Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Jürgen Großmann"'
Die Sicherheit von IT-Systemen ist heute eine der wichtigsten Qualitätseigenschaften. Wie für andere Eigenschaften gilt auch hier das Ziel, fortwährend sicherzustellen, dass ein IT-System den nötigen Sicherheitsanforderungen genügt, dass diese i
Publikováno v:
Analytic Methods in Systems and Software Testing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::06520076332b2c8faf6b0d717653b4d1
https://doi.org/10.1002/9781119357056.ch1
https://doi.org/10.1002/9781119357056.ch1
This book constitutes the thoroughly refereed conference proceedings of the Fourth International Workshop on Risk Assessment and Risk-Driven Quality Assurance, RISK 2016, held in conjunction with ICTSS 2016, in Graz, Austria, in October 2016. The rev
Autor:
Jürgen Großmann, Arthur-Jozsef Molnar
Complex networked systems are an integral part of today's support infrastructures. Due to their importance, these systems become more and more the target for cyber-attacks, suffering a notable number of security incidents. Also, they are subject to r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fed9feff132943b14be551435062f30c
http://arxiv.org/abs/1702.08006
http://arxiv.org/abs/1702.08006
This book constitutes the thoroughly refereed conference proceedings of the Third International Workshop on Risk Assessment and Risk-driven Testing, RISK 2015, held in conjunction with the OMG Technical Meeting in Berlin, Germany, in June 2015. The r
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and System
Publikováno v:
Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications ISBN: 9783662452301
ISoLA (2)
ISoLA (2)
A systematic integration of risk analysis and security testing allows for optimizing the test process as well as the risk assessment itself. The result of the risk assessment, i.e. the identified vulnerabilities, threat scenarios and unwanted inciden
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::43a51a8a0b06cec789047a41e07f03e0
Publikováno v:
Risk Assessment and Risk-Driven Testing ISBN: 9783319070759
RISK@ICTSS
RISK@ICTSS
The goal of risk-based security testing is to improve the security testing process in order to cover especially risky areas of the application under test and at the same time minimize the time to market and to improve the use of resources by focusing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4394ab28ff545c0b95e12707ac3154e5
https://doi.org/10.1007/978-3-319-07076-6_9
https://doi.org/10.1007/978-3-319-07076-6_9
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319070759
Risk Assessment and Risk-Driven Testing
Risk Assessment and Risk-Driven Testing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::73eb497980c91e6c7b81f759aa7c3178
https://doi.org/10.1007/978-3-319-07076-6
https://doi.org/10.1007/978-3-319-07076-6