LSCs: Breathing Life into Message Sequence Charts, Formal Methods in System Design, vol.19, issue.1, pp.45-80, 2001. ,
DOI : 10.1023/A:1011227529550
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.5472
Secure and authentic communication on existing in-vehicle networks, 2009 IEEE Intelligent Vehicles Symposium, pp.1093-1097, 2009. ,
DOI : 10.1109/IVS.2009.5164434
Some Results on the Expressive Power and Complexity of LSCs, Lecture Notes in Computer Science, vol.4800, p.351, 2008. ,
DOI : 10.1007/978-3-540-78127-1_19
UMLintr: a UML profile for specifying intrusions, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06), pp.8-288, 2006. ,
DOI : 10.1109/ECBS.2006.70
UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, pp.412-425, 2002. ,
DOI : 10.1007/3-540-45800-X_32
Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010. ,
DOI : 10.1109/SP.2010.34
Classification and Detection of Computer Intrusions, 1995. ,
Detecting computer and network misuse through the production-based expert system toolset (P-BEST), Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.146-161, 1999. ,
DOI : 10.1109/SECPRI.1999.766911
SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: UML 2002 ? The Unified Modeling Language, pp.426-441, 2002. ,
DOI : 10.1007/3-540-45800-x_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.6554
Towards Practical Security Monitors of UML Policies for Mobile Applications, Proc. of IEEE POLICY '07, pp.278-278, 2007. ,
Secure vehicular communication systems: design and architecture, IEEE Communications Magazine, vol.46, issue.11, pp.100-109, 2008. ,
DOI : 10.1109/MCOM.2008.4689252
Monitor petri nets for security monitoring?, Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, S&D4RCES '10, 2010. ,
DOI : 10.1145/1868433.1868438
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.5693
Entwurf und Entwicklung einer effizienten Analyseeinheit für Intrusion-Detection-Systeme, 2004. ,
Capturing Security Requirments through Misuse Cases, p.2001, 2001. ,
DOI : 10.1007/s00766-004-0194-4
Security and management policy specification, IEEE Network, vol.16, issue.2, pp.10-19, 2002. ,
DOI : 10.1109/65.993218
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.8405
Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.19-28, 2007. ,
DOI : 10.1109/POLICY.2007.42
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.487.8702
The STAT tool suite, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.46-55, 2000. ,
DOI : 10.1109/DISCEX.2000.821508
The Good, the Bad and the Ugly: Well-Formedness of Live Sequence Charts, In: Fundamental Approaches to Software Engineering, vol.3922, pp.230-246, 2006. ,
DOI : 10.1007/11693017_18