Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Martín Barrère"'
Autor:
Martín Barrère, Chris Hankin
Publikováno v:
ACM Transactions on Cyber-Physical Systems. 5:1-29
Cyber-Physical Systems (CPS) often involve complex networks of interconnected software and hardware components that are logically combined to achieve a common goal or mission; for example, keeping a plane in the air or providing energy to a city. Fai
Autor:
Martín Barrère, Chris Hankin
Publikováno v:
2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)
DSN (Supplements)
50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020)
DSN (Supplements)
50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020)
In this paper, we present a novel MaxSAT-based technique to compute Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We model the MPMCS problem as a Weighted Partial MaxSAT problem and solve it using a parallel SAT-solving architecture.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2c6564433edd4bf146cf507f0ae1f560
http://arxiv.org/abs/2005.03003
http://arxiv.org/abs/2005.03003
Measuring Cyber-Physical Security in Industrial Control Systems via Minimum-Effort Attack Strategies
Publikováno v:
Journal of Information Security and Applications
In recent years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range of cyber-physical attacks, having massive destructive consequences. Security metrics are therefore essential to assess and improve their security postu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::778f7e213eea7e7fe57b2e3854926469
http://hdl.handle.net/11368/2971406
http://hdl.handle.net/11368/2971406
Autor:
Chris Hankin, Martín Barrère
Publikováno v:
Critical Information Infrastructures Security ISBN: 9783030582944
CRITIS
CRITIS
In this paper we identify some of the particular challenges that are encountered when trying to secure cyber-physical systems. We describe three of our current activities: the architecture of a system for monitoring cyber-physical systems; a new appr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bb7b08e211c5941e0742f9311839d9e8
https://doi.org/10.1007/978-3-030-58295-1_1
https://doi.org/10.1007/978-3-030-58295-1_1
Publikováno v:
6th International Symposium for ICS & SCADA Cyber Security Research 2019
Electronic Workshops in Computing
Electronic Workshops in Computing
Over the last years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range of cyber-physical threats. Efficient models and techniques able to capture their complex structure and identify critical cyber-physical components
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::97ee12ca9b1933c80ee2892617b12c5b
http://hdl.handle.net/10044/1/73770
http://hdl.handle.net/10044/1/73770
Autor:
Francesca Boem, Giulio Zizzo, Martín Barrère, Chris Hankin, Angelo Barboni, Sergio Maffeis, Thomas Parisini
Publikováno v:
RTCSA
2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)
24th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA2018)
2018 IEEE 24th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)
24th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA2018)
Monitoring systems are essential to understand and control the behaviour of systems and networks. Cyber-physical systems (CPS) are particularly delicate under that perspective since they involve real-time constraints and physical phenomena that are n
Publikováno v:
Scopus-Elsevier
We propose a model to represent the health of WSNs that allows us to evaluate a network's ability to execute its functions. Central to this model is how we quantify the importance of each network node. As we focus on the availability of the network d
Autor:
Emil Lupu, Martín Barrère
Publikováno v:
CNS
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensi
Publikováno v:
13th International Conference on Network and Service Management (CNSM'17)
CNSM
CNSM
In this paper, we describe an efficient methodology to guide investigators during network forensic analysis. To this end, we introduce the concept of core attack graph, a compact representation of the main routes an attacker can take towards specific
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f9a5c8d7c38de2aff474019b850a6bdc
http://hdl.handle.net/10044/1/54281
http://hdl.handle.net/10044/1/54281
Autor:
Martín Barrère, Gustavo Betarte, Victor Codocedo, Marcelo Rodríguez, Hernán Astudillo, Marcelo Aliquintuy, Javier Baliosian, Rémi Badonnel, Olivier Festor, Carlos Raniery Paula dos Santos, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Amedeo Napoli
Publikováno v:
What can FCA do for Artificial Intelligence? (FCA4AI'15)
Proceedings of the International FCA4AI 2015
FCA4AI 2015-Workshop What can FCA do for Artificial Intelligence?
FCA4AI 2015-Workshop What can FCA do for Artificial Intelligence?, Jul 2015, Buenos Aires, Argentina. pp.75-85
HAL
Proceedings of the International FCA4AI 2015
FCA4AI 2015-Workshop What can FCA do for Artificial Intelligence?
FCA4AI 2015-Workshop What can FCA do for Artificial Intelligence?, Jul 2015, Buenos Aires, Argentina. pp.75-85
HAL
International audience; Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them. This complex landscape has ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::8af18b06b20f5c745b9591c7d542bbe7
http://hdl.handle.net/10044/1/33962
http://hdl.handle.net/10044/1/33962