A Process for Generating Concrete Architectures
暂无分享,去创建一个
Alexis Olivereau | Mathieu Boussard | Matthias Thoma | Joachim W. Walewski | Stefan Meissner | Andreas Nettsträter | Alexander Salinas Segura | J. Walewski | A. Nettsträter | Matthias Thoma | M. Boussard | Alexis Olivereau | S. Meissner
[1] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[2] Klaus Pohl,et al. Requirements Engineering - Fundamentals, Principles, and Techniques , 2010 .
[3] C. N. Mathur,et al. Security Issues in Cognitive Radio Networks , 2007 .
[4] Eoin Woods,et al. Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives , 2005 .
[5] Anne Marsden,et al. International Organization for Standardization , 2014 .
[6] Udo W. Pooch,et al. A lightweight authentication protocol for mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[7] Juan E. Tapiador,et al. Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[8] Barry W. Boehm,et al. A spiral model of software development and enhancement , 1986, Computer.
[9] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[10] M. Erder,et al. QFD in the architecture development process , 2003 .
[11] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[12] W. W. Royce,et al. Managing the development of large software systems , 1970 .
[13] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[14] Patrick Schaumont,et al. Design methods for Security and Trust , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.
[15] Eoin Woods,et al. The system context architectural viewpoint , 2009, 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture.
[16] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[17] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[18] Frank Swiderski,et al. Threat Modeling , 2018, Hacking Connected Cars.
[19] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[20] Kerry Raymond. Reference Model of Open Distributed Processing (RM-ODP): Introduction , 1995 .