Model-driven safety and security co-analysis: A systematic literature review
VL Grechi, AL de Oliveira, RTV Braga - Journal of Systems and Software, 2024 - Elsevier
Failures in systems that can lead to loss of life, property, and environmental damage, make
them safety-critical systems requiring the analysis and demonstration of dependability …
them safety-critical systems requiring the analysis and demonstration of dependability …
An automated model‐based testing approach for the self‐adaptive behavior of the unmanned aircraft system application software
The unmanned aircraft system (UAS) is rapidly gaining popularity in civil and military
domains. A UAS consists of an application software that is responsible for defining a UAS …
domains. A UAS consists of an application software that is responsible for defining a UAS …
Adaptive Anomaly Detection for Identifying Attacks in Cyber-Physical Systems: A Systematic Literature Review
Modern cyberattacks in cyber-physical systems (CPS) rapidly evolve and cannot be deterred
effectively with most current methods which focused on characterizing past threats. Adaptive …
effectively with most current methods which focused on characterizing past threats. Adaptive …
[HTML][HTML] Reference architectures as boundary objects in the co-engineering of system properties: An empirical study
Context: The complexity of large-scale, software-intensive systems demands collaborative
efforts across engineering disciplines to assure that all system properties are correctly …
efforts across engineering disciplines to assure that all system properties are correctly …
Model-based generation of attack-fault trees
Joint safety and security analysis of cyber-physical systems is a necessary step to correctly
capture inter-dependencies between these properties. Attack-Fault Trees represent a …
capture inter-dependencies between these properties. Attack-Fault Trees represent a …
What Influences Users' Continuous Intention to Use Function-Oriented Systems: A Different Impact Mechanism for Patent Information Platforms
J Wei, T Zhang, X Lu - International Journal of Human–Computer …, 2024 - Taylor & Francis
Patent information platforms have become crucial for innovators to stay informed about
technological advancements. These platforms, distinguished by their function-oriented …
technological advancements. These platforms, distinguished by their function-oriented …
A reference architecture to implement Self-X capability in an industrial software architecture
The recent advancements in the industrial communities which have taken place from 2011
and are nowadays referenced as “Industry 4.0” allowed the scientific community to highlight …
and are nowadays referenced as “Industry 4.0” allowed the scientific community to highlight …
Streamlining Attack Tree Generation: A Fragment-Based Approach
Attack graphs are a tool for analyzing security vulnerabilities that capture different and
prospective attacks on a system. As a threat modeling tool, it shows possible paths that an …
prospective attacks on a system. As a threat modeling tool, it shows possible paths that an …
Safety-Critical Adaptation in Self-Adaptive Systems
Modern systems are designed to operate in increasingly variable and uncertain
environments. Not only are these environments complex, in the sense that they contain a …
environments. Not only are these environments complex, in the sense that they contain a …
Integrated QoS-and Vulnerability-Driven Self-adaptation for Microservices Applications
M Camilli, F Luccioletti, R Mirandola… - … Conference on Service …, 2024 - Springer
Prioritizing security concerns in modern (micro) service-based applications is paramount to
protecting sensitive data and maintaining end-user trust. Self-adaptation can strengthen …
protecting sensitive data and maintaining end-user trust. Self-adaptation can strengthen …