Skip to content
Permalink
Browse files

Addition of images

  • Loading branch information
Duncan
Duncan committed Oct 25, 2016
1 parent 26ad7e4 commit 78ed728e9f9bda7e61192b11c856c577960c5050
BIN +95.2 KB images/aadlModel.png
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,10 +1,29 @@
\relax
\select@language{english}
\@writefile{toc}{\select@language{english}}
\@writefile{lof}{\select@language{english}}
\@writefile{lot}{\select@language{english}}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Work}{\thepage }}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Modeling}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Visualization of Security Design Framework}}{\thepage }}
\newlabel{fig:AADLSecFrame}{{1}{\thepage }}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Defining Risk}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {3}General System Modeling}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {4}Defining Risk}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {5}Design Oriented Examination of Risk}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {6}Scenario Examination}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {7}Modeling an Attacker}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {8}Expanding Considerations}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {9}Conclusion}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {4}Design Oriented Examination of Risk}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Illustrative Example of Attack Vector Tree}}{\thepage }}
\newlabel{fig:attackTree}{{2}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Estimation of Attack Risk Behavior}}{\thepage }}
\newlabel{fig:attackRisk}{{3}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {5}Scenario Examination}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {6}Modeling an Attacker}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Design Implementations of Wireless Transmitter}}{\thepage }}
\newlabel{fig:exampleDesigns}{{4}{\thepage }}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Table of Individual Part Costs}}{\thepage }}
\newlabel{tbl:partCosts}{{1}{\thepage }}
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Calculated Values for Wireless Transmitter Example}}{\thepage }}
\newlabel{tbl:calculations}{{2}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {7}Expanding Considerations}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusion}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Comparison of Impact as a Function of Security Risk for Design \#1}}{\thepage }}
\newlabel{fig:SRvI}{{5}{\thepage }}

0 comments on commit 78ed728

Please sign in to comment.
You can’t perform that action at this time.