Author:
Alturki Musab A.,Ban Kirigin Tajana,Kanovich Max,Nigam Vivek,Scedrov Andre,Talcott Carolyn
Publisher
Springer International Publishing
Reference31 articles.
1. Aires Urquiza, A., et al.: Resource and timing aspects of security protocols. J. Comput. Secur. 29(3), 299–340 (2021)
2. Allenby, B., Fink, J.: Toward inherently secure and resilient societies. Science 309(5737), 1034–1036 (2005)
3. Banescu, S., Ochoa, M., Pretschner, A.: A framework for measuring software obfuscation resilience against automated attacks. In: 2015 IEEE/ACM 1st International Workshop on Software Protection, pp. 45–51 (2015)
4. Barker, K., Ramirez-Marquez, J.E., Rocco, C.M.: Resilience-based network component importance measures. Reliab. Eng. Syst. Saf. 117, 89–97 (2013)
5. Bloomfield, R., et al.: Towards identifying and closing gaps in assurance of autonomous road vehicles-a collection of technical notes part 1. arXiv preprint arXiv:2003.00789 (2020)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Time-Bounded Resilience;Lecture Notes in Computer Science;2024
2. Technology of Computer Modeling;Deterministic and Stochastic Approaches in Computer Modeling and Simulation;2023-10-06
3. Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures;Theoretical Aspects of Software Engineering;2023