Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Carlos E. Budde"'
Publikováno v:
Data in Brief, Vol 48, Iss , Pp 109285- (2023)
This dataset contains expert assessments of the cybersecurity skills required for six job profiles in Europe, as determined via surveys responded by cybersecurity experts from academia and industry. The data can be used to identify educational needs
Externí odkaz:
https://doaj.org/article/6dce117054f54bb386c5ee2ce4ddfd53
Publikováno v:
International Journal of Prognostics and Health Management, Vol Vol. 13, Iss No.2 (2022)
Many industrial sectors have been collecting big sensor data. With recent technologies for processing big data, companies can exploit this for automatic failure detection and prevention. We propose the first completely automated method for failure an
Externí odkaz:
https://doaj.org/article/4a88fe35e1634838a97dabf781d7d930
Publikováno v:
Budde, C E, Karinsalo, A, Vidor, S, Salonen, J & Massacci, F 2023, ' CSEC + framework assessment dataset : Expert evaluations of cybersecurity skills for job profiles in Europe ', Data in brief, vol. 48, 109285, pp. 1-11 . https://doi.org/10.1016/j.dib.2023.109285
Budde, C E, Karinsalo, A, Vidor, S, Salonen, J & Massacci, F 2023, ' CSEC + framework assessment dataset : Expert evaluations of cybersecurity skills for job profiles in Europe ', Data in Brief, vol. 48, 109285, pp. 109285 . https://doi.org/10.1016/j.dib.2023.109285
Budde, C E, Karinsalo, A, Vidor, S, Salonen, J & Massacci, F 2023, ' CSEC + framework assessment dataset : Expert evaluations of cybersecurity skills for job profiles in Europe ', Data in Brief, vol. 48, 109285, pp. 109285 . https://doi.org/10.1016/j.dib.2023.109285
This dataset contains expert assessments of the cybersecurity skills required for six job profiles in Europe, as determined via surveys responded by cybersecurity experts from academia and industry. The data can be used to identify educational needs
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0d5f384eedc10f72ed271c159e86fc0e
https://research.vu.nl/en/publications/13c1d3c8-9134-4864-8e25-ed395f07df3b
https://research.vu.nl/en/publications/13c1d3c8-9134-4864-8e25-ed395f07df3b
Autor:
Carlos E. Budde
Publikováno v:
ACM SIGMETRICS Performance Evaluation Review. 49:59-64
This work presents version 1.3 of the Finite Improbability Generator (FIG): a statistical model checker to estimate transient and steady-state reachability properties in stochastic automata. Specialised in rare event simulation via importance splitti
Publikováno v:
Budde, C E, Karinsalo, A, Vidor, S, Salonen, J & Massacci, F 2023, ' Consolidating cybersecurity in Europe : A case study on job profiles assessment ', Computers and Security, vol. 127, 103082 . https://doi.org/10.1016/j.cose.2022.103082
Budde, C E, Karinsalo, A, Vidor, S, Salonen, J & Massacci, F 2023, ' Consolidating cybersecurity in Europe : A case study on job profiles assessment ', Computers and Security, vol. 127, 103082, pp. 1-18 . https://doi.org/10.1016/j.cose.2022.103082
Computers and Security, 127:103082, 1-18. Elsevier Ltd
Budde, C E, Karinsalo, A, Vidor, S, Salonen, J & Massacci, F 2023, ' Consolidating cybersecurity in Europe : A case study on job profiles assessment ', Computers and Security, vol. 127, 103082, pp. 1-18 . https://doi.org/10.1016/j.cose.2022.103082
Computers and Security, 127:103082, 1-18. Elsevier Ltd
To address the issue of educating and training new experts in cybersecurity, it is crucial to identify the specific educational needs of the various professions that exist in the field. We measure these needs by analysing six cybersecurity-related jo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0119a99691a70cb1756b1590847e3251
https://cris.vtt.fi/en/publications/91ffa411-c36a-4206-924d-c0091d0174d6
https://cris.vtt.fi/en/publications/91ffa411-c36a-4206-924d-c0091d0174d6
Publikováno v:
International Journal of Prognostics and Health Management, 13(2), 1-12. PHM society
Many industrial sectors have been collecting big sensor data. With recent technologies for processing big data, companies can exploit this for automatic failure detection and prevention. We propose the first completely automated method for failure an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d23551630a1adf533c4649fa56e38baf
http://arxiv.org/abs/2203.07374
http://arxiv.org/abs/2203.07374
Autor:
Silvia Vidor, Carlos E. Budde
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783031081712
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8683342a3a81a082cb972b6b08745354
https://hdl.handle.net/11572/357439
https://hdl.handle.net/11572/357439
Publikováno v:
IEEE transactions on dependable and secure computing. IEEE
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is; typical metrics being the most lik
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f3a8ad9de0ff4c29d56e99288f959c82
https://hdl.handle.net/11572/357438
https://hdl.handle.net/11572/357438
Publikováno v:
International Journal on Software Tools for Technology Transfer, 24, 5, pp. 821-841
International Journal on Software Tools for Technology Transfer, 24, 821-841
International journal on software tools for technology transfer, 24(5), 821-841. Springer
International Journal on Software Tools for Technology Transfer, 24, 821-841
International journal on software tools for technology transfer, 24(5), 821-841. Springer
Dynamic fault trees (DFTs) are widely adopted in industry to assess the dependability of safety-critical equipment. Since many systems are too large to be studied numerically, DFTs dependability is often analysed using Monte Carlo simulation. A bottl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4a1fa4e6316a5c62dadab58b00b69199
https://repository.ubn.ru.nl/handle/2066/284384
https://repository.ubn.ru.nl/handle/2066/284384
Autor:
Carlos E. Budde, Mariëlle Stoelinga
Publikováno v:
CSF
CSF 2021: IEEE 34th Computer Security Foundations Symposium, 21-25 June 2021, Dubrovnik, Croatia, pp. 377-391
CSF 2021: IEEE 34th Computer Security Foundations Symposium, 21-25 June 2021, Dubrovnik, Croatia, 377-391. Los Alamitos : IEEE
STARTPAGE=377;ENDPAGE=391;TITLE=CSF 2021: IEEE 34th Computer Security Foundations Symposium, 21-25 June 2021, Dubrovnik, Croatia
2021 IEEE 34th Computer Security Foundations Symposium (CSF)
CSF 2021: IEEE 34th Computer Security Foundations Symposium, 21-25 June 2021, Dubrovnik, Croatia, pp. 377-391
CSF 2021: IEEE 34th Computer Security Foundations Symposium, 21-25 June 2021, Dubrovnik, Croatia, 377-391. Los Alamitos : IEEE
STARTPAGE=377;ENDPAGE=391;TITLE=CSF 2021: IEEE 34th Computer Security Foundations Symposium, 21-25 June 2021, Dubrovnik, Croatia
2021 IEEE 34th Computer Security Foundations Symposium (CSF)
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is, such as the most likely attack, th