Run-time threat models for systematic and continuous risk assessment
Threat modeling involves systematically assessing the likelihood and potential impact of
diverse security threat scenarios. Existing threat modeling approaches and tools act at the …
diverse security threat scenarios. Existing threat modeling approaches and tools act at the …
Development for high-assurance software update management system complying with UN R156
J Seo, J Kwak, S Kim - IEEE Access, 2024 - ieeexplore.ieee.org
With the advent of autonomous driving and connected vehicles in the automotive industry,
various vehicle software components are now connected to wireless networks. This enables …
various vehicle software components are now connected to wireless networks. This enables …
Checking security compliance between models and code
It is challenging to verify that the planned security mechanisms are actually implemented in
the software. In the context of model-based development, the implemented security …
the software. In the context of model-based development, the implemented security …
Expressive and systematic risk assessments with instance-centric threat models
A threat modeling exercise involves systematically assessing the likelihood and potential
impact of diverse threat scenarios. As threat modeling approaches and tools act at the level …
impact of diverse threat scenarios. As threat modeling approaches and tools act at the level …
WIP: Consortium Blockchain for Secure Data Acquisition using UAVs as Sensing Devices
T Faika - 2022 IEEE 13th Annual Ubiquitous Computing …, 2022 - ieeexplore.ieee.org
Autonomous inspection and measurement have become an integral part of smart IoT
ecosystem. Low cost mobile and static sensing devices have leveraged the concept of smart …
ecosystem. Low cost mobile and static sensing devices have leveraged the concept of smart …
Pre-deployment Description Logic-based Reasoning for Cloud Infrastructure Security
C Cauli - 2022 - gupea.ub.gu.se
Ensuring the security of a cloud application is exceptionally challenging. Not only is cloud
infrastructure inherently complex, but also a precise definition of what is secure is hard to …
infrastructure inherently complex, but also a precise definition of what is secure is hard to …