Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Jhawar, Ravi"'
We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND attack tree formalism increases the expressivity of attack trees by introducing the sequential conjunctive operator SAN
Externí odkaz:
http://arxiv.org/abs/1503.02261
Autor:
Jhawar, Ravi, Piuri, Vincenzo
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:155-173
Autor:
Balboni, Paolo, Barata, Martim Taborda, Basile, Cataldo, Bella, Giampaolo, Beuchelt, Gerald, Caballero, Albert, Capparelli, Francesco, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Curry, Samuel J.J., Dara, Rozita, Ellis, Scott R., Gross, William F., Jr., Gurkok, Cem, Hamed, Tarfa, Hao, Feng, Harmening, Jim, Hoffman, Rich, Huseynov, Emin, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Karunamoorthy, Aruna, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Kotapati, Kameswari, Kremer, Stefan C., Lancrenon, Jean, LaPorta, Thomas F., Lewis, Keith, Liu, Peng, Mansoor, Bill, Mims, Nailah A., Padmavathi, V., Pandya, Pramod, Paraboschi, Stefano, Patil, Harsh Kupwade, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Saminathan, R., Santana, Mario D., Seigneur, Jean-Marc, Soper, Daniel S., Spies, Terence, Walker, Jesse, West, Michael A., Yan, Liang, Yee, George O.M., Zhao, Gansen
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:xvii-xviii
Autor:
Ardagna, Claudio1 claudio.ardagna@unimi.it, Jhawar, Ravi1 ravi.jhawar@unimi.it, Piuri, Vincenzo1 vincenzo.piuri@unimi.it
Publikováno v:
Computing. Jan2015, Vol. 97 Issue 1, p51-78. 28p.
Autor:
Jhawar, Ravi, Piuri, Vincenzo
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:165-181
Autor:
Jhawar, Ravi, Sjouke Mauw
Publikováno v:
In M., Scanlon & N.-A., Le-Khac (Eds.), Proc. 16th European Conference on Cyber Warfare and Security (pp. 184-192). ACPI (2017).
BASE-Bielefeld Academic Search Engine
BASE-Bielefeld Academic Search Engine
Moving Target Defense (MTD) presents dynamically changing attack surfaces and system configurations to attackers. This approach decreases the success probabilities of attacks and increases attacker's workload since she must continually re-assess, re-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::55a2b582048d1c06c9a646f83fda2b6c
http://orbilu.uni.lu/handle/10993/33899
http://orbilu.uni.lu/handle/10993/33899
Autor:
Jhawar, Ravi, Lounis, Karim, Mauw, Sjouke, Barthe, Gilles, Markatos, Evangelos, Samarati, Pierangela
Publikováno v:
12th International Workshop on Security and Trust Management, STM 2016, 138-153
STARTPAGE=138;ENDPAGE=153;TITLE=12th International Workshop on Security and Trust Management, STM 2016
12th International Workshop on Security and Trust Management. (2016).
Security and Trust Management ISBN: 9783319465975
STM
STARTPAGE=138;ENDPAGE=153;TITLE=12th International Workshop on Security and Trust Management, STM 2016
12th International Workshop on Security and Trust Management. (2016).
Security and Trust Management ISBN: 9783319465975
STM
Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::75ef9fdaa3df5e1de1bcd167cfc8e680
https://research.utwente.nl/en/publications/a3e36583-f6eb-4229-8098-bea49a1e25ca
https://research.utwente.nl/en/publications/a3e36583-f6eb-4229-8098-bea49a1e25ca
Publikováno v:
European Conference on Cyber Warfare and Security, ECCWS 2016, 163-172
STARTPAGE=163;ENDPAGE=172;TITLE=European Conference on Cyber Warfare and Security, ECCWS 2016
STARTPAGE=163;ENDPAGE=172;TITLE=European Conference on Cyber Warfare and Security, ECCWS 2016
Cyber systems that serve government and military organizations must cope with unique threats and powerful adversaries. In this context, one must assume that attackers are continuously engaged in offence and an attack can potentially escalate in a com
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::c94031a5d806d0fc731998eef213e613
https://research.utwente.nl/en/publications/214ca66c-d496-4b53-a329-816e5752d078
https://research.utwente.nl/en/publications/214ca66c-d496-4b53-a329-816e5752d078
Autor:
Jhawar, Ravi, Piuri, Vincenzo
Publikováno v:
In Cyber Security and IT Infrastructure Protection 2014:1-28
Autor:
JHAWAR, RAVI
The technological advances and success of Service-Oriented Architectures and the Cloud computing paradigm have produced a revolution in the Information and Communications Technology (ICT). Today, a wide range of services are provisioned to the users
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::57a1d8fd533c57e98b974e48e2ed365a