1
2
3
4
5
6
by Freitag, Michael.
Published 2021
Format:
Table of Contents: ...Intro -- Preface -- History -- This Book -- Contents -- Part I Models and Methods for Planning...
Click to View
7
by Reussner, Ralf.
Published 2019
Format:
Table of Contents: ....5.4 Heuristics-Based Run-Time Assessment to Detect Security Requirement Violations -- 9.5.5 Adaption During Run...
Click to View
8
by Kutter, Bruce L.
Published 2019
Format:
Table of Contents: ....3.5 Saturation of the Model -- 1.4 Instrumentation of the Model -- 1.4.1 Required Instrumentation -- 1...
Click to View