Author of the publication

Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project.

, , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 269-287. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures., , , , and . ARES, page 262-267. IEEE Computer Society, (2010)Support Tool for a Bayesian Network Based Critical Infrastructure Risk Model., , , and . EVOLVE (III), volume 500 of Studies in Computational Intelligence, page 53-75. Springer, (2012)Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project., , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 269-287. Springer, (2013)Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures., , , , , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 30-41. Springer, (2011)Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper)., , , , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 213-217. Springer, (2011)A Bayesian Network Based Critical Infrastructure Risk Model., , , and . EVOLVE, volume 175 of Advances in Intelligent Systems and Computing, page 207-218. Springer, (2012)Security-Driven Information Flow Modelling for Component Integration in Complex Environments., , and . IAIT, page 19:1-19:8. ACM, (2018)Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures., , , , and . ARES, page 668-676. IEEE Computer Society, (2016)A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources., , , , , , and . ARES, page 83:1-83:10. ACM, (2019)Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures., , , , , and . CRiSIS, page 40-46. IEEE Computer Society, (2011)