Use-Misuse Case Driven Analysis of Positive Train Control
暂无分享,去创建一个
[1] Finn V. Jensen,et al. Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.
[2] Jeroen Keppens,et al. A model based reasoning approach for generating plausible crime scenarios from evidence , 2003, ICAIL.
[3] S. Craven,et al. Security of ATCS wireless railway communications , 2005 .
[4] David A. Dampier,et al. Preparing for Large-Scale Investigations with Case Domain Modeling , 2005, DFRWS.
[5] Yacov Y. Haimes,et al. Risks of Terrorism to Information Technology and to Critical Interdependent Infrastructures , 2004 .
[6] Jan Jürjens,et al. Use Case Oriented Development of Security-Critical Systems , 2003 .
[7] P.V. Craven,et al. A brief look at railroad communication vulnerabilities , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).
[8] Andreas L. Opdahl,et al. Templates for Misuse Case Description , 2001 .
[9] Brian Falkenhainer,et al. Compositional Modeling: Finding the Right Model for the Job , 1991, Artif. Intell..
[10] Craig Larman,et al. Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process , 2001 .
[11] Henry Prakken,et al. Modelling reasoning about evidence in legal procedure , 2001, ICAIL '01.
[12] David B. Dunson,et al. Bayesian Data Analysis , 2010 .
[13] Dianxiang Xu,et al. Threat-Driven Architectural Design of Secure Information Systems , 2018, ICEIS.
[14] Owen Rambow,et al. Conceptual modeling through linguistic analysis using LIDA , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[15] Jeroen Keppens,et al. Centre for Intelligent Systems and Their Applications on Compositional Modelling on Compositional Modelling on Compositional Modelling* , 2022 .