Sciweavers

410 search results - page 3 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
CAISE
2006
Springer
13 years 9 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
APSEC
2005
IEEE
13 years 11 months ago
An Industrial Case Study on Requirements Volatility Measures
Requirements volatility is an important risk factor for software projects. Software measures can help in quantifying and predicting this risk. In this paper, we present an industr...
Annabella Loconsole, Jürgen Börstler
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 15 days ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
JUCS
2000
100views more  JUCS 2000»
13 years 5 months ago
Requirements Capture and Evaluation in Nimbus: The Light-Control Case Study
: Evaluations of methods and tools applied to a reference problem are useful when comparing various techniques. In this paper, we present a solution to the challenge of capturing t...
Jeffrey M. Thompson, Michael W. Whalen, Mats Per E...
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 29 days ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...