A training-resistant anomaly detection system.
Comput. Secur., 2018
Efficiently computing the likelihoods of cyclically interdependent risk scenarios.
Comput. Secur., 2017
Fast and Optimal Countermeasure Selection for Attack Defence Trees.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016
Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2016
Location Assurance and Privacy in GNSS Navigation.
ERCIM News, 2013
Demonstrating a trust framework for evaluating GNSS signal integrity.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures.
Int. J. Crit. Infrastructure Prot., 2012
Risk Ontology and Service Quality Descriptor Shared among Interdependent Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2010
Improving Resilience of Interdependent Critical Infrastructures via an On-Line Alerting System.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Complexity in Engineering, 2010
Partitioning Cryptanalysis.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Cryptanalysis of iterated block ciphers.
PhD thesis, 1996
A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma.
Proceedings of the Advances in Cryptology, 1995