2016
DOI: 10.1007/978-3-319-45480-1_30
|View full text |Cite
|
Sign up to set email alerts
|

Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…This method was used in [26] to validate the custom-designed emulators of transmission power lines by comparing the emulation results to Simulink/MatLab models. This form of testing also has the advantage of not being limited to real-time; thus, it may be used to quickly generate results for physical or cybercomponents [73][74][75][76][77][78][79][80][81][82].…”
Section: Cyber-physical System Testingmentioning
confidence: 99%
“…This method was used in [26] to validate the custom-designed emulators of transmission power lines by comparing the emulation results to Simulink/MatLab models. This form of testing also has the advantage of not being limited to real-time; thus, it may be used to quickly generate results for physical or cybercomponents [73][74][75][76][77][78][79][80][81][82].…”
Section: Cyber-physical System Testingmentioning
confidence: 99%
“… Evaluating security patterns: Some research works such as (Halkidis et al, 2006), (Motii et al, 2016b) and (Duncan and de Muijnck-Hughes, 2014) have focused on the evaluation of security patterns themselves.  Evaluating the effect of security patterns on software systems: Another group of research works such as (Abramov et al, 2012b), (Smith and Williams, 2012) and (Ortiz et al, 2011) have analyzed the effectiveness of security patterns and pattern-based methods on the security of the target system.…”
Section: The Quality Evaluation Categorymentioning
confidence: 99%