International audienceThe objective of this work is the evaluation of information systems security using quantitative measures. These measures aim at forecasting risks and providing information to monitor the security level of the system in operation. In our approach, we take into account some environmental factors that have a significant impact on the security of the system. We have identified three such factors that are related to the vulnerability exploitation process: the vulnerability life cycle, the behavior of the attackers and the behavior of the system administrator. We have studied the interdependencies between these factors and how the evolution of these factors could impact the system security. From this study, we have defined q...
One of the key processes in software development and information security management is the evaluati...
One of the key processes in software development and information security management is the evaluati...
Internet and network security forms an interesting and topical, yet challenging and developing resea...
International audienceThe objective of this work is the evaluation of information systems security u...
Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related stu...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
International audienceThis paper deals with the characterization of security-related vulnerabilities...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Numerous security metrics have been proposed in the past for protecting computer networks. However w...
This thesis presents a new approach for quantitative security evaluation for computer systems. The m...
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabili...
According to the embodiments, a statistical model is developed to estimate the probability of being ...
Being in the era of information technology, importance and applicability of analytical statistical m...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Modern systems transition towards more connected, information and communication technologies (ICT) h...
One of the key processes in software development and information security management is the evaluati...
One of the key processes in software development and information security management is the evaluati...
Internet and network security forms an interesting and topical, yet challenging and developing resea...
International audienceThe objective of this work is the evaluation of information systems security u...
Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related stu...
Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoi...
International audienceThis paper deals with the characterization of security-related vulnerabilities...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Numerous security metrics have been proposed in the past for protecting computer networks. However w...
This thesis presents a new approach for quantitative security evaluation for computer systems. The m...
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabili...
According to the embodiments, a statistical model is developed to estimate the probability of being ...
Being in the era of information technology, importance and applicability of analytical statistical m...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Modern systems transition towards more connected, information and communication technologies (ICT) h...
One of the key processes in software development and information security management is the evaluati...
One of the key processes in software development and information security management is the evaluati...
Internet and network security forms an interesting and topical, yet challenging and developing resea...