Author:
Chehida Salim,Baouya Abdelhakim,Alonso Diego Fernández,Brun Paul-Emmanuel,Massot Guillemette,Bozga Marius,Bensalem Saddek
Publisher
Springer International Publishing
Reference22 articles.
1. MEHARI: Method for Harmonized Analysis of Risk (2010). https://en.wikipedia.org/wiki/MEHARI
2. Risk assessment in water management infrastructure (2020). https://github.com/SafetyAnalysis/Asset-driven-Approach-for-Security-Risk-Assessment-in-IoT-Systems/blob/master/EMALCSA-RiskAssessment.xlsx
3. den Braber, F., Hogganvik, I., Lund, M.S., Stølen, K., Vraalsen, F.: Model-based security analysis in seven steps – a guided tour to theCORAS method. BT Technol. J. 25(1), 101–117 (2007). https://doi.org/10.1007/s10550-007-0013-9, http://link.springer.com/10.1007/s10550-007-0013-9
4. Chehida, S., Baouya, A., Bozga, M., Bensalem, S.: Exploration of impactful countermeasures on IoT attacks. In: 2020 9th Mediterranean Conference on Embedded Computing (MECO) (2020)
5. Ekelhart, A., Fenz, S., Neubauer, T.: AURUM: a framework for information security risk management. In: 2009 42nd Hawaii International Conference on System Sciences, pp. 1–10 (2009)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献