Filter your results
- 2
- 2
- 2
- 1
- 2
- 2
- 1
- 1
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
2 results
|
|
sorted by
|
|
A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven EngineeringInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.79-93, ⟨10.1007/978-3-319-10975-6_6⟩
Conference papers
hal-01403987v1
|
||
|
A Customizable Monitoring Infrastructure for Hardware/Software Embedded Systems26th IFIP International Conference on Testing Software and Systems (ICTSS), Sep 2014, Madrid, Spain. pp.173-179, ⟨10.1007/978-3-662-44857-1_12⟩
Conference papers
hal-01405284v1
|