Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,425,508 papers from all fields of science
Search
Sign In
Create Free Account
Misuse case
Misuse Case is a business process modeling tool used in the software development industry. The term Misuse Case or mis-use case is derived from and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Abuse case
Exception handling
Goal modeling
Requirements analysis
Expand
Broader (3)
Business process
Software project management
Software requirements
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A Model-Driven Safety Certification Method for Process Compliance
B. Gallina
IEEE International Symposium on Software…
2014
Corpus ID: 8164085
A safety case is a contextualized structured argument constituted of process and product-based sub-arguments to show that a…
Expand
2013
2013
Applying artificial neural network and extended classifier system for network intrusion detection
W. Alsharafat
˜The œinternational Arab journal of information…
2013
Corpus ID: 9587367
Due to increasing incidents of cyber attacks, building effective Intrusion Detection Systems (IDS) are essential for protecting…
Expand
2010
2010
Development of a Low-Cost GSM SMS-Based Humidity Remote Monitoring and Control system for Industrial Applications
Dr. B. Ramamurthy
,
S. Bhargavi
,
Dr. R. ShashiKumar
2010
Corpus ID: 17404147
The paper proposes a wireless solution, based on GSM (Global System for Mobile Communication) networks (1) for the monitoring and…
Expand
Highly Cited
2008
Highly Cited
2008
Executable misuse cases for modeling security concerns
J. Whittle
,
D. Wijesekera
,
M. Hartong
ACM/IEEE 30th International Conference on…
2008
Corpus ID: 14988249
Misuse cases are a way of modeling negative requirements, that is, behaviors that should not occur in a system. In particular…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
Review
2005
Review
2005
The Question of Spectrum: Technology, Management, and Regime Change
Gerald R. Faulhaber
Journal on Telecommunications and High Technology…
2005
Corpus ID: 11394914
There is general agreement that the traditional command-andcontrol regulation of radio spectrum by the FCC (and NTIA) has failed…
Expand
Highly Cited
2004
Highly Cited
2004
Going beyond worst-case specs with TEAtime
A. Uht
Computer
2004
Corpus ID: 14871920
Virtually all engineers use worst-case component specifications for new system designs, thereby ensuring that the resulting…
Expand
2004
2004
Generalising Event Forensics Across Multiple Domains
Bradley L. Schatz
,
G. Mohay
,
A. Clark
Australian Computer, Network & Information…
2004
Corpus ID: 43489
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are…
Expand
2002
2002
Rational Surfaces with Many Nodes
I. Dolgachev
,
M. M. Lopes
,
R. Pardini
Compositio Mathematica
2002
Corpus ID: 2752831
We describe smooth rational projective algebraic surfaces over an algebraically closed field of characteristic different from 2…
Expand
2001
2001
From Declarative Signatures to Misuse IDS
Jean-Philippe Pouzol
,
M. Ducassé
International Symposium on Recent Advances in…
2001
Corpus ID: 16147930
In many existing misuse intrusion detection systems, intrusion signatures are very close to the detection algorithms. As a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE