榨取 发表于 2025-3-26 23:52:58
Supporting Risk Assessment with the Systematic Identification, Merging, and Validation of Security Ga model of the system under development (SUD) is not well-supported in established methods. Thus, we demonstrate how the systematic identification, merging, and validation of security goals based on a model of the SUD in a concrete implementation of our method Modular Risk Assessment (MoRA) supports security engineers to handle this challenge.苦恼 发表于 2025-3-27 03:23:28
Risk Management During Software Development: Results of a Survey in Software Houses from Germany, Au for not performing risk management are lack of resources, need and knowledge. An important application area of risk assessment results is the prioritization of test cases. Finally, technical product risks as well as project risks are commonly applied risk assessment criteria.盘旋 发表于 2025-3-27 07:56:49
http://reply.papertrans.cn/84/8307/830624/830624_33.png流眼泪 发表于 2025-3-27 10:54:11
Towards Transparent Real-Time Privacy Risk Assessment of Intelligent Transport Systems risks. We propose a method to privacy risk assessment addressing these challenges. The method is exemplified on an ITS-example. The initial results indicate feasibility of the method and propose directions for future work.Engaged 发表于 2025-3-27 17:16:16
Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphsk over time, depending on the possible progression of the attacker. As a result, pwnPr3d provides stakeholders in organizations with a holistic approach that both allows high-level overview and technical details.陶瓷 发表于 2025-3-27 18:30:51
http://reply.papertrans.cn/84/8307/830624/830624_36.pngLimited 发表于 2025-3-27 23:52:38
http://reply.papertrans.cn/84/8307/830624/830624_37.pngGobble 发表于 2025-3-28 02:41:49
Conference proceedings 2017lected from 11 submissions. They focus on research studying, developing and evaluating innovative techniques, tools, languages and methods risk assessment and risk-driven quality engineering. The papers are organized topical sections: security risk management; security risk analysis; risk-based testing..membrane 发表于 2025-3-28 09:21:20
Design Decisions in the Development of a Graphical Language for Risk-Driven Security TestingWe have developed a domain-specific modeling language named CORAL that employs risk assessment to help security testers select and design test cases based on the available risk picture. In this paper, we present CORAL and then discuss why the language is designed the way it is, and what we could have done differently.hemophilia 发表于 2025-3-28 13:40:20
Jürgen Großmann,Michael Felderer,Fredrik SeehusenIncludes supplementary material: .Includes supplementary material: