Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.
Component criticality analysis to minimize soft errors riskInternational Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37
Sheikh Sadi, Muhammad; G. Myers, D.; Ortega-Sanchez, Cesar et al.
Component criticality analysis to minimize soft errors risk.Comput. Syst. Sci. Eng. Bd. 25. H. 5. 2010
Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan
Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentationComputer Security Foundations Symposium (CSF). 2010
Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsecRequirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93
Hilde Houmb, Siv; Islam, Shareeful; Knauss, Eric et al.
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec.Requir. Eng. Bd. 15. H. 1. 2010 S. 63 - 93
Pironti, Alfredo; Jürjens, Jan
Formally-Based Black-Box Monitoring of Security ProtocolsFabio Massacci;Dan Wallach;Nicola Zannone (Hrsg). Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Berlin: Springer 2010 S. 79 - 95 (Lecture Notes in Computer Science)
Pironti, Alfredo; Jürjens, Jan
Formally-Based Black-Box Monitoring of Security Protocols.ESSoS. 2010 S. 79 - 95
Mouratidis, Haralambos; Jürjens, Jan
From goal-driven security requirements engineering to secure designInternational Journal of Intelligent Systems. Bd. 25. H. 8. New York, NY: Wiley 2010 S. 813 - 840
Mouratidis, Haralambos; Jürjens, Jan
From goal-driven security requirements engineering to secure design.Int. J. Intell. Syst. Bd. 25. H. 8. 2010 S. 813 - 840