Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Ontology-based security modeling in ArchiMate
Abstract Enterprise Risk Management involves the process of identification, evaluation,
treatment, and communication regarding risks throughout the enterprise. To support the …
treatment, and communication regarding risks throughout the enterprise. To support the …
Obtaining secure business process models from an enterprise architecture considering security requirements
Purpose Security requirements play an important role in software development. These can
be specified both in enterprise architecture models and in business processes. Enterprises …
be specified both in enterprise architecture models and in business processes. Enterprises …
Measuring and achieving test coverage of attack simulations extended version
S Hacks, L Persson, N Hersén - Software and Systems Modeling, 2023 - Springer
Designing secure and reliable systems is a difficult task. Threat modeling is a process that
supports the secure design of systems by easing the understanding of the system's …
supports the secure design of systems by easing the understanding of the system's …
Develo** an access control management metamodel for secure digital enterprise architecture modeling
K Nahar, AQ Gill, T Roach - Security and Privacy, 2021 - Wiley Online Library
There is an increasing interest in embedding the security in the design of digital enterprise
architecture (EA) modeling platform to secure the digital assets. Access control management …
architecture (EA) modeling platform to secure the digital assets. Access control management …
Analyzing enterprise architecture models by means of the meta attack language
The digital transformation exposes organizations to new threats endangering their business.
A way to uncover these threats is threat modeling and attack simulations. However …
A way to uncover these threats is threat modeling and attack simulations. However …
[PDF][PDF] An Ontological Approach to Security Modeling
Í Oliveira - 2024 - researchgate.net
This thesis contributes to the definition of general ontological foundations for security
modeling, that is, conceptual modeling activities within the security domain. In this chapter …
modeling, that is, conceptual modeling activities within the security domain. In this chapter …
[PDF][PDF] A pragmatic Mission-centric Approach to ICT Risk and Security–Autonomous Vehicles as a Case
F Mancini - Proceedings of the 33rd European Safety and …, 2023 - rpsonline.com.sg
Cyber security in the military domain has long been characterized by the focus on data
confidentiality protection through strong system isolation and cryptography. Current warfare …
confidentiality protection through strong system isolation and cryptography. Current warfare …
[PDF][PDF] Automating Enterprise Cyber Threat Modeling
C Benson - 2024 - adelphi.edu
Enterprises must keep their businesses safe from hostile actors, regardless of size.
Protecting an enterprise benefits from creating and maintaining large-scale cyber threat …
Protecting an enterprise benefits from creating and maintaining large-scale cyber threat …
Modelling the 2021 Microsoft Exchange Server Data Breach in ArchiMate
A Konça - 2024 - essay.utwente.nl
In the field of enterprise architecture, enterprise architects and risk and security analysts use
various modelling applications to demonstrate how the business goals of an organization …
various modelling applications to demonstrate how the business goals of an organization …
An Object-Event Simulation Approach to Simulation of ArchiMate Models
M Ploeg - 2024 - essay.utwente.nl
Simulation is a frequently used tool in enterprise management, with Object-Event Simulation
(OES), a discrete-event simulation paradigm, being one option. However, in current …
(OES), a discrete-event simulation paradigm, being one option. However, in current …