Sciweavers

410 search results - page 1 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 8 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
ASIASIM
2004
Springer
13 years 10 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
CAI
2006
Springer
13 years 4 months ago
Addressing the Conflicting Dimension of Groupware: A Case Study in Software Requirements Validation
This paper addresses the conflicting dimension of groupware, seeking the reconciliation of two very different assumptions about the users' attitudes using groupware tools: use...
Pedro Antunes, João Ramires, Ana Resp&iacut...