2016
DOI: 10.1007/s12652-016-0371-6
|View full text |Cite
|
Sign up to set email alerts
|

Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…For example, some firms do not have their own factories, so they can focus on activities that are more profitable [2], while others continue expanding their manufacturing capacity to further drive down costs [3]. Other common strategies include: outsourcing [4], the blue ocean strategy [5], better scheduling [6,7], factory simulation [8,9], green and lean technologies [10][11][12], applying the competitiveness diamond model [13], cyber-physical systems and cloud manufacturing [14][15][16], developing next-generation technologies [17,18], forming alliances [19,20], etc.…”
Section: Introductionmentioning
confidence: 99%
“…For example, some firms do not have their own factories, so they can focus on activities that are more profitable [2], while others continue expanding their manufacturing capacity to further drive down costs [3]. Other common strategies include: outsourcing [4], the blue ocean strategy [5], better scheduling [6,7], factory simulation [8,9], green and lean technologies [10][11][12], applying the competitiveness diamond model [13], cyber-physical systems and cloud manufacturing [14][15][16], developing next-generation technologies [17,18], forming alliances [19,20], etc.…”
Section: Introductionmentioning
confidence: 99%
“…A number of papers raise the concerns related to security issues, for example [3,6,10], and analyze the possible security problems [4,5]. Moreover, for security testing as a standalone discipline, a number of reports can be found, as an example, we can give [11,12]. Furthermore, a number of secure architectures on a conceptual and physical level are discussed, for instance [13,14].…”
Section: Iot Testbeds 38mentioning
confidence: 99%
“…Academia is very concerned about methods for formal verification of the safety of an OS in ITS, which is related not only to implementation but also, initially, to system design Desnitsky and Kotenko (2016). An OS in ITS designed without consideration of safety requirements may not be safe even though the implementation is correct.…”
Section: Introductionmentioning
confidence: 99%