2016
DOI: 10.1007/978-3-319-47846-3_10
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…The approach presented in this paper, complements this work by bridging the gap between the security requirements and the actual code. In [16], we have proposed a method for identifying security vulnerabilities using formal architectural model. The UML modeling patterns proposed in this paper can significantly facilitate constructing such models and hence, enable the industrial adoption of the proposed technique.…”
Section: Related Workmentioning
confidence: 99%
“…The approach presented in this paper, complements this work by bridging the gap between the security requirements and the actual code. In [16], we have proposed a method for identifying security vulnerabilities using formal architectural model. The UML modeling patterns proposed in this paper can significantly facilitate constructing such models and hence, enable the industrial adoption of the proposed technique.…”
Section: Related Workmentioning
confidence: 99%