The objective of the present work is to present a Decision Support System (DSS) aimed at suggesting to a Critical Infrastructure (CI) operator the optimal configuration in terms of deployed security functionalities. For achieving this result, two specific problems have been addressed: the security evaluation problem and the security configuration computation problem. Concerning the first problem, by retaining the framework provided by the Open Source Security Testing Methodology Manual (OSSTMM), security has been characterized in terms of the Operational Security describing the lack of separation between assets and threats which is needed for operational reasons; in this respect, the description capabilities of such methodology have been ex...
64 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This research attempts to brid...
This paper deals with the development of a Decision Support System (DSS) for infrastructure network ...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
Due to their relevance, systems such as water distribution, power grids, and gas pipelines are studi...
An article herein presents an optimization model, designated for computational core of decision-taki...
The officer-in-charge deploying the security personnel to protect a large infrastructure meets a com...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the “...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the '...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...
The deep integration between the cyber and physical domains in complex systems make very challenging...
Security of power systems, as a critical infrastructure, is a global concern because continuous, rel...
Vulnerability assessment is a crucial aspect for the development of methodologies to define the leve...
Kiesling E, Ekelhart A, Grill B, Strauss C, Stummer C. Selecting security control portfolios: A mult...
This paper presents a project dedicated to the development of means for improving the resilience of ...
With the level of cyber-attacks increasing in volume and sophistication, the need for improved count...
64 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This research attempts to brid...
This paper deals with the development of a Decision Support System (DSS) for infrastructure network ...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
Due to their relevance, systems such as water distribution, power grids, and gas pipelines are studi...
An article herein presents an optimization model, designated for computational core of decision-taki...
The officer-in-charge deploying the security personnel to protect a large infrastructure meets a com...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the “...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the '...
The new opportunities that come with the Internet as a worldwide network bring the new threats and r...
The deep integration between the cyber and physical domains in complex systems make very challenging...
Security of power systems, as a critical infrastructure, is a global concern because continuous, rel...
Vulnerability assessment is a crucial aspect for the development of methodologies to define the leve...
Kiesling E, Ekelhart A, Grill B, Strauss C, Stummer C. Selecting security control portfolios: A mult...
This paper presents a project dedicated to the development of means for improving the resilience of ...
With the level of cyber-attacks increasing in volume and sophistication, the need for improved count...
64 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This research attempts to brid...
This paper deals with the development of a Decision Support System (DSS) for infrastructure network ...
Types and complexity of information security related vulnerabilities are growing rapidly and present...