • (2015) Syst. J., IEEE , vol.9 , Issue.2 , pp. 350-365
    • Khaitan, S.K.1    McCalley, J.D.2
  • 37
    • 44649122227 scopus 로고    scopus 로고
    • Guidelines for performing systematic literature reviews in software engineering
    • EBSE
    • [37] Kitchenham, B., Guidelines for performing systematic literature reviews in software engineering. Technical Report, 2007, EBSE.
    • (2007) Technical Report
    • Kitchenham, B.1
  • 38
    • 79953724329 scopus 로고    scopus 로고
    • Using mapping studies as the basis for further research–a participant-observer case study
    • [38] Kitchenham, B.A., Budgen, D., Brereton, O.P., Using mapping studies as the basis for further research–a participant-observer case study. Inf. Softw. Technol. 53:6 (2011), 638–651.
    • (2011) Inf. Softw. Technol. , vol.53 , Issue.6 , pp. 638-651
    • Kitchenham, B.A.1    Budgen, D.2    Brereton, O.P.3
  • 39
    • 84955270795 scopus 로고    scopus 로고
    • Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid, Springer, pp. 89–106.
    • [39] F. Knirsch, D. Engel, C. Neureiter, M. Frincu, V. Prasanna, Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid, Springer, pp. 89–106.
    • Knirsch, F.1    Engel, D.2    Neureiter, C.3    Frincu, M.4    Prasanna, V.5
  • 41
    • 85006272322 scopus 로고    scopus 로고
    • Extracting Vulnerabilities in Industrial Control Systems Using a Knowledge-Based System, British Computer Society, pp. 1–10.
    • [41] L. Lemaire, J. Vossaert, J. Jansen, V. Naessens, Extracting Vulnerabilities in Industrial Control Systems Using a Knowledge-Based System, British Computer Society, pp. 1–10.
    • Lemaire, L.1    Vossaert, J.2    Jansen, J.3    Naessens, V.4
  • 42
    • 85006264195 scopus 로고    scopus 로고
    • Security Attack Analysis Using Attack Patterns, IEEE, pp. 1–13.
    • [42] T. Li, E. Paja, J. Mylopoulos, J. Horkoff, K. Beckers, Security Attack Analysis Using Attack Patterns, IEEE, pp. 1–13.
    • Li, T.1    Paja, E.2    Mylopoulos, J.3    Horkoff, J.4    Beckers, K.5
  • 44
    • 85006321015 scopus 로고    scopus 로고
    • M.D. Di Benedetto, Cyber-physical systems security: a systematic mapping study, arXiv preprint arXiv: (2016).
    • [44] Y.Z. Lun, A. D Innocenzo, I. Malavolta, M.D. Di Benedetto, Cyber-physical systems security: a systematic mapping study, arXiv preprint arXiv: 1605.09641 (2016).
    • Lun, Y.Z.1    Innocenzo, A.D.2    Malavolta, I.3
  • 45
    • 85006306379 scopus 로고    scopus 로고
    • Understanding denial-of-service attacks, National Cyber Alert System, Cyber Security Tip ST04-015.2004 (2004).
    • [45] M. McDowell, Understanding denial-of-service attacks, National Cyber Alert System, Cyber Security Tip ST04-015.2004 (2004).
    • McDowell, M.1
  • 46
    • 34547700307 scopus 로고    scopus 로고
    • Software Security: Building Security in
    • Addison-Wesley Professional
    • [46] McGraw, G., Software Security: Building Security in. vol. 1, 2006, Addison-Wesley Professional.
    • (2006) , vol.1
    • McGraw, G.1
  • 47
    • 85006265867 scopus 로고    scopus 로고
    • Microsoft, Security development lifecycle,.
    • [47] Microsoft, Security development lifecycle, http://www.microsoft.com/en-us/sdl/.
  • 48
    • 85006250687 scopus 로고    scopus 로고
    • MIT, Alloy analyzer,.
    • [48] MIT, Alloy analyzer, http://alloy.mit.edu.
  • 49
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • [49] Mitchell, R., Chen, I.-R., A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR), 46(4), 2014, 55.
    • (2014) ACM Comput. Surv. (CSUR) , vol.46 , Issue.4 , pp. 55
    • Mitchell, R.1    Chen, I.-R.2
  • 50
    • 84962855652 scopus 로고    scopus 로고
    • A holistic viewpoint-based sysml profile to design systems-of-systems, IEEE, pp. 276–283.
    • [50] M. Mori, A. Ceccarelli, P. Lollini, A. Bondavalli, B. Fr, A holistic viewpoint-based sysml profile to design systems-of-systems, IEEE, pp. 276–283.
    • Mori, M.1    Ceccarelli, A.2    Lollini, P.3    Bondavalli, A.4    Fr, B.5
  • 51
    • 85013764660 scopus 로고    scopus 로고
    • Cyber-physical systems challenges: a needs analysis for collaborating embedded software systems
    • [51] Mosterman, P.J., Zander, J., Cyber-physical systems challenges: a needs analysis for collaborating embedded software systems. Softw. Syst. Model., 2016, 1–12.
    • (2016) Softw. Syst. Model. , pp. 1-12
    • Mosterman, P.J.1    Zander, J.2
  • 54
    • 84973924994 scopus 로고    scopus 로고
    • A concept for engineering smart grid security requirements based on sgam models
    • [54] Neureiter, C., Eibl, G., Engel, D., Schlegel, S., Uslar, M., A concept for engineering smart grid security requirements based on sgam models. Comput. Sci.-Res. Dev., 2014, 1–7.
    • (2014) Comput. Sci.-Res. Dev. , pp. 1-7
    • Neureiter, C.1    Eibl, G.2    Engel, D.3    Schlegel, S.4    Uslar, M.5
  • 55
    • 84973889966 scopus 로고    scopus 로고
    • Domain specific and model based systems engineering in the smart grid as prerequesite for security by design
    • [55] Neureiter, C., Engel, D., Uslar, M., Domain specific and model based systems engineering in the smart grid as prerequesite for security by design. Electronics, 5(2), 2016, 24.
    • (2016) Electronics , vol.5 , Issue.2 , pp. 24
    • Neureiter, C.1    Engel, D.2    Uslar, M.3
  • 57
    • 84942611940 scopus 로고    scopus 로고
    • An extensive systematic review on the model-driven development of secure systems
    • [57] Nguyen, P.H., Kramer, M.E., Klein, J., Le Traon, Y., An extensive systematic review on the model-driven development of secure systems. Inf. Softw. Technol. 68 (2015), 62–81.
    • (2015) Inf. Softw. Technol. , vol.68 , pp. 62-81
    • Nguyen, P.H.1    Kramer, M.E.2    Klein, J.3    Le Traon, Y.4
  • 59
    • 84942794318 scopus 로고    scopus 로고
    • Systems of systems engineering: basic concepts, model-based techniques, and research directions
    • [59] Nielsen, C.B., Larsen, P.G., Fitzgerald, J., Woodcock, J., Peleska, J., Systems of systems engineering: basic concepts, model-based techniques, and research directions. ACM Comput. Surv. (CSUR), 48(2), 2015, 18.
    • (2015) ACM Comput. Surv. (CSUR) , vol.48 , Issue.2 , pp. 18
    • Nielsen, C.B.1    Larsen, P.G.2    Fitzgerald, J.3    Woodcock, J.4    Peleska, J.5
  • 60
    • 85006320247 scopus 로고    scopus 로고
    • NSF, Cyber-physical systems (cps) program solicitation, 2016.
    • [60] NSF, Cyber-physical systems (cps) program solicitation, 2016 http://www.nsf.gov/pubs/2016/nsf16549/nsf16549.html.
  • 64
    • 85006264219 scopus 로고    scopus 로고
    • P. Le Gall, C. Gaston, F. Bersey, Timed-model-based method for security analysis and testing of smart grid systems
    • [64] G. Pedroza, P. Le Gall, C. Gaston, F. Bersey, Timed-model-based method for security analysis and testing of smart grid systems,.
    • Pedroza, G.1
  • 65
    • 85006268511 scopus 로고    scopus 로고
    • Systematic mapping studies in software engineering,
    • 12th International Conference on Evaluation and Assessment in Software Engineering, volume 17, sn.
    • [65] K. Petersen, R. Feldt, S. Mujtaba, M. Mattsson, Systematic mapping studies in software engineering, in: 12th International Conference on Evaluation and Assessment in Software Engineering, volume 17, sn.
    • Petersen, K.1    Feldt, R.2    Mujtaba, S.3    Mattsson, M.4
  • 66
    • 84929464206 scopus 로고    scopus 로고
    • Guidelines for conducting systematic mapping studies in software engineering: an update
    • [66] Petersen, K., Vakkalanka, S., Kuzniarz, L., Guidelines for conducting systematic mapping studies in software engineering: an update. Inf. Softw. Technol. 64 (2015), 1–18.
    • (2015) Inf. Softw. Technol. , vol.64 , pp. 1-18
    • Petersen, K.1    Vakkalanka, S.2    Kuzniarz, L.3
  • 67
    • 85006293839 scopus 로고    scopus 로고
    • Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment, ACM, pp. 99–108.
    • [67] B. Potteiger, G. Martins, X. Koutsoukos, Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment, ACM, pp. 99–108.
    • Potteiger, B.1    Martins, G.2    Koutsoukos, X.3
  • 68
    • 77956217277 scopus 로고    scopus 로고
    • Cyber-physical systems: the next computing revolution,
    • Proceedings of the 47th Design Automation Conference, ACM, pp. 731–736.
    • [68] R.R. Rajkumar, I. Lee, L. Sha, J. Stankovic, Cyber-physical systems: the next computing revolution, in: Proceedings of the 47th Design Automation Conference, ACM, pp. 731–736.
    • Rajkumar, R.R.1    Lee, I.2    Sha, L.3    Stankovic, J.4
  • 72
    • 85006241289 scopus 로고    scopus 로고
    • Managing timing implications of security aspects in model-driven development of real-time embedded systems
    • [72] Saadatmand, M., Cicchetti, A., Sjödin, M., Leveque, T., Managing timing implications of security aspects in model-driven development of real-time embedded systems. Int. J. Adv. Secur. 5:3/4 (2012), 68–80.
    • (2012) Int. J. Adv. Secur. , vol.5 , Issue.3/4 , pp. 68-80
    • Saadatmand, M.1    Cicchetti, A.2    Sjödin, M.3    Leveque, T.4
  • 73
    • 84963978859 scopus 로고    scopus 로고
    • Authentication and authorization scheme for various user roles and devices in smart grid
    • [73] Saxena, N., Choi, B.J., Lu, R., Authentication and authorization scheme for various user roles and devices in smart grid. IEEE Trans. Inf. Forensics Secur. 11:5 (2016), 907–921.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.5 , pp. 907-921
    • Saxena, N.1    Choi, B.J.2    Lu, R.3
  • 74
    • 0141725642 scopus 로고    scopus 로고
    • Model transformation: the heart and soul of model-driven software development
    • [74] Sendall, S., Kozaczynski, W., Model transformation: the heart and soul of model-driven software development. Softw., IEEE 20:5 (2003), 42–45.
    • (2003) Softw., IEEE , vol.20 , Issue.5 , pp. 42-45
    • Sendall, S.1    Kozaczynski, W.2
  • 76
    • 84155167085 scopus 로고    scopus 로고
    • Cyber–physical system security for the electric power grid
    • [76] Sridhar, S., Hahn, A., Govindarasu, M., Cyber–physical system security for the electric power grid. Proc. IEEE 100:1 (2012), 210–224.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 78
    • 84881611525 scopus 로고    scopus 로고
    • Evaluating the effectiveness of the security quality requirements engineering (square) method: a case study using smart grid advanced metering infrastructure
    • [78] Suleiman, H., Svetinovic, D., Evaluating the effectiveness of the security quality requirements engineering (square) method: a case study using smart grid advanced metering infrastructure. Requirements Eng. 18:3 (2013), 251–279.
    • (2013) Requirements Eng. , vol.18 , Issue.3 , pp. 251-279
    • Suleiman, H.1    Svetinovic, D.2
  • 79
    • 84880891407 scopus 로고    scopus 로고
    • A model for security analysis of smart meters, in: Proceedings of the International Conference on Dependable Systems and Networks,
    • [79] F.M. Tabrizi, K. Pattabiraman, A model for security analysis of smart meters, in: Proceedings of the International Conference on Dependable Systems and Networks, 10.1109/DSNW.2012.6264682.
    • Tabrizi, F.M.1    Pattabiraman, K.2
  • 81
    • 84911899842 scopus 로고    scopus 로고
    • Integrating security mechanisms into embedded systems by domainspecific modelling
    • [81] Vasilevskaya, M., Gunawan, L.A., Nadjm-Tehrani, S., Herrmann, P., Integrating security mechanisms into embedded systems by domainspecific modelling. Secur. Commun. Netw. 7:12 (2014), 2815–2832.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.12 , pp. 2815-2832
    • Vasilevskaya, M.1    Gunawan, L.A.2    Nadjm-Tehrani, S.3    Herrmann, P.4
  • 82
    • 84969802885 scopus 로고    scopus 로고
    • Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design, Springer, pp. 347–361.
    • [82] M. Vasilevskaya, S. Nadjm-Tehrani, Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design, Springer, pp. 347–361.
    • Vasilevskaya, M.1    Nadjm-Tehrani, S.2
  • 83
    • 84907333136 scopus 로고    scopus 로고
    • CyberSAGE: A Tool for Automatic Security Assessment of Cyber-physical Systems, Springer, pp. 384–387.
    • [83] A.H. Vu, N.O. Tippenhauer, B. Chen, D.M. Nicol, Z. Kalbarczyk, CyberSAGE: A Tool for Automatic Security Assessment of Cyber-physical Systems, Springer, pp. 384–387.
    • Vu, A.H.1    Tippenhauer, N.O.2    Chen, B.3    Nicol, D.M.4    Kalbarczyk, Z.5
  • 84
    • 79953117676 scopus 로고    scopus 로고
    • Security issues and challenges for cyber physical system,
    • Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, IEEE Computer Society, pp. 733–738.
    • [84] E.K. Wang, Y. Ye, X. Xu, S.-M. Yiu, L.C.K. Hui, K.-P. Chow, Security issues and challenges for cyber physical system, in: Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, IEEE Computer Society, pp. 733–738.
    • Wang, E.K.1    Ye, Y.2    Xu, X.3    Yiu, S.-M.4    Hui, L.C.K.5    Chow, K.-P.6
  • 85
    • 84875747087 scopus 로고    scopus 로고
    • Cyber security in the smart grid: survey and challenges
    • [85] Wang, W., Lu, Z., Cyber security in the smart grid: survey and challenges. Comput. Netw. 57:5 (2013), 1344–1371.
    • (2013) Comput. Netw. , vol.57 , Issue.5 , pp. 1344-1371
    • Wang, W.1    Lu, Z.2
  • 86
    • 84903220294 scopus 로고    scopus 로고
    • Aspect-oriented modeling of attacks in automotive cyber-physical systems,
    • Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE, IEEE, pp. 1–6.
    • [86] A. Wasicek, P. Derler, E. Lee, Aspect-oriented modeling of attacks in automotive cyber-physical systems, in: Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE, IEEE, pp. 1–6.
    • Wasicek, A.1    Derler, P.2    Lee, E.3
  • 88
    • 31044444123 scopus 로고    scopus 로고
    • Requirements engineering paper classification and evaluation criteria: a proposal and a discussion
    • [88] Wieringa, R., Maiden, N., Mead, N., Rolland, C., Requirements engineering paper classification and evaluation criteria: a proposal and a discussion. Requirements Engineering 11:1 (2006), 102–107.
    • (2006) Requirements Engineering , vol.11 , Issue.1 , pp. 102-107
    • Wieringa, R.1    Maiden, N.2    Mead, N.3    Rolland, C.4
  • 89
    • 84907829939 scopus 로고    scopus 로고
    • Guidelines for snowballing in systematic literature studies and a replication in software engineering,
    • Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, ACM, p. 38.
    • [89] C. Wohlin, Guidelines for snowballing in systematic literature studies and a replication in software engineering, in: Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, ACM, p. 38.
    • Wohlin, C.1
  • 90
    • 84876283132 scopus 로고    scopus 로고
    • Systematic literature reviews in software engineering
    • [90] Wohlin, C., Prikladnicki, R., Systematic literature reviews in software engineering. Inf. Softw. Technol. 55:6 (2013), 919–920.
    • (2013) Inf. Softw. Technol. , vol.55 , Issue.6 , pp. 919-920
    • Wohlin, C.1    Prikladnicki, R.2
  • 91
    • 84956833000 scopus 로고    scopus 로고
    • A method for describing industrial control system network attack using object petri net
    • [91] Wu, K., Li, Y., Chen, F., Chen, L., A method for describing industrial control system network attack using object petri net. IEEJ Trans. Electr. Electron. Eng. 11:2 (2016), 216–227.
    • (2016) IEEJ Trans. Electr. Electron. Eng. , vol.11 , Issue.2 , pp. 216-227
    • Wu, K.1    Li, Y.2    Chen, F.3    Chen, L.4
  • 93
    • 84868596713 scopus 로고    scopus 로고
    • Systematic analysis of cyber-attacks on cps-evaluating applicability of dfd-based approach,
    • Resilient Control Systems (ISRCS), 2012 5th International Symposium on, IEEE, pp. 55–62.
    • [93] M. Yampolskiy, P. Horvath, X.D. Koutsoukos, Y. Xue, J. Sztipanovits, Systematic analysis of cyber-attacks on cps-evaluating applicability of dfd-based approach, in: Resilient Control Systems (ISRCS), 2012 5th International Symposium on, IEEE, pp. 55–62.
    • Yampolskiy, M.1    Horvath, P.2    Koutsoukos, X.D.3    Xue, Y.4    Sztipanovits, J.5
  • 94
    • 84893670581 scopus 로고    scopus 로고
    • System security requirements analysis: a smart grid case study
    • [94] Zafar, N., Arnautovic, E., Diabat, A., Svetinovic, D., System security requirements analysis: a smart grid case study. Systems Engineering 17:1 (2014), 77–88.
    • (2014) Systems Engineering , vol.17 , Issue.1 , pp. 77-88
    • Zafar, N.1    Arnautovic, E.2    Diabat, A.3    Svetinovic, D.4
  • 96
    • 84946043928 scopus 로고    scopus 로고
    • On the state of the art in verification and validation in cyber physical systems
    • The University of Texas at Austin, The Center for Advanced Research in Software Engineering
    • [96] Zheng, X., Julien, C., Kim, M., Khurshid, S., On the state of the art in verification and validation in cyber physical systems. Technical Report TR-ARiSE-2014-001, 2014, The University of Texas at Austin, The Center for Advanced Research in Software Engineering.
    • (2014) Technical Report TR-ARiSE-2014-001
    • Zheng, X.1    Julien, C.2    Kim, M.3    Khurshid, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.