selected publications
-
academic article
- RORI-based countermeasure selection using the OrBAC formalism. International Journal of Information Security. 13:63-79. 2013
- An ontology-driven approach to model SIEM information and operations using the SWRL formalism. International Journal of Electronic Security and Digital Forensics. 4:104-104. 2012
-
chapter
- Attack Volume Model: Geometrical Approach and Application. Lecture notes in computer science. 242-257. 2016
- Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. Security and Privacy in Communication Networks. 538-555. 2015
- Individual Countermeasure Selection Based on the Return On Response Investment Index. Lecture notes in computer science. 156-170. 2012
-
conference paper
- Selection of Mitigation Actions Based on Financial and Operational Impact Assessments. . 137-146. 2016
- Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs). . 1-6. 2015
- Decisive Heuristics to Differentiate Legitimate from Phishing Sites. . 1-9. 2011