International audienceToday, most complex and large systems, such as healthcare systems, integrate the physical and human aspects of computing and networking. They constitute a system of systems with a socio-technical part. The human element is nowadays one of the most important attack vectors in the context of systems of systems (SoS). In this context, the estimation of the impact of human vulnerability on these systems enables for a more secure design and for an integration of the system development cycle with security concerns. This approach is known as “security by design”. To improve the resilience of these SoS with respect to the vulnerability that humans bring, it is necessary to be able to estimate the impact that an individual can ...
Social engineering refers to a number of techniques that are used to exploit human vulnerabilities a...
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take a...
Many systems are hacked daily and apparently without much effort (e.g., see [1]). This happens becau...
International audienceToday, most complex and large systems, such as healthcare systems, integrate t...
International audienceThe increasing number of cyberattacks requires to incorporate security concern...
International audienceDue to the increasing complexity of modern systems, the level of responsibilit...
International audienceDue to the increasing complexity of modern systems, the level of responsibilit...
Modern organisations are complex, socio-technical systems consisting of a mixture of physical infras...
System models to assess the vulnerability of information systems to security threats typically repre...
peer reviewedWe propose an operational framework for a social, technical and contextual analysis of ...
Identification of threats to organisations and risk assessment often take into consideration the pur...
This paper proposes a novel approach to System of Systems modelling based on the specification of sy...
This thesis seeks to establish a semi-automatic methodology for security analysis when users are con...
This paper proposes a novel approach to System of Systems modelling based on the specification of sy...
International audienceDuring this last decade, there have been major improvements in technological a...
Social engineering refers to a number of techniques that are used to exploit human vulnerabilities a...
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take a...
Many systems are hacked daily and apparently without much effort (e.g., see [1]). This happens becau...
International audienceToday, most complex and large systems, such as healthcare systems, integrate t...
International audienceThe increasing number of cyberattacks requires to incorporate security concern...
International audienceDue to the increasing complexity of modern systems, the level of responsibilit...
International audienceDue to the increasing complexity of modern systems, the level of responsibilit...
Modern organisations are complex, socio-technical systems consisting of a mixture of physical infras...
System models to assess the vulnerability of information systems to security threats typically repre...
peer reviewedWe propose an operational framework for a social, technical and contextual analysis of ...
Identification of threats to organisations and risk assessment often take into consideration the pur...
This paper proposes a novel approach to System of Systems modelling based on the specification of sy...
This thesis seeks to establish a semi-automatic methodology for security analysis when users are con...
This paper proposes a novel approach to System of Systems modelling based on the specification of sy...
International audienceDuring this last decade, there have been major improvements in technological a...
Social engineering refers to a number of techniques that are used to exploit human vulnerabilities a...
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take a...
Many systems are hacked daily and apparently without much effort (e.g., see [1]). This happens becau...