![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog
By 2025, it is projected that cybercrimes will escalate to an alarming annual figure of 10.5 trillion USD. To counter this growing threat, cybersecurity repositories such as CVE, CWE, CAPEC, and Mitre Att &ck ...
-
Chapter and Conference Paper
Service-Oriented Control-Command Components for Designing Complex Systems
An important task in designing control-command systems is defining components for two essential parts of the system: command and monitoring. Instead of develo** a monolithic executable, designers use reusab...
-
Chapter and Conference Paper
End User Designing of Complex Task Models for Complex Control-Command Systems
In the design of control-command systems, task models are useful for collecting requirements about the use of the systems. Indeed, task models describe actions the supervisor performs to start, to control and ...
-
Chapter and Conference Paper
Designing Functional Specifications for Complex Systems
For designing complex and sociotechnical (System that strongly interact with humans (e.g., a ship is a large sociotechnical system).) systems, designers are in charge of the functional specification because th...
-
Chapter and Conference Paper
Formal Verification of Software-Intensive Systems Architectures Described with Pi** and Instrumentation Diagrams
Socio-technical systems are increasingly becoming software-intensive. The challenge now is to design the architecture of such software-intensive systems for guaranteeing not only its correctness, but also the ...