Author:
Seid Elias,Popov Oliver,Blix Fredrik
Reference25 articles.
1. Runtime monitoring and resolution of probabilistic obstacles to system goals;Cailliau,2017
2. Moore, A. P., Ellison, R. J., and Linger, R. C. (2001) Attack modeling for information security and survivability. Technical report,
3. Seid, E., Popov, O., and Blix, F. (2023). Security Attack Event Monitoring for Cyber Physical-Systems. In Mori, P., Lenzini, G., and Furnell, S., editors, Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, 2023, pages 722–732. SciTePress
4. H. Mouratidis, “A natural extension of tropos methodology for modelling security,” 2002.
5. P. Giorgini, F. Massacci, and N. Zannone, “Security and trust requirements engineering,” in Foundations of Security Analysis and Design III. Springer, 2005, pp. 237–272.