Research in information security has generally focused on providing a comprehensive interpretation of threats, vulnerabilities, and attacks, in particular to evaluate their danger and prioritize responses accordingly. Most of the current approaches propose advanced techniques to detect intrusions and complex attacks but few of these approaches propose well defined methodologies to react against a given attack. In this paper, we propose a novel and systematic method to select security counter-measures from a pool of candidates, by ranking them based on the technical and financial impact associated to each alternative. The method includes industrial evaluation and simulations of the impact associated to a given security measure which allows t...
In this paper, we introduce a mathematical model of threats for analyzing the security of cryptograp...
Security risk treatment often requires a complex cost-benefit analysis to be carried out in order to...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceWe propose a mitigation model that evaluates individual and combined counterme...
In this article, we present a mixed qualitative and quantitative approach for evaluation of informat...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
Abstract Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and ...
International audienceFinding adequate responses to ongoing attacks on ICT systems is a pertinacious...
We describe a model-based approach to select cost-effective countermeasures for an information and c...
As we have discussed in the problem analysis of this thesis, there are still many challenges regardi...
As new and more sophisticated computer attacks appear across the Internet, sometimes with unknown di...
The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending ...
AbstractWith constantly increasing risks of product piracy the cost-efficiency question of protectio...
In recent years, cost-sensitive intrusion response has gained significant interest due to its emphas...
Budget cuts and the high demand in strengthening the security of computer systems and services const...
In this paper, we introduce a mathematical model of threats for analyzing the security of cryptograp...
Security risk treatment often requires a complex cost-benefit analysis to be carried out in order to...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceWe propose a mitigation model that evaluates individual and combined counterme...
In this article, we present a mixed qualitative and quantitative approach for evaluation of informat...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
Abstract Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and ...
International audienceFinding adequate responses to ongoing attacks on ICT systems is a pertinacious...
We describe a model-based approach to select cost-effective countermeasures for an information and c...
As we have discussed in the problem analysis of this thesis, there are still many challenges regardi...
As new and more sophisticated computer attacks appear across the Internet, sometimes with unknown di...
The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending ...
AbstractWith constantly increasing risks of product piracy the cost-efficiency question of protectio...
In recent years, cost-sensitive intrusion response has gained significant interest due to its emphas...
Budget cuts and the high demand in strengthening the security of computer systems and services const...
In this paper, we introduce a mathematical model of threats for analyzing the security of cryptograp...
Security risk treatment often requires a complex cost-benefit analysis to be carried out in order to...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...