Security Engineering FY17 Systems Aware Cybersecurity
暂无分享,去创建一个
Peter A. Beling | Barry M. Horowitz | Forrest Shull | Cody H. Fleming | Nancy R. Mead | Stephen Adams | Georgios Bakirtzis | Bryan T. Carter | Carl R. Elks | Krishnamurthy Vemuru | Tim Bakker | Kryzsztof Cios | Aidan G. Collins
[1] Antony R Mileham,et al. Estimating cost at the conceptual design stage to optimize design in terms of performance and cost , 2008 .
[2] Thomas L. Griffiths,et al. Hierarchical Topic Models and the Nested Chinese Restaurant Process , 2003, NIPS.
[3] J. R. Crookall,et al. Design for Economic Manufacture , 1986 .
[4] Nancy G. Leveson,et al. Engineering a Safer World: Systems Thinking Applied to Safety , 2012 .
[5] Lionel Simeon Marks,et al. Mechanical engineers' handbook , 2012 .
[6] John D. Lafferty,et al. Correlated Topic Models , 2005, NIPS.
[7] Katherine R. Davis,et al. A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.
[8] William H. Sanders,et al. Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.
[9] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[10] Ulrik Brandes,et al. Graph Markup Language (GraphML) , 2013, Handbook of Graph Drawing and Visualization.
[11] Georgios Bakirtzis,et al. A model-based approach to security analysis for cyber-physical systems , 2018, 2018 Annual IEEE International Systems Conference (SysCon).
[12] Ruth Breu,et al. Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[13] Barbara Kordy,et al. DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..
[14] Robert H. Klenke,et al. A Modular Software Platform for Unmanned Aerial Vehicle Autopilot Systems , 2014 .
[15] Garrett L. Ward,et al. Design of a Small Form-Factor Flight Control System , 2014 .
[16] Georgios Bakirtzis,et al. MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis , 2017, ArXiv.
[17] Fabio Massacci,et al. The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures , 2017 .
[18] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[19] Huaiyu Zhu. On Information and Sufficiency , 1997 .
[20] David M. Blei,et al. Supervised Topic Models , 2007, NIPS.
[21] Hermann Kopetz,et al. Real-time systems , 2018, CSC '73.
[22] Jianfeng Ma,et al. On the architecture and development life cycle of secure cyber-physical systems , 2017, Journal of Communications and Information Networks.
[23] Fei Hu. Cyber-Physical Systems: Integrated Computing and Engineering Design , 2013 .
[24] Nancy R. Mead,et al. A Method and Case Study for Using Malware Analysis to Improve Security Requirements , 2015, Int. J. Secur. Softw. Eng..
[25] William H. Sanders,et al. Toward a cyber-physical topology language: applications to NERC CIP audit , 2013, SEGS '13.
[26] Georgios Bakirtzis,et al. A systems approach for eliciting mission-centric security requirements , 2018, 2018 Annual IEEE International Systems Conference (SysCon).
[27] Emmanouil Magkos,et al. Modeling security in cyber-physical systems , 2012, Int. J. Crit. Infrastructure Prot..
[28] Nancy G. Leveson,et al. Systems thinking for safety and security , 2013, ACSAC.