Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
This paper advocates that “use cases,” which specify operational interactions and requirements, and “misuse cases,” which specify potential misuse or abuse ...
ios, can be used to analyze and link forensic evidence and create post- incident reconstructions. Use-misuse case analysis techniques involving.
Abstract. Forensic analysis helps identify the causes of crimes and accidents. De- termination of cause, however, requires detailed knowledge of a sys-.
People also ask
Request PDF | Security requirement derivation by noun-verb analysis of use-misuse case relationships: A case study using positive train control | Use cases ...
Use cases and misuse cases, respectively, state the interactions that an actor can have and a mal-actor be prevented from having with a system.
Dec 25, 2010 · However, additional study and formalization of Use–Misuse Case ... Mapping misuse cases to functional fault trees for positive train control ...
Missing: Driven | Show results with:Driven
Oct 25, 2019 · A risk assessment that will evaluate the potential hazards and risks to the fullest extent possible to verify that the PTC system is equal to or ...
Missing: Misuse | Show results with:Misuse
Experience in a railway trade-off study led to the devising of a set of relationships suited to trade-offs analysis: 'threatens', 'mitigates', 'aggravates', ...
Security requirement derivation by noun---verb analysis of use---misuse case relationships: a case study using positive train control.