Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog
By 2025, it is projected that cybercrimes will escalate to an alarming annual figure of 10.5 trillion USD. To counter this growing threat, cybersecurity repositories such as CVE, CWE, CAPEC, and Mitre Att &ck ...
-
Chapter and Conference Paper
Formal Verification of Software-Intensive Systems Architectures Described with Pi** and Instrumentation Diagrams
Socio-technical systems are increasingly becoming software-intensive. The challenge now is to design the architecture of such software-intensive systems for guaranteeing not only its correctness, but also the ...