A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components
暂无分享,去创建一个
Igor V. Kotenko | Andrey Chechulin | Vasily Desnitsky | Antonio Maña | Jose Fran. Ruiz | Rajesh Harjani
[1] Craig Larman,et al. Applying UML and patterns , 1997 .
[2] Antonio Maña,et al. A Security Modelling Framework for Systems of Embedded Components , 2011, 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering.
[3] J. K. R. Sastry,et al. Attacking embedded systems through fault injection , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.
[4] William Yurcik,et al. Threat Modeling as a Basis for Security Requirements , 2005 .
[5] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[6] Dianxiang Xu,et al. Threat-Driven Architectural Design of Secure Information Systems , 2018, ICEIS.
[7] Gabor Karsai,et al. Integrating Security Modeling into Embedded System Design , 2007, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07).
[8] Dimitrios N. Serpanos,et al. Security and Privacy in Distributed Smart Cameras , 2008, Proceedings of the IEEE.
[9] Dennis G. Abraham,et al. Transaction Security System , 1991, IBM Syst. J..
[10] Luke Wildman,et al. A taxonomy of attacks on secure devices , 2003 .