{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:10:41Z","timestamp":1772727041134,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319748597","type":"print"},{"value":"9783319748603","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74860-3_7","type":"book-chapter","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T04:34:39Z","timestamp":1516250079000},"page":"99-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Modeling for Embedded System Design"],"prefix":"10.1007","author":[{"given":"Letitia W.","family":"Li","sequence":"first","affiliation":[]},{"given":"Florian","family":"Lugou","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,19]]},"reference":[{"key":"7_CR1","unstructured":"Ali, Y., El-Kassas, S., Mahmoud, M.: A rigorous methodology for security architecture modeling and verification. In: Proceedings of the 42nd Hawaii International Conference on System Sciences. IEEE (2009). 978-0-7695-3450-3\/09"},{"key":"7_CR2","unstructured":"Apvrille, L., Roudier, Y.: SysML-Sec: a model driven approach for designing safe and secure systems. In: 3rd International Conference on Model-Driven Engineering and Software Development, Special session on Security and Privacy in Model Based Engineering. SCITEPRESS Digital Library, France, February 2015"},{"key":"7_CR3","unstructured":"Apvrille, L.: TTool, December 2003. \nttool.telecom-paristech.fr"},{"issue":"1","key":"7_CR4","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MSP.2010.30","volume":"8","author":"J Hansson","year":"2010","unstructured":"Hansson, J., Wrage, L., Feiler, P.H., Morley, J., Lewis, B., Hugues, J.: Architectural modeling to verify security and nonfunctional behavior. IEEE Secur. Priv. 8(1), 43\u201349 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"UML 2002 \u2014 The Unified Modeling Language","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45800-X_32"},{"key":"7_CR6","unstructured":"Kamkar, S.: Skyjack: autonomous drone hacking (2003). \nhttp:\/\/www.samy.pl\/skyjack\/"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-40196-1_15","volume-title":"Quantitative Evaluation of Systems","author":"B Kordy","year":"2013","unstructured":"Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: security analysis with attack\u2013defense trees. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 173\u2013176. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-40196-1_15"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th International Conference on Software Engineering, ICSE 2004, pp. 148\u2013157 (2004)","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Li, L.W., Lugou, F., Apvrille, L.: Security-aware modeling and analysis for HW\/SW partitioning. In: Confer\u00e9nce on Model-Driven Engineering and Software Development (Modelsward 2017), Porto, Portugal, February 2017","DOI":"10.5220\/0006119603020311"},{"issue":"1","key":"7_CR10","first-page":"18","volume":"21","author":"CW Lin","year":"2015","unstructured":"Lin, C.W., Zheng, B., Zhu, Q., Sangiovanni-Vincentelli, A.: Security-aware design methodology and optimization for automotive systems. ACM Trans. Des. Autom. Electroni. Syst. (TODAES) 21(1), 18 (2015)","journal-title":"ACM Trans. Des. Autom. Electroni. Syst. (TODAES)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"ML 2002 \u2014 The Unified Modeling Language","author":"T Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426\u2013441. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45800-X_33"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Lugou, F., Li, L.W., Apvrille, L., Ameur-Boulifa, R.: SysML models and model transformation for security. In: Confer\u00e9nce on Model-Driven Engineering and Software Development (Modelsward 2016), Rome, Italy, February 2016","DOI":"10.5220\/0005748703310338"},{"key":"7_CR13","unstructured":"Rodday, N.: Hacking a Professional Drone, March 2016. Slides at \nwww.blackhat.com\/docs\/asia-16\/materials\/asia-16-Rodday-Hacking-A-Professional-Drone.pdf"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Roudier, Y., Idrees, M.S., Apvrille, L.: Towards the model-driven engineering of security requirements for embedded systems. In: Proceedings of MoDRE 2013, Rio de Janeiro, Brazil, July 2013","DOI":"10.1109\/MoDRE.2013.6597264"},{"issue":"355","key":"7_CR15","first-page":"35","volume":"355","author":"TJ Tanzi","year":"2015","unstructured":"Tanzi, T.J., Sebastien, O., Rizza, C.: Designing autonomous crawling equipment to detect personal connected devices and support rescue operations: technical and societal concerns. Radio Sci. Bull. 355(355), 35\u201344 (2015)","journal-title":"Radio Sci. Bull."},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-319-24255-2_25","volume-title":"Computer Safety, Reliability, and Security","author":"M Vasilevskaya","year":"2015","unstructured":"Vasilevskaya, M., Nadjm-Tehrani, S.: Quantifying risks to data assets using formal metrics in embedded system design. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 347\u2013361. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-24255-2_25"}],"container-title":["Lecture Notes in Computer Science","Graphical Models for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74860-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T01:36:12Z","timestamp":1519090572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74860-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319748597","9783319748603"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74860-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}