JavaShuo
栏目
标签
SysML Models and Model Transformation for Security
时间 2020-12-26
标签
形式化方法
繁體版
原文
原文链接
SysML模型和模型转换以实现安全性 摘要 嵌入式系统的安全漏洞已成为网络罪犯非常有价值的目标。 引入SysML-Sechas来针对这些系统在其开发阶段的安全性。 但是,评估这些阶段的攻击抵抗力需要有效地捕获系统的行为,并从这些行为中正式证明安全性。 因此,本文提出(i)增强了新颖的SysML框图和状态机图,以更好地捕获安全功能,以及(ii)从模型到Proverif的转换.ProVerif是首次发
>>阅读原文<<
相关文章
1.
SysML-Sec A model Driven Approach for Designing Safe and Secure Systems
2.
MEASUREMENT MODELS AND PRINCIPLES FOR SOURCE LOCALIZATION
3.
[Backbone]5. Model & View, toggle between Models and Views -- 2
4.
Article - World, View and Projection Transformation Matrices
5.
Towards the Model-Driven Engineering of Security Requirements for Embedded System
6.
Maximum Entropy Markov Models for Information Extraction and Segmentation
7.
SysML——AI-Sys Spring 2019
8.
Deep Learning Models and Code for Pose Estimation
9.
SysML-Sec: A Model-Driven Environment for Developing Secure Embedded Systems
10.
Computational Models for Social and Information Network Analysis
更多相关文章...
•
Swift for 循环
-
Swift 教程
•
Scala for循环
-
Scala教程
•
RxJava操作符(七)Conditional and Boolean
•
算法总结-股票买卖
相关标签/搜索
sysml
transformation
models
model
security
transformation&action
models&orm
2.models
action.....and
between...and
0
分享到微博
分享到微信
分享到QQ
每日一句
每一个你不满意的现在,都有一个你没有努力的曾经。
最新文章
1.
深度学习硬件架构简述
2.
重温矩阵(V) 主成份分析
3.
国庆佳节第四天,谈谈我月收入增加 4K 的故事
4.
一起学nRF51xx 23 - s130蓝牙API介绍
5.
2018最为紧缺的十大岗位,技术岗占80%
6.
第一次hibernate
7.
SSM项目后期添加数据权限设计
8.
人机交互期末复习
9.
现在无法开始异步操作。异步操作只能在异步处理程序或模块中开始,或在页生存期中的特定事件过程中开始...
10.
微信小程序开发常用元素总结1-1
本站公众号
欢迎关注本站公众号,获取更多信息
相关文章
1.
SysML-Sec A model Driven Approach for Designing Safe and Secure Systems
2.
MEASUREMENT MODELS AND PRINCIPLES FOR SOURCE LOCALIZATION
3.
[Backbone]5. Model & View, toggle between Models and Views -- 2
4.
Article - World, View and Projection Transformation Matrices
5.
Towards the Model-Driven Engineering of Security Requirements for Embedded System
6.
Maximum Entropy Markov Models for Information Extraction and Segmentation
7.
SysML——AI-Sys Spring 2019
8.
Deep Learning Models and Code for Pose Estimation
9.
SysML-Sec: A Model-Driven Environment for Developing Secure Embedded Systems
10.
Computational Models for Social and Information Network Analysis
>>更多相关文章<<