Author of the publication

Towards an Automated and Dynamic Risk Management Response System.

, , , , , and . NordSec, volume 10014 of Lecture Notes in Computer Science, page 37-53. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations., , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 47-60. CEUR-WS.org, (2021)ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities., , , , and . J. Inf. Secur. Appl., (2021)A Pyramidal-based Model to Compute the Impact of Cyber Security Events., , and . ARES, page 19:1-19:10. ACM, (2018)Enriching Threat Intelligence Platforms Capabilities., , , , and . ICETE (2), page 37-48. SciTePress, (2019)Attack Volume Model: Geometrical Approach and Application., , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 242-257. Springer, (2015)Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks., , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 538-555. Springer, (2015)Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)., , , , and . NTMS, page 1-6. IEEE, (2015)Choosing Models for Security Metrics Visualization., , , , , and . MMM-ACNS, volume 10446 of Lecture Notes in Computer Science, page 75-87. Springer, (2017)Towards an Automated and Dynamic Risk Management Response System., , , , , and . NordSec, volume 10014 of Lecture Notes in Computer Science, page 37-53. (2016)A polytope-based approach to measure the impact of events against critical infrastructures., , and . J. Comput. Syst. Sci., 83 (1): 3-21 (2017)