Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Game Theoretical Model for Optimal Distribution of Network Security Resources

    Enforcing security in a network always comes with a tradeoff regarding budget constraints, entailing unavoidable choices for the deployment of security equipment over the network. Therefore, finding the optima...

    Ziad Ismail, Christophe Kiennert, Jean Leneutre in Decision and Game Theory for Security (2017)

  2. No Access

    Chapter and Conference Paper

    A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures

    In the last decade, the power grid has increasingly relied on the communication infrastructure for the management and control of grid operations. In a previous work, we proposed an analytical model for identif...

    Ziad Ismail, Jean Leneutre, David Bateman in Decision and Game Theory for Security (2016)

  3. No Access

    Chapter and Conference Paper

    An Attack Execution Model for Industrial Control Systems Security Assessment

    The improved communication and remote control capabilities of industrial control systems equipment have increased their attack surface. As a result, managing the security risk became a challenging task. The co...

    Ziad Ismail, Jean Leneutre, Alia Fourati in Security of Industrial Control Systems and… (2016)

  4. No Access

    Chapter and Conference Paper

    Data Integrity and Availability Verification Game in Untrusted Cloud Storage

    The recent trends towards outsourcing data to the Cloud as well as various concerns regarding data integrity and availability created an increasing interest in enabling secure Cloud data-centers. Many schemes ...

    Brahim Djebaili, Christophe Kiennert in Decision and Game Theory for Security (2014)

  5. No Access

    Book and Conference Proceedings

    Data Privacy Management and Autonomous Spontaneous Security

    5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers

    Joaquin Garcia-Alfaro in Lecture Notes in Computer Science (2011)

  6. No Access

    Chapter and Conference Paper

    A DSL for Specifying Autonomic Security Management Strategies

    Existing self-protection frameworks so far hardly addressed the specification of autonomic security adaptation strategies which guide risk-aware selection or reconfiguration of security mechanisms. Domain-Specifi...

    Ruan He, Marc Lacoste, Jacques Pulou in Data Privacy Management and Autonomous Spo… (2011)