Threat modeling is about identifying architectural flaws and weaknesses in a system in order to mitigate them and avoid unwanted incidents caused by an attacker. Tool-assisted threat modeling has seen limited use in c...
详细信息
ISBN:
(纸本)9781665425292
Threat modeling is about identifying architectural flaws and weaknesses in a system in order to mitigate them and avoid unwanted incidents caused by an attacker. Tool-assisted threat modeling has seen limited use in complex cyber-physical systems involving both Information Technology (IT) and Operational Technology (OT) systems. In this paper, we investigate the applicability of tool-assisted threat modeling to the complex cyber-physical system that is the smart grid, and present a new Smart Grid template for the Microsoft Threat Modeling Tool. We demonstrate benefits of our smart grid threat modeling template on a use-case, and discuss limitations.
The purpose of designing the automobile inspection data network query system is to realize the query and statistics of automobile inspection data on the Internet. The system connects the holders and demanders of autom...
详细信息
ISBN:
(纸本)9781665435741
The purpose of designing the automobile inspection data network query system is to realize the query and statistics of automobile inspection data on the Internet. The system connects the holders and demanders of automobile inspection data, and meets the query statistics requirements of those who demand automobile inspection data. The vehicle inspection data network query system has designed an identity authority authentication program to ensure the safety of vehicle inspection data. According to the different needs of the society for automobile inspection data, a network query system for automobile inspection data is constructed. According to the user's different identity permissions, the range of vehicle detection data that can be queried is also different. According to the previous survey of user needs, the system summarizes user needs. Constructed the data flow diagram of the automobile inspection data network query system program. The database table is designed, and the network query system for automobile inspection data is completed. The trial operation of the vehicle inspection data query system has been realized. All the goals of the system design can be perfectly achieved, and the network query system for vehicle inspection data is safe after trial operation.
Ripple effect in the modification of software requirements should be properly analyzed, since it may cause errors of software requirements. We have already proposed a ripple effect analysis method in deletion or updat...
详细信息
ISBN:
(纸本)9789897583797
Ripple effect in the modification of software requirements should be properly analyzed, since it may cause errors of software requirements. We have already proposed a ripple effect analysis method in deletion or update of dataflow requirements. In this paper, we enhance our method considering ripple effect analysis in adding new dataflows requirements. Our method will be illustrated with examples.
this paper aims to provide a service that improves In-stores customer's shopping experience in order to lead stores 'customers' comfort, efficient, and convenient shopping experience by applying images pro...
详细信息
ISBN:
(纸本)9781728101088
this paper aims to provide a service that improves In-stores customer's shopping experience in order to lead stores 'customers' comfort, efficient, and convenient shopping experience by applying images processing technique in an Android mobile application. The proposed project is developing an Android mobile application that uses the phone camera to capture the product's barcode label and also price labels. By using this mobile application, customers and stores both gain improvement. Store's shopper gets full product information immediately and correctly in a convenient and fast way by only scanning the product's barcode then it can translate this information into several languages. Also, this project serves customer shopping experience in calculating the total cost of their purchases while they are shopping in any store and in any gallery by only capturing the written prices' labels.
The orthodoxy in the time-varying channel is that, the mutual information (MI) rate of the Uniform Symmetric Variable Noise Finite State Markov Channel (USVN-FSMC) is maximized by the channel input of maximum entropy,...
详细信息
ISBN:
(纸本)9784885522673
The orthodoxy in the time-varying channel is that, the mutual information (MI) rate of the Uniform Symmetric Variable Noise Finite State Markov Channel (USVN-FSMC) is maximized by the channel input of maximum entropy, i.e., independent and identically distributed (i.i.d.) and uniform. The optimal signal detection is performed by a decision-feedback decoder (DFD). However this decoder is not reliable;its state estimator often loses track of channel states. Only the error propagation is claimed as the reason. This paper first revisits the cause of the decoding unreliability. It is assumed that the channel input is known by the state estimator of the DFD (there is no error propagation). Simulations are designed to show that, even under this assumption, the channel state cannot be estimated reliably when the channel input approaches maximum entropy. Therefore, the inability to estimate the channel state, rather than error propagation, is the primary cause of the decoding unreliability. Simulation results also exhibit that the price of channel state estimation is a decrease in channel input entropy. This effect has not been included in the derivation of the MI rate in the existing literature. In the second part of the paper, a more accurate analysis of the MI rate of USVN-FSMCs is put forward. It is shown that, on one hand, channel state estimation increases the MI rate by enabling a more reliable information transfer. On the other hand, it requires redundancy in the channel input, which lowers the MI rate. An optimal tradeoff between these two opposite effects can be established, which leads to the maximum channel MI rate. This tradeoff does not occur for maximum-entropy channel inputs, neither does the maximum MI rate of the USVN-FSMC.
This paper describes how to present different multimedia objects on a Multimedia Abstract Machine with a structural mechanism. The structural mechanism is based on the Petri net. Using features of a Petri net to displ...
详细信息
ISBN:
(纸本)0818672250
This paper describes how to present different multimedia objects on a Multimedia Abstract Machine with a structural mechanism. The structural mechanism is based on the Petri net. Using features of a Petri net to display the behavior of multimedia objects and to introduce the concepts of user navigation messages in our model. In this paper, we will explain the algorithm of the machine, The main goal of this structural mechanism provides a feasible method to represent a schedule and the navigation of different multimedia objects with user navigation messages. Users only input a data flow diagram and a Control flowdiagram to the machine, and the system will display all situations of the presentation and users can dynamically change conditions of requests during the presentation. For testing the machine, we implement the algorithm using a Petri net diagram, and analyze the model with a time schedule of multimedia objects, and product: a synchronous set of multimedia objects with respect to a time duration. Finally, we measure our multimedia presentations based on software engineering approach.
In this paper, the algebraic Petri nets (APN) is used to a vendor management inventory (VMI) system modeling. An APN specification for a simple VMI system is put out and a procedure to write APN specification is propo...
详细信息
ISBN:
(纸本)0780385667
In this paper, the algebraic Petri nets (APN) is used to a vendor management inventory (VMI) system modeling. An APN specification for a simple VMI system is put out and a procedure to write APN specification is proposed. The procedure is based on informal specification of structure analysis. The data flow diagram and decision table are used in the procedure. An efficient process to write APN specification is achieved. It is named transition first method. The amount and time of replenishment can be achieved by such APN specifications.
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research ...
详细信息
ISBN:
(纸本)9789897583742
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research on OTA threats often exclude human actors, such as drivers and maintenance personnel, as well as leave aside privacy threats. This paper addresses the gap by investigates security and privacy OTA threats relevant for vehicle manufacturers for the whole product lifecycle. We report on a practical scenario "long term support", its dataflow elements, and outcomes of threat analyses. We apply state of the art approaches, such as STRIDE (extended with an automotive template) and LINDDUN, to an automotive case and consider an automotive-specific UNECE OTA threat catalogue. Outcomes indicate complementarity of these methods and provide inputs to studies how well they address practical automotive cases.
In the last decade, there has been more and more focus on the topic of information privacy, especially considering the ever increasing digital transformations that both businesses and the society are experiencing. As ...
详细信息
ISBN:
(纸本)9781450359337
In the last decade, there has been more and more focus on the topic of information privacy, especially considering the ever increasing digital transformations that both businesses and the society are experiencing. As a right of individuals to "control when, how and to what extent information about them is communicated to others" [29], privacy has become an important expectation of users. A recent study in the EU showed that more than 70% of the citizens are not willing to sacrifice their privacy in exchange for a service [17]. The paradigm of Privacy-by-Design (PbD) [14] has become more important nowadays, which has also become a regulatory requirement by the EU General data Protection Regulation (GDPR), which came into force in May 2018 [2]. PbD as a paradigm defines principles promoting the integration of privacy goals already during the design of an ICT system. However, translating those principles into engineering requirements is seen as a challenge.
The de facto status of unified modeling language (UML) remains unaltered even after 20 years of advances in other technologies. The non-ascension in the status indicates some lacuna in UML, though it has undergone up-...
详细信息
ISBN:
(纸本)9789811055447;9789811055430
The de facto status of unified modeling language (UML) remains unaltered even after 20 years of advances in other technologies. The non-ascension in the status indicates some lacuna in UML, though it has undergone up-gradation in subsequent versions. Initially, UML is developed by three amigos to widen the scope and enhance the richness of diagramming languages. The clairvoyant study based on the number of involved diagrams indicates that, instead of unifying the semiotics of all three amigos diagramming languages, the diagrams of three languages are unified, discarding some of the diagrams with apprehension of descension in UML richness. The functional model which is quintessence of any open system has been discarded costing utilities of UML. This paper formulates the richness through logical positivism, unifies the semiotics of participating diagramming languages, and enhances through the reintroduction of modified functional model in the form of work process flowdiagram.
暂无评论