4.7 Article

A model-based methodology to support systems security design and assessment

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Automated Security Risk Identification Using AutomationML-Based Engineering Data

Matthias Eckhart et al.

Summary: Conducting security risk assessments in industrial systems is a complex and time-consuming task, which is further hindered by the lack of automated methods. This paper proposes a method that automatically identifies security risks based on engineering data, and demonstrates its benefits through a case study and a prototype implementation.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Artificial Intelligence

Sustainable Risk Identification Using Formal Ontologies

Avi Shaked et al.

Summary: The cyber threat landscape is dynamic, and continuous monitoring and contextualisation are needed for risk identification. Manual risk identification hinders consideration of emerging threats. OnToRisk offers an automated method to identify and understand cyber risks, integrating information from various sources using formal ontology definitions.

ALGORITHMS (2022)

Article Engineering, Industrial

Model-driven architecture based security analysis

Saoussen Mili et al.

Summary: This paper proposes a Model-Driven Architecture approach for the development of an embedded system validation platform, which formalizes and verifies security properties at an early stage of the design process to reduce late errors and development time.

SYSTEMS ENGINEERING (2021)

Proceedings Paper Computer Science, Information Systems

Model-based Threat and Risk Assessment for Systems Design

Avi Shaked et al.

Summary: Integrating cybersecurity considerations in modern system design is a significant challenge, with a security by-design approach being preferable to patching existing designs. This paper presents a model-based methodology for cybersecurity-related systems design, taking into account cybersecurity threats and system composition to drive the incorporation of security controls. Discussions include the methodology's design aspects and its real-life applications.

ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (2021)

Article Social Sciences, Interdisciplinary

VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System

Baoluo Meng et al.

Summary: This paper describes the VERDICT language and framework in detail, including a case study to demonstrate its effectiveness in enhancing cyber resiliency of critical infrastructure and embedded systems.

SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study

Arslan Munir et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Interdisciplinary Applications

BPRIM: An integrated framework for business process management and risk management

Elyes Lamine et al.

COMPUTERS IN INDUSTRY (2020)

Review Computer Science, Information Systems

Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management

In Lee

FUTURE INTERNET (2020)

Review Computer Science, Software Engineering

A systematic literature review of model-driven security engineering for cyber-physical systems

Johannes Geismann et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2020)

Article Engineering, Industrial

A novel cyber-risk assessment method for ship systems

Victor Bolbot et al.

SAFETY SCIENCE (2020)

Article Engineering, Industrial

Designing development processes related to system of systems using a modeling framework

Avi Shaked et al.

SYSTEMS ENGINEERING (2019)

Article Social Sciences, Interdisciplinary

A Preliminary Design-Phase Security Methodology for Cyber-Physical Systems

Bryan Carter et al.

SYSTEMS (2019)

Article Engineering, Manufacturing

Designing with sketches: the generative effects of knowledge preordering

Juliette Brun et al.

Design Science (2016)

Article Engineering, Multidisciplinary

On the role of computational support for designers in action

Marcelo Bernal et al.

DESIGN STUDIES (2015)

Review Computer Science, Information Systems

An extensive systematic review on the Model-Driven Development of secure systems

Phu H. Nguyen et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2015)

Article Automation & Control Systems

Model-Based System Specification With Tesperanto: Readable Text From Formal Graphics

Alex Blekhman et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2015)

Article Computer Science, Software Engineering

Your What Is My How: Iteration and Hierarchy in System Design

Michael W. Whalen et al.

IEEE SOFTWARE (2013)

Article Automation & Control Systems

LITHE: An Agile Methodology for Human-Centric Model-Based Systems Engineering

Ana Luisa Ramos et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2013)

Review Computer Science, Artificial Intelligence

Model-Based Systems Engineering: An Emerging Approach for Modern Systems

Ana Luisa Ramos et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2012)

Article Engineering, Mechanical

Hierarchical Decomposition and Multidomain Formulation for the Design of Complex Sustainable Systems

Anas Alfaris et al.

JOURNAL OF MECHANICAL DESIGN (2010)

Article Computer Science, Information Systems

A comparison of security requirements engineering methods

Benjamin Fabian et al.

REQUIREMENTS ENGINEERING (2010)

Review Computer Science, Software Engineering

The Physics of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering

Daniel L. Moody

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2009)

Article Engineering, Multidisciplinary

Bottom-up or top-down? Evolutionary change management in NPD processes

R Smeds et al.

INTERNATIONAL JOURNAL OF TECHNOLOGY MANAGEMENT (2003)