itrust consulting » Publications
Publications

Publications

Elsevier, Computers & Security, Volume 76

Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin

A training-resistant anomaly detection system

Links: Published article Article

RISK 2016 – 4th International Workshop, held in conjunction with ICTSS 2016

S. Muller, C. Harpes and C. Muller, ‘Fast and optimal countermeasureselection for attack defence trees’, in Risk Assessment and Risk-Driven Quality Assurance: 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, J. Großmann, M. Felderer and F. Seehusen, Eds. Cham: Springer International Publishing, 2017, pp. 53–65, ISBN: 978-3-319-57858-3. DOI: 10.1007/978- 3- 319- 57858- 3_5. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-57858-3_5.

Links: Publication

Elsevier, Computers & Security, Volume 64

S. Muller, C. Harpes, Y. L. Traon, S. Gombault and J.-M. Bonnin, ‘Efficiently computing the likelihoods of cyclically interdependent risk scenarios’, Computers & Security, vol. 64, pp. 59–68, 2017, ISSN: 0167-DOI: http://dx.doi.org/10.1016/j.cose.2016.09. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404816301158.

Links: Publication

International conference on ATENA at CREOS and SWDE

From September 26th to 28th the international partners of the ATENA project met at the dispatching centre of CREOS in Luxembourg and the SWDE facilities in Belgium in order to discuss the future road-map of the project.

Links: Press release

CRITIS 2016 – 11th International conference

S. Muller, C. Harpes, Y. Le Traon, S. Gombault, J.-M. Bonnin and P. Hoffmann, ‘Dynamic risk analyses and dependency-aware rootcause model for critical infrastructures’, in Critical Information Infrastructures

Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers, G. Havarneanu,

R. Setola, H. Nassopoulos and S. Wolthusen, Eds. Cham: Springer 146 Bibliography International Publishing, 2017, pp. 163–175, ISBN: 978-3-319-71368-7. DOI: 10.1007/978-3-319-71368-7_14. [Online].

Links: Publication

SECURWARE 2016

Information Security Maturity as an Integral Part of ISMS based Risk Management Tools,
Ben Fetler, Carlo Harpes,
24th to 28th July 2016, the tenth international conference on emerging security information, systems and technologies – SECURWARE 2016, Nice, France

Links: Article

GraMSec 2016

Gadyatskaya O., Harpes C., Mauw S., Muller C., Muller S.
(2016) Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
In: Kordy B., Ekstedt M., Kim D. (eds) Graphical Models for Security.
GraMSec 2016. Lecture Notes in Computer Science, vol 9987. Springer, Cham.

Links: Publication: GHMMM16

ADaCoR Workshop 2016

Steve Muller, ‘Risk monitoring in industrial control systems’, in Advanced Data Collection and Risks (ADaCoR) Workshop 2016, 2016.

SASSI Workshop 2015

B. Fetler and S. Muller, ‘Dynamic risk analysis’, in Security Assessment for Systems, Services, and Infrastructures (SASSI) Workshop 2015, 2015.

IEEE Transactions on Computers

"Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets"
Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, and Yves Le Traon
IEEE Transactions on Computers PrePrint, no. 1, pp. 1, doi:10.1109/TC.2014.2375189

Links: Article

Archive