Sciweavers

313 search results - page 30 / 63
» Crisis Management Systems: A Case Study for Aspect-Oriented ...
Sort
View
IWIA
2006
IEEE
14 years 1 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
CAISE
2006
Springer
13 years 11 months ago
Modeling Airport Security Regulations in Focal
We describe the formal models of two standards related to airport security: one at the international level and the other at the European level. These models are expressed using the...
David Delahaye, Jean-Frédéric &Eacut...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Using quantitative analysis to implement autonomic IT systems
The software underpinning today’s IT systems needs to adapt dynamically and predictably to rapid changes in system workload, environment and objectives. We describe a software f...
Radu Calinescu, Marta Z. Kwiatkowska
ECBS
2008
IEEE
116views Hardware» more  ECBS 2008»
14 years 2 months ago
CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments
System execution modeling (SEM) tools provide an effective means to evaluate the quality of service (QoS) of enterprise distributed real-time and embedded (DRE) systems. SEM tools...
James H. Hill, Douglas C. Schmidt, Adam A. Porter,...
ISAS
2004
Springer
14 years 1 months ago
A Modular Approach for Model-Based Dependability Evaluation of a Class of Systems
Analytical and simulative modeling for dependability and performance evaluation has been proven to be a useful and versatile approach in all the phases of the system life cycle. I...
Stefano Porcarelli, Felicita Di Giandomenico, Paol...