Taxonomy of information security risk assessment (ISRA), Computers & Security, vol.57, pp.14-30, 2015. ,
DOI : 10.1016/j.cose.2015.11.001
A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results, 2010 International Conference on Availability, Reliability and Security, pp.696-701, 2010. ,
DOI : 10.1109/ARES.2010.25
Modeling cyber attacks and their effects on decision process, Proceedings of the 2011 Winter Simulation Conference (WSC), 2011. ,
DOI : 10.1109/WSC.2011.6147970
URL : http://www.informs-sim.org/wsc11papers/236.pdf
Chechulin A Cyber Attack Modeling and Impact Assessment Framework, 5th International Conference on Cyber Conflict, 2013. ,
Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics, 2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, 2015. ,
DOI : 10.1109/PDP.2015.34
Using a 3D geometrical model to improve accuracy in the evaluation and selection of countermeasures against complex cyber attacks, Conference on Security and Privacy in Communication Networks, pp.538-555, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01332277
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms, 2016 IEEE Trustcom/BigDataSE/ISPA, 2016. ,
DOI : 10.1109/TrustCom.2016.0082
Attack Volume Model: Geometrical Approach and Application, 10th International Conference on Risks and Security of Internet and Systems (Crisis), pp.242-257, 2015. ,
An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events, 11th Conference on Risks and Security of Internet and Systems, 2016. ,
DOI : 10.1109/ICBDA.2016.7509823
URL : https://hal.archives-ouvertes.fr/hal-01487752
A polytope-based approach to measure the impact of events against critical infrastructures, Journal of Computer and System Sciences, vol.83, issue.1, pp.3-21, 2016. ,
DOI : 10.1016/j.jcss.2016.02.004
URL : https://hal.archives-ouvertes.fr/hal-01453253
RORI-based countermeasure selection using the OrBAC formalism, International Journal of Information Security, vol.12, issue.4, pp.63-79, 2014. ,
DOI : 10.1109/INTECH.2012.6457801
URL : https://hal.archives-ouvertes.fr/hal-01274857
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index, Computers & Electrical Engineering, vol.47, pp.13-34, 2015. ,
DOI : 10.1016/j.compeleceng.2015.07.023
URL : https://hal.archives-ouvertes.fr/hal-01255033
Selection of Mitigation Actions Based on Financial and Operational Impact Assessments, Conference on Availability, Reliability and Security, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01450193
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams, Cross-Domain Conference, and Workshop on Privacy Aware Machine Learning for Health Data Science, 2016. ,
DOI : 10.1142/8685
URL : https://hal.archives-ouvertes.fr/hal-01635003
Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management, International Conference on Risks and Security of Internet and Systems, pp.107-124, 2016. ,
DOI : 10.1007/978-3-319-31811-0_7
?????????? ???????????????????????????????? ???????????????????? ?????? ???????????????????? ???????????????????? ???????????? ???????????????????????? ????????????, SPIIRAS Proceedings, vol.5, issue.42, pp.60-84, 2015. ,
DOI : 10.15622/sp.42.12
Choosing Models for Security Metrics Visualization, 7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security MMM-ACNS, 2017. ,
DOI : 10.1109/SMARTGRID.2010.5622049
URL : https://hal.archives-ouvertes.fr/hal-01648050
Protection of Critical Infrastructure and the role of investment policies relating to National Security Whitepaper, 2008. ,
Cyber-physical systems, Proceedings of the 47th Design Automation Conference on, DAC '10, pp.731-736, 2010. ,
DOI : 10.1145/1837274.1837461
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures, International Journal of Critical Infrastructure Protection, vol.10, pp.3-17, 2015. ,
DOI : 10.1016/j.ijcip.2015.04.001
Electricity Distribution System Losses, Non Technical Overview, 2009. ,
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study, International Conference on Computer Safety, Reliability, and Security SAFECOMP, pp.199-212, 2011. ,
DOI : 10.1109/LATINCOM.2009.5305052
Transportation Systems: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan, Homeland security dept, 2007. ,
The real-world use of big data in financial services, Executive Report IBM Institute for Business Value in collaboration with Sa¨?dSa¨?d Business School, 2013. ,
Cyber-Physical Systems: A New Frontier, International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.1-9, 2008. ,
DOI : 10.1007/978-0-387-88735-7_1
URL : http://www.cs.mcgill.ca/~xueliu/publications/2008_SUTC.pdf
Communications Sector- Specific Plan, An Annex to the NIPP 2013 Homeland security dept, 2015. ,
Risk Analysis and Security Countermeasure Selection, 2010. ,
DOI : 10.1201/9781420078718
Measuring Relative Attack Surfaces, Computer Security in the 21st Century, pp.109-137, 2005. ,
DOI : 10.1007/0-387-24006-3_8
URL : http://www-2.cs.cmu.edu/afs/cs/usr/wing/www/publications/Howard-Wing05.pdf
An Attack Surface Metric, IEEE Transactions on Software Engineering, 2010. ,
DOI : 10.21236/ada457096
URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a457096.pdf
A novel taxonomy of MANET attacks, 2015 International Conference on Electrical and Information Technologies (ICEIT), 2015. ,
DOI : 10.1109/EITech.2015.7162947
A Comprehensive Approach to Designing Internet Security Taxonomy, 2006 Canadian Conference on Electrical and Computer Engineering, pp.1316-1319, 2006. ,
DOI : 10.1109/CCECE.2006.277393
Security analysis in role-based access control, ACM Transactions on Information and System Security, vol.9, issue.4, pp.391-420, 2006. ,
DOI : 10.1145/1187441.1187442
URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2005-02.pdf
Cuppens-Boulahia, and A. Miege, Modelling contexts in the or-bac model, 2003. ,
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008. ,
DOI : 10.1109/2.485845
URL : https://hal.archives-ouvertes.fr/hal-01207773
The Syslog Protocol, Network Working Group, 2009. ,
DOI : 10.17487/rfc5424
The Intrusion Detection Message Exchange Format (IDMEF), p.4765, 2007. ,
DOI : 10.17487/rfc4765
Towards modelling adaptive attacker's behaviour. FPS Symposium, pp.357-364, 2013. ,
DOI : 10.1007/978-3-642-37119-6_23
Evaluation of Adaptive Attacker Models, ESSoS Doctoral Symposium, 2014. ,
Common Vulnerability Scoring System Version 2.0 " , Specification Document, 2007. ,
DOI : 10.1109/msp.2006.145
Scenes of the cybercrime. Computer forensics handbook, 2002. ,
Brandishing Cyberattack Capabilities. National Defense Research Institute, white paper, 2013. ,
The Incident Object Description Exchange Format (IODEF), p.5070, 2007. ,
DOI : 10.17487/rfc5070
URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc5070.txt.pdf
Special Operations Forces Intelligence and Electronic Warfare Operations Appendix D: Target Analysis Process, Available at, 1991. ,
A Taxonomy of Cyber Events Affecting Communities, 2011 44th Hawaii International Conference on System Sciences, 2011. ,
DOI : 10.1109/HICSS.2011.37
A Taxonomy of Cyber Attacks on SCADA Systems, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, 2011. ,
DOI : 10.1109/iThings/CPSCom.2011.34
Deshmukh Raspberry Pi for Automation of Water Treatment Plant, International Conference on Computing Communication Control and Automation (ICCUBEA), pp.532-536, 2015. ,
Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks, IEEE Communications Letters, vol.14, issue.2, pp.187-189, 2010. ,
DOI : 10.1109/LCOMM.2010.02.092108
A secure control framework for resource-limited adversaries, Automatica, vol.51, pp.135-148, 2015. ,
DOI : 10.1016/j.automatica.2014.10.067
URL : http://arxiv.org/pdf/1212.0226