Author of the publication

Risk Ontology and Service Quality Descriptor Shared among Interdependent Critical Infrastructures.

, , and . CRITIS, volume 6712 of Lecture Notes in Computer Science, page 157-160. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk Ontology and Service Quality Descriptor Shared among Interdependent Critical Infrastructures., , and . CRITIS, volume 6712 of Lecture Notes in Computer Science, page 157-160. Springer, (2010)Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures., , , , , and . CRITIS, volume 10242 of Lecture Notes in Computer Science, page 163-175. Springer, (2016)Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees., , , , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 80-93. Springer, (2016)A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma., , and . EUROCRYPT, volume 921 of Lecture Notes in Computer Science, page 24-38. Springer, (1995)A training-resistant anomaly detection system., , , , , and . Comput. Secur., (2018)Improving Resilience of Interdependent Critical Infrastructures via an On-Line Alerting System., , , , , , , , , and 14 other author(s). COMPENG, page 88-90. IEEE Computer Society, (2010)Design and implementation of a mediation system enabling secure communication among Critical Infrastructures., , , , , , , , , and . Int. J. Crit. Infrastructure Prot., 5 (2): 86-97 (2012)Partitioning Cryptanalysis., and . FSE, volume 1267 of Lecture Notes in Computer Science, page 13-27. Springer, (1997)Fast and Optimal Countermeasure Selection for Attack Defence Trees., , and . RISK, volume 10224 of Lecture Notes in Computer Science, page 53-65. (2016)Efficiently computing the likelihoods of cyclically interdependent risk scenarios., , , , and . Comput. Secur., (2017)