2014
DOI: 10.1007/978-3-319-11743-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Toward a UCM-Based Approach for Recovering System Availability Requirements from Execution Traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Numerous ideas can be taken forward from this research for future experimentation. First, the study can be replicated using the real-time network simulators such as GNS3 (Hassine and Hamou-Lhadj, 2014 ) and OMNeT++ (Varga and Hornig, 2008 ). It might be interesting to compare the results of real-time network simulation environments and HackIT environment in investigating the influence of subnetting and port-hardening on human decision during a cyber-attack.…”
Section: Discussionmentioning
confidence: 99%
“…Numerous ideas can be taken forward from this research for future experimentation. First, the study can be replicated using the real-time network simulators such as GNS3 (Hassine and Hamou-Lhadj, 2014 ) and OMNeT++ (Varga and Hornig, 2008 ). It might be interesting to compare the results of real-time network simulation environments and HackIT environment in investigating the influence of subnetting and port-hardening on human decision during a cyber-attack.…”
Section: Discussionmentioning
confidence: 99%
“…GNS 3 is nowadays widely used in various companies for network simulation as well. GNS 3 software also allows the researchers to perfectly emulate the complex networks which incorporate both the actual devices also with the virtual devices and minimal support is feasible for LTE [28].…”
Section: It++mentioning
confidence: 99%