Embedded Systems (ES) development has been historically focused on functionality rather than security, and today it still applies in many sectors and applications. However, there is an increasing number of security threats over ES, and a successful attack could have economical, physical or even human consequences, since many of them are used to control critical applications. A standardized and general accepted security testing framework is needed to provide guidance, common reporting forms and the possibility to compare the results along the time. This can be achieved by introducing security metrics into the evaluation or assessment process. If carefully designed and chosen, metrics could provide a quantitative, repeatable and reproducible ...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
Evaluating the software assurance of a product as it functions within a specific system context invo...
This paper presents an approach to measuring computer security understood as a system property, in t...
This paper addresses quantifying security risks associated with data assets within design models of ...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Security metrics and measurement is a sub-field of broader information security field. This field is...
To identify the key factors and create the landscape of cybersecurity for embedded systems (CSES), a...
In modern society, security issues of IT Systems are intertwined with interdisciplinary aspects, fro...
Security measurement of software-intensive systems is an emerging field, rapidly gaining momentum. W...
The deep integration between the cyber and physical domains in complex systems make very challenging...
Security measurement of software-intensive systems is an emerging field, rapidly gaining momentum. W...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
The term assurance has been used for decades in trusted system development to express the notion of ...
This paper is about trust establishment and trust evaluations techniques. A short background about ...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
Evaluating the software assurance of a product as it functions within a specific system context invo...
This paper presents an approach to measuring computer security understood as a system property, in t...
This paper addresses quantifying security risks associated with data assets within design models of ...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Security metrics and measurement is a sub-field of broader information security field. This field is...
To identify the key factors and create the landscape of cybersecurity for embedded systems (CSES), a...
In modern society, security issues of IT Systems are intertwined with interdisciplinary aspects, fro...
Security measurement of software-intensive systems is an emerging field, rapidly gaining momentum. W...
The deep integration between the cyber and physical domains in complex systems make very challenging...
Security measurement of software-intensive systems is an emerging field, rapidly gaining momentum. W...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
The term assurance has been used for decades in trusted system development to express the notion of ...
This paper is about trust establishment and trust evaluations techniques. A short background about ...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
How secure is a software product or a telecommunication network, or their fusion? In order to obtain...
Evaluating the software assurance of a product as it functions within a specific system context invo...
This paper presents an approach to measuring computer security understood as a system property, in t...