Zobrazeno 1 - 10
of 322
pro vyhledávání: '"EC Grant Agreement nr.: FP7/2007-2013"'
Autor:
Mariëlle Stoelinga, Rajesh Kumar
Publikováno v:
HASE
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering (HASE 2017), 25-32
STARTPAGE=25;ENDPAGE=32;TITLE=Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering (HASE 2017)
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering (HASE 2017), 25-32
STARTPAGE=25;ENDPAGE=32;TITLE=Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering (HASE 2017)
Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks). This paper presents
Publikováno v:
Graphical Models for Security: Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers, 94-101
STARTPAGE=94;ENDPAGE=101;TITLE=Graphical Models for Security
Graphical Models for Security ISBN: 9783319462622
GraMSec@CSF
STARTPAGE=94;ENDPAGE=101;TITLE=Graphical Models for Security
Graphical Models for Security ISBN: 9783319462622
GraMSec@CSF
The growing complexity of organizations and the increasing number of sophisticated cyber attacks asks for a systematic and integral approach to Enterprise Risk and Security Management (ERSM). As enterprise architecture offers the necessary integral p
Autor:
Sjouke Mauw, Piotr Kordy, Ravi Jhawar, Olga Gadyatskaya, Rolando Trujillo-Rasua, Karim Lounis
Publikováno v:
13th International Conference on Quantitative Evaluation of Systems, QEST 2016, 159-162
STARTPAGE=159;ENDPAGE=162;TITLE=13th International Conference on Quantitative Evaluation of Systems, QEST 2016
Quantitative Evaluation of Systems-13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer (2016).
Quantitative Evaluation of Systems ISBN: 9783319434247
QEST
STARTPAGE=159;ENDPAGE=162;TITLE=13th International Conference on Quantitative Evaluation of Systems, QEST 2016
Quantitative Evaluation of Systems-13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer (2016).
Quantitative Evaluation of Systems ISBN: 9783319434247
QEST
In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is s
Publikováno v:
Science and Engineering Ethics, 22(3), 831-850. Springer
Science & Engineering Ethics, 22(3)
Science and Engineering Ethics
Science and engineering ethics, 22(3), 831-850. Springer
Science & Engineering Ethics, 22(3)
Science and Engineering Ethics
Science and engineering ethics, 22(3), 831-850. Springer
Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies
Publikováno v:
29th IEEE Computer Security Foundations Symposium, CSF 2016. :105-119
Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. W
Autor:
Ionita, Dan, Wieringa, Roel J., Gordijn, J., Borangiu, Theodor, Dragoicea, Monica, N'ovoa, Henriqueta
Publikováno v:
Vrije Universiteit Amsterdam
Ionita, D, Wieringa, R J & Gordijn, J 2016, Automated Identification and Prioritization of Business Risks in e-service Networks . in T Borangiu, M Dragoicea & H N'ovoa (eds), Exploring Services Science: 7th International Conference, IESS 2016, Bucharest, Romania, May 25-27, 2016, Proceedings . Springer International Publishing Switzerland, Ljubljana, Slovenia, pp. 547-560 . < http://dx.doi.org/10.1007/978-3-319-32689-4_42 >
Exploring Services Science: 7th International Conference, IESS 2016, Bucharest, Romania, May 25-27, 2016, Proceedings, 547-560
STARTPAGE=547;ENDPAGE=560;TITLE=Exploring Services Science: 7th International Conference, IESS 2016, Bucharest, Romania, May 25-27, 2016, Proceedings
Lecture Notes in Business Information Processing ISBN: 9783319326887
IESS
Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016, 547-560
STARTPAGE=547;ENDPAGE=560;TITLE=Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016
Ionita, D, Wieringa, R J & Gordijn, J 2016, Automated Identification and Prioritization of Business Risks in e-service Networks . in T Borangiu, M Dragoicea & H N'ovoa (eds), Exploring Services Science: 7th International Conference, IESS 2016, Bucharest, Romania, May 25-27, 2016, Proceedings . Springer International Publishing Switzerland, Ljubljana, Slovenia, pp. 547-560 . < http://dx.doi.org/10.1007/978-3-319-32689-4_42 >
Exploring Services Science: 7th International Conference, IESS 2016, Bucharest, Romania, May 25-27, 2016, Proceedings, 547-560
STARTPAGE=547;ENDPAGE=560;TITLE=Exploring Services Science: 7th International Conference, IESS 2016, Bucharest, Romania, May 25-27, 2016, Proceedings
Lecture Notes in Business Information Processing ISBN: 9783319326887
IESS
Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016, 547-560
STARTPAGE=547;ENDPAGE=560;TITLE=Proceedings of the 7th International Conference on Exploring Service Science, IESS 2016
Modern e-service providers rely on service innovation to stay relevant. Once a new service package is designed, implementation-specific aspects such as value (co-)creation and cost/benefit analysis are investigated. However, due to time-to-market or
Publikováno v:
Graphical Models for Security. :1-17
The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and develop-ment speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenario
Autor:
Olga Gadyatskaya
Publikováno v:
Proc. of GraMSec 2015. Springer (2016).
Second International Workshop GraMSec 2015, 55-65
STARTPAGE=55;ENDPAGE=65;TITLE=Second International Workshop GraMSec 2015
Graphical Models for Security ISBN: 9783319299679
GraMSec@CSF
Second International Workshop GraMSec 2015, 55-65
STARTPAGE=55;ENDPAGE=65;TITLE=Second International Workshop GraMSec 2015
Graphical Models for Security ISBN: 9783319299679
GraMSec@CSF
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat
Publikováno v:
Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). :107-114
The objective of this study is to get insight into the effectiveness of an information campaign to counter a social engineering attack via the telephone. Four different offenders phoned 48 employees and made them believe that their PC was distributin
Publikováno v:
Journal of cybersecurity, 1(1), 93-108. Oxford University Press
In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important tool in the detection and prediction of risk and vulnerability i