Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
Addition of images
  • Loading branch information
Duncan committed Oct 25, 2016
1 parent 26ad7e4 commit 78ed728
Show file tree
Hide file tree
Showing 17 changed files with 591 additions and 70 deletions.
Binary file added images/aadlModel.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/aadl_security_framework.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/accessModeGroupExample.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/attackAnalysis.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/attackAnalysisZoom.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/authenticationExample.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/encrypted_transmitter.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/encrypted_transmitter_sidebyside.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/encryptionExample.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/recursivePBD.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/resoluteExample.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/securityLevelsExample.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
31 changes: 25 additions & 6 deletions sig-alternate-sample.aux
@@ -1,10 +1,29 @@
\relax
\select@language{english}
\@writefile{toc}{\select@language{english}}
\@writefile{lof}{\select@language{english}}
\@writefile{lot}{\select@language{english}}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Work}{\thepage }}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Modeling}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Visualization of Security Design Framework}}{\thepage }}
\newlabel{fig:AADLSecFrame}{{1}{\thepage }}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Defining Risk}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {3}General System Modeling}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {4}Defining Risk}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {5}Design Oriented Examination of Risk}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {6}Scenario Examination}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {7}Modeling an Attacker}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {8}Expanding Considerations}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {9}Conclusion}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {4}Design Oriented Examination of Risk}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Illustrative Example of Attack Vector Tree}}{\thepage }}
\newlabel{fig:attackTree}{{2}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Estimation of Attack Risk Behavior}}{\thepage }}
\newlabel{fig:attackRisk}{{3}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {5}Scenario Examination}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {6}Modeling an Attacker}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Design Implementations of Wireless Transmitter}}{\thepage }}
\newlabel{fig:exampleDesigns}{{4}{\thepage }}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Table of Individual Part Costs}}{\thepage }}
\newlabel{tbl:partCosts}{{1}{\thepage }}
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Calculated Values for Wireless Transmitter Example}}{\thepage }}
\newlabel{tbl:calculations}{{2}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {7}Expanding Considerations}{\thepage }}
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusion}{\thepage }}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Comparison of Impact as a Function of Security Risk for Design \#1}}{\thepage }}
\newlabel{fig:SRvI}{{5}{\thepage }}

0 comments on commit 78ed728

Please sign in to comment.