Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Alexandre Vernotte"'
Autor:
Alexandre Vernotte, Margus Välja, Matus Korman, Gunnar Björkman, Mathias Ekstedt, Robert Lagerström
Publikováno v:
Energy Informatics, Vol 1, Iss 1, Pp 1-41 (2018)
Abstract Background In the coming years, the increase of automation in electricity distribution grids, controlled by ICT, will bring major consequences to the cyber security posture of the grids. Automation plays an especially important role in load
Externí odkaz:
https://doaj.org/article/a1e6970f26ed43c6bcb712ea880c63be
Autor:
Antoine Chevrot, Alexandre Vernotte, Pierre Bernabe, Aymeric Cretin, Fabien Peureux, Bruno Legeard
Publikováno v:
Proceedings, Vol 59, Iss 1, p 9 (2020)
Major transportation surveillance protocols have not been specified with cyber security in mind and therefore provide no encryption nor identification. These issues expose air and sea transport to false data injection attacks (FDIAs), in which an att
Externí odkaz:
https://doaj.org/article/a99963f2432c4494bc569cf5292ca9f3
Publikováno v:
2023 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).
Publikováno v:
International Journal on Software Tools for Technology Transfer. 24:127-158
The ADS-B—automatic dependent surveillance-broadcast—technology requires aircraft to broadcast their position and velocity periodically. As compared to legacy radar technologies, coupled with alarming cyber security issues (the ADS-B protocol pro
Autor:
Bruno Legeard, Fabien Peureux, Aymeric Cretin, Alexandre Vernotte, Antoine Chevrot, Pierre Bernabé
Publikováno v:
Proceedings, Vol 59, Iss 9, p 9 (2020)
Major transportation surveillance protocols have not been specified with cyber security in mind and therefore provide no encryption nor identification. These issues expose air and sea transport to false data injection attacks (FDIAs), in which an att
Publikováno v:
International Conference on Software Testing, Verification and Validation Workshops 2020
International Conference on Software Testing, Verification and Validation Workshops
International Conference on Software Testing, Verification and Validation Workshops, Oct 2020, Porto, Portugal
ICST Workshops
International Conference on Software Testing, Verification and Validation Workshops
International Conference on Software Testing, Verification and Validation Workshops, Oct 2020, Porto, Portugal
ICST Workshops
International audience; The ADS-B --- Automatic Dependent Surveillance Broadcast --- technology requires aircraft to broadcast their position and velocity periodically. The protocol was not specified with cyber security in minds and therefore provide
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2da40c2499be20c67605f332abdfc367
https://hal.archives-ouvertes.fr/hal-03221904/file/580924f8-bf21-43e5-8710-8c3c7bff7372-author.pdf
https://hal.archives-ouvertes.fr/hal-03221904/file/580924f8-bf21-43e5-8710-8c3c7bff7372-author.pdf
Autor:
Matus Korman, Gunnar Björkman, Margus Valja, Robert Lagerström, Mathias Ekstedt, Alexandre Vernotte
Publikováno v:
Energy Informatics, Vol 1, Iss 1, Pp 1-41 (2018)
Background In the coming years, the increase of automation in electricity distribution grids, controlled by ICT, will bring major consequences to the cyber security posture of the grids. Automation plays an especially important role in load balancing
Autor:
Robert Lagerström, Mathias Ekstedt, Alexandre Vernotte, Margus Valja, Gunnar Björkman, Matus Korman
Publikováno v:
SPSR-SG@CPSWeek
The SCADA infrastructure is a key component for power grid operations. Securing the SCADA infrastructure against cyber intrusions is thus vital for a well-functioning power grid. However, the task remains a particular challenge, not the least since n
Publikováno v:
Risk Assessment and Risk-Driven Quality Assurance ISBN: 9783319578576
RISK
RISK
This paper proposes an approach, called pwnPr3d, for quantitatively estimating information security risk in ICT systems. Unlike many other risk analysis approaches that rely heavily on manual work and security expertise, this approach comes with buil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::37164e0ab6a9f59c9d1183dd33250ef6
https://doi.org/10.1007/978-3-319-57858-3_4
https://doi.org/10.1007/978-3-319-57858-3_4
Publikováno v:
ARES
In this paper we introduce pwnPr3d, a probabilistic threat modeling approach for automatic attack graph generation based on network modeling. The aim is to provide stakeholders in organizations with a holistic approach that both provides high-level o