Nous proposons une méthode originale pour traiter l’analyse des risques des systèmes de systèmes de Défense. Nous rappelons les critères classiques d’évaluation des risques dans les trois disciplines de la sûreté de fonctionnement, de la sécurité des systèmes d’information et de la survivabilité en insistant sur les différences entre les indicateurs choisis pour évaluer un SdS et un système « simple ». Après une argumentation sur le choix de la méthode de modélisation, nous présentons ses étapes sur un cas particulier de SdS de Défense soumis à des événements accidentels et intentionnels (attaques physiques des matériels et attaques des réseaux de communication).We propose a novel method for treating risk analysis of Defense systems of syst...
This paper describes the relations between security and dependability, and shows that existing depen...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
Current computing systems have to protect the data they hold and to fit easily into versatile workin...
The research summarized in this report focuses on the dependability of computer systems. It addresse...
Les ICSs (Systèmes de Contrôle Industriels) modernes sont basés principalement sur des Technologies ...
The use of new technologies in safety-related systems gives rise to specific issues with respect to ...
The thesis is dedicated to the evlaution of the dependability of safety systems. The main property o...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
Historically security has developed as a discipline, separate from the original dependability framew...
Historically the trustworthiness of a computer system was characterized by its reliability and avail...
Designing and improving the resilience of complex sociotechnical/cyber-physical systems is not a sim...
In modern conditions of abrupt changes in the military-political situation, the problem of ensuring ...
Le but de cette thèse est l'intégration de l'analyse de la sûreté de fonctionnement dans une approch...
The Infrastructure of modern society is controlled by soft-ware systems. These systems are vulnerabl...
L'incorporation des instruments intelligents dans les boucles de sécurité nous mène vers une sécurit...
This paper describes the relations between security and dependability, and shows that existing depen...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
Current computing systems have to protect the data they hold and to fit easily into versatile workin...
The research summarized in this report focuses on the dependability of computer systems. It addresse...
Les ICSs (Systèmes de Contrôle Industriels) modernes sont basés principalement sur des Technologies ...
The use of new technologies in safety-related systems gives rise to specific issues with respect to ...
The thesis is dedicated to the evlaution of the dependability of safety systems. The main property o...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
Historically security has developed as a discipline, separate from the original dependability framew...
Historically the trustworthiness of a computer system was characterized by its reliability and avail...
Designing and improving the resilience of complex sociotechnical/cyber-physical systems is not a sim...
In modern conditions of abrupt changes in the military-political situation, the problem of ensuring ...
Le but de cette thèse est l'intégration de l'analyse de la sûreté de fonctionnement dans une approch...
The Infrastructure of modern society is controlled by soft-ware systems. These systems are vulnerabl...
L'incorporation des instruments intelligents dans les boucles de sécurité nous mène vers une sécurit...
This paper describes the relations between security and dependability, and shows that existing depen...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
Current computing systems have to protect the data they hold and to fit easily into versatile workin...