Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog

    By 2025, it is projected that cybercrimes will escalate to an alarming annual figure of 10.5 trillion USD. To counter this growing threat, cybersecurity repositories such as CVE, CWE, CAPEC, and Mitre Att &ck ...

    Ahmed Elmarkez, Soraya Mesli-Kesraoui in Information Security Theory and Practice (2024)

  2. No Access

    Chapter and Conference Paper

    Formal Verification of Software-Intensive Systems Architectures Described with Pi** and Instrumentation Diagrams

    Socio-technical systems are increasingly becoming software-intensive. The challenge now is to design the architecture of such software-intensive systems for guaranteeing not only its correctness, but also the ...

    Soraya Mesli-Kesraoui, Djamal Kesraoui, Flavio Oquendo in Software Architecture (2016)