Proceedings of the 15th International Conference on Software Technologies 2020
DOI: 10.5220/0009872103500360
|View full text |Cite
|
Sign up to set email alerts
|

Verifying the Application of Security Measures in IoT Software Systems with Model Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(16 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…1. Integration of MLCA with some audit stages (in grey) [29] MLCA aims at assisting auditors to verify whether security properties hold on IoT systems with the automatic generation of behavioural models from event logs and with the generation of concrete security properties. Our approach can complement several existing security audit processes, e.g., the NIST or ETSI security audit frameworks.…”
Section: Mlca Overviewmentioning
confidence: 99%
See 4 more Smart Citations
“…1. Integration of MLCA with some audit stages (in grey) [29] MLCA aims at assisting auditors to verify whether security properties hold on IoT systems with the automatic generation of behavioural models from event logs and with the generation of concrete security properties. Our approach can complement several existing security audit processes, e.g., the NIST or ETSI security audit frameworks.…”
Section: Mlca Overviewmentioning
confidence: 99%
“…This section details the MLCA's steps 2 to 5. More details of the model learning step are available in [30,29]. Before describing these steps, we provide some definitions and notations to be used throughout the remainder of the paper.…”
Section: The Model Learning Checking Approachmentioning
confidence: 99%
See 3 more Smart Citations