[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …
Contract-based design patterns: a design by contract approach to specify security patterns
With the ever growing digitization of activities, software systems are getting more and more
complex. They must comply with new usages, varied needs, and are permanently exposed …
complex. They must comply with new usages, varied needs, and are permanently exposed …
Operational design for advanced persistent threats
TN Sun, C Teodorov, LL Roux - Proceedings of the 23rd ACM/IEEE …, 2020 - dl.acm.org
The Advanced Persistent Threats (APT) are sophisticated and well-resourced attacks
targeting valuable assets. For APTs both the attack and the defense require advanced …
targeting valuable assets. For APTs both the attack and the defense require advanced …
FML: un langage de fédération de modèles pour l'interopérabilité sémantique de sources d'information hétérogènes
S Guérin - 2023 - theses.hal.science
La modélisation est une pratique universelle à la base de la pensée humaine, pour
concevoir, comprendre, calculer, imaginer, analyser, communiquer. L'Ingénierie Dirigée par …
concevoir, comprendre, calculer, imaginer, analyser, communiquer. L'Ingénierie Dirigée par …
Fédération de modèles pour l'analyse de cybersécurité du point de vue d'un attaquant
B Drouot - 2021 - theses.hal.science
La cybersécurité est un domaine de recherche très étendu qui couvre de nombreux aspects.
L'un d'entre eux, la modélisation et l'analyse de menaces, regroupe différents domaines qui …
L'un d'entre eux, la modélisation et l'analyse de menaces, regroupe différents domaines qui …
[PDF][PDF] A Method for Detecting Common Weaknesses in Self-Sovereign Identity Systems Using Domain-Specific Models and Knowledge Graph.
A Self-Sovereign Identity (SSI) system is a decentralized identity management system based
on claims that leverages blockchain technology to empower individuals to manage their …
on claims that leverages blockchain technology to empower individuals to manage their …
[PDF][PDF] Bastien DROUOT
B DROUOT - 2021 - researchgate.net
Cybersecurity encompasses multiple problem areas. One of those," Cyber Threat
Analysis"(CTA), intersects various domains, system modeling, attacker modeling and threat …
Analysis"(CTA), intersects various domains, system modeling, attacker modeling and threat …
[PDF][PDF] Exploration de Scénarios de Systemes Cyber-Physiques pour l'Analyse de la Menace
Résumé La cybersécurité des systemes est un besoin vital depuis que l'industrie se dirige
vers l'automatisation, que ce soit dans les systemes cyber-physiques ou dans” l'industrie du …
vers l'automatisation, que ce soit dans les systemes cyber-physiques ou dans” l'industrie du …