Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a security attack meta-model for our SysML-Sec framework [18], developed to improve the threat identification and modeling through the explicit representation of security concerns with knowledge representation techniques. Our proposed meta-model enables the specification of these concerns through ontological concepts which define the semantics of the security ...
<p>In our increasingly connected world, security is a growing concern for embedded systems. A system...
Software systems have become highly distributed and complex involving independent components working...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
International audience<p>Security attacks are hard to understand, often expressed with unfriendly an...
We routinely hear vendors claim that their systems are "secure." However, without knowing what assum...
The creation of secure applications is more than ever a complex task because it requires from system...
International audienceCybersecurity is becoming vital as industries are gradually moving from automa...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
In the development process of a secure system is essential to detect as early as possible the system...
Designing a secure software system requires the ability to represent and reason about a wide variety...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Designing security for a computer system is best done by utilizing a systematic engineering approach...
Software systems become increasingly distributed, involving many independent and collaborating compo...
Software systems become increasingly distributed, involving many independent and collaborating compo...
<p>In our increasingly connected world, security is a growing concern for embedded systems. A system...
Software systems have become highly distributed and complex involving independent components working...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
International audience<p>Security attacks are hard to understand, often expressed with unfriendly an...
We routinely hear vendors claim that their systems are "secure." However, without knowing what assum...
The creation of secure applications is more than ever a complex task because it requires from system...
International audienceCybersecurity is becoming vital as industries are gradually moving from automa...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
In the development process of a secure system is essential to detect as early as possible the system...
Designing a secure software system requires the ability to represent and reason about a wide variety...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Designing security for a computer system is best done by utilizing a systematic engineering approach...
Software systems become increasingly distributed, involving many independent and collaborating compo...
Software systems become increasingly distributed, involving many independent and collaborating compo...
<p>In our increasingly connected world, security is a growing concern for embedded systems. A system...
Software systems have become highly distributed and complex involving independent components working...
In the paper the usage of the ontological approach, description logics and logical inference to the ...