Sciweavers

269 search results - page 6 / 54
» Using model-based security analysis in component-oriented sy...
Sort
View
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 11 days ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 2 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
14 years 25 days ago
Financial Model-Base Construction for Flexible Model Manipulation of Models and Solvers
As financial markets are volatile and rapidly changing, preciseness and agility in price evaluation and risk assessment in the portfolios are more important and decision support s...
Keun-Woo Lee, Soon-Young Huh
IFM
2010
Springer
204views Formal Methods» more  IFM 2010»
13 years 6 months ago
Collaborative Modelling and Co-simulation in the Development of Dependable Embedded Systems
This paper presents initial results of research aimed at developing methods and tools for multidisciplinary collaborative development of dependable embedded systems. We focus on th...
John S. Fitzgerald, Peter Gorm Larsen, Ken Pierce,...
ISI
2008
Springer
13 years 7 months ago
Analyzing content development and visualizing social interactions in Web forum
Web forums provide platforms for any Internet users around the world to communicate with each other and express their opinions. In many of the discussions in Web Forums, it involve...
Christopher C. Yang, Tobun Dorbin Ng