JavaShuo
欄目
標籤
SysML Models and Model Transformation for Security
時間 2020-12-26
標籤
形式化方法
简体版
原文
原文鏈接
SysML模型和模型轉換以實現安全性 摘要 嵌入式系統的安全漏洞已成爲網絡罪犯非常有價值的目標。 引入SysML-Sechas來針對這些系統在其開發階段的安全性。 但是,評估這些階段的攻擊抵抗力需要有效地捕獲系統的行爲,並從這些行爲中正式證明安全性。 因此,本文提出(i)增強了新穎的SysML框圖和狀態機圖,以更好地捕獲安全功能,以及(ii)從模型到Proverif的轉換.ProVerif是首次發
>>阅读原文<<
相關文章
1.
SysML-Sec A model Driven Approach for Designing Safe and Secure Systems
2.
MEASUREMENT MODELS AND PRINCIPLES FOR SOURCE LOCALIZATION
3.
[Backbone]5. Model & View, toggle between Models and Views -- 2
4.
Article - World, View and Projection Transformation Matrices
5.
Towards the Model-Driven Engineering of Security Requirements for Embedded System
6.
Maximum Entropy Markov Models for Information Extraction and Segmentation
7.
SysML——AI-Sys Spring 2019
8.
Deep Learning Models and Code for Pose Estimation
9.
SysML-Sec: A Model-Driven Environment for Developing Secure Embedded Systems
10.
Computational Models for Social and Information Network Analysis
更多相關文章...
•
Swift for 循環
-
Swift 教程
•
Scala for循環
-
Scala教程
•
RxJava操作符(七)Conditional and Boolean
•
算法總結-股票買賣
相關標籤/搜索
sysml
transformation
models
model
security
transformation&action
models&orm
2.models
action.....and
between...and
0
分享到微博
分享到微信
分享到QQ
每日一句
每一个你不满意的现在,都有一个你没有努力的曾经。
最新文章
1.
添加voicebox
2.
Java 8u40通過Ask廣告軟件困擾Mac用戶
3.
數字圖像處理入門[1/2](從幾何變換到圖像形態學分析)
4.
如何調整MathType公式的字體大小
5.
mAP_Roi
6.
GCC編譯器安裝(windows環境)
7.
LightGBM參數及分佈式
8.
安裝lightgbm以及安裝xgboost
9.
開源matpower安裝過程
10.
從60%的BI和數據倉庫項目失敗,看出從業者那些不堪的亂象
本站公眾號
歡迎關注本站公眾號,獲取更多信息
相關文章
1.
SysML-Sec A model Driven Approach for Designing Safe and Secure Systems
2.
MEASUREMENT MODELS AND PRINCIPLES FOR SOURCE LOCALIZATION
3.
[Backbone]5. Model & View, toggle between Models and Views -- 2
4.
Article - World, View and Projection Transformation Matrices
5.
Towards the Model-Driven Engineering of Security Requirements for Embedded System
6.
Maximum Entropy Markov Models for Information Extraction and Segmentation
7.
SysML——AI-Sys Spring 2019
8.
Deep Learning Models and Code for Pose Estimation
9.
SysML-Sec: A Model-Driven Environment for Developing Secure Embedded Systems
10.
Computational Models for Social and Information Network Analysis
>>更多相關文章<<