Loading…
Loading…
Loading…
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
Fugini, Mariagrazia, Hadjichristofi, George, Teimourikia, Mahsa
Published in Proceedings - IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (01.06.2014)
Published in Proceedings - IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (01.06.2014)
Get full text
Conference Proceeding
Loading…
Extending the UML Statecharts Notation to Model Security Aspects
El-Attar, Mohamed, Luqman, Hamza, Karpati, Peter, Sindre, Guttorm, Opdahl, Andreas L.
Published in IEEE transactions on software engineering (01.07.2015)
Published in IEEE transactions on software engineering (01.07.2015)
Get full text
Journal Article
Loading…
Multi-Bit Collection and Hierarchical Classification Algorithm of Online Open Course Learning Behavior Data with Library Security Modeling
Shen, Li
Published in 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (21.09.2022)
Published in 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (21.09.2022)
Get full text
Conference Proceeding
Loading…
Security Modeling on the Supply Chain Networks
Marn-Ling Shing, Chen-Chi Shing, Kuo Lane Chen, Huei Lee
Published in Journal of systemics, cybernetics and informatics (01.10.2007)
Get full text
Published in Journal of systemics, cybernetics and informatics (01.10.2007)
Journal Article
Loading…
Fully Forward-Secure Group Signatures
Libert, Benoît, Yung, Moti
Published in Cryptography and Security: From Theory to Applications (2012)
Published in Cryptography and Security: From Theory to Applications (2012)
Get full text
Book Chapter
Loading…
Security Modeling and Tool Support Advantages
Baadshaug, E.T., Erdogan, G., Meland, P.H.
Published in 2010 International Conference on Availability, Reliability, and Security (01.02.2010)
Published in 2010 International Conference on Availability, Reliability, and Security (01.02.2010)
Get full text
Conference Proceeding
Loading…
Security modeling and the application life cycle
MEIER JOHN D, VASIREDDY SRINATH, DUNNER MICHAEL, WASTELL BLAINE, MURUKAN ANANDHA S
Year of Publication 05.07.2007
Get full text
Year of Publication 05.07.2007
Patent
Loading…
Security modeling and the application life cycle
Year of Publication 29.12.2005
Get full text
Patent
Loading…
Loading…
Navigating the landscape of security modelling: the MORS grid
Spencer, Matt, Coles-Kemp, Lizzie, Hansen, René Rydhof
Published in Journal of cybersecurity (Oxford) (2024)
Published in Journal of cybersecurity (Oxford) (2024)
Get full text
Journal Article
Loading…
Identifying and predicting the factors affecting end-users’ risk-taking behavior
Alohali, Manal, Clarke, Nathan, Li, Fudong, Furnell, Steven
Published in Information and computer security (09.07.2018)
Published in Information and computer security (09.07.2018)
Get full text
Journal Article
Loading…
Performance and security trade-offs in high-speed networks : an investigation into the performance and security modelling and evaluation of high-speed networks based on the quantitative analysis and experimentation of queueing networks and generalised stochastic Petri nets
Get full text
Dissertation
Loading…
Evaluating the Effectiveness of Notations for Designing Security Aspects
Muneer, Siraj Un, Nadeem, Muhammad, Kasi, Bakhtiar, Yousaf, Mir Hamayoun
Published in Advanced Communication Technology (ICACT), International Conference (01.02.2020)
Published in Advanced Communication Technology (ICACT), International Conference (01.02.2020)
Get full text
Conference Proceeding