[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2024 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …

Contract-based design patterns: a design by contract approach to specify security patterns

C Silva, S Guérin, R Mazo, J Champeau - Proceedings of the 15th …, 2020 - dl.acm.org
With the ever growing digitization of activities, software systems are getting more and more
complex. They must comply with new usages, varied needs, and are permanently exposed …

Operational design for advanced persistent threats

TN Sun, C Teodorov, LL Roux - Proceedings of the 23rd ACM/IEEE …, 2020 - dl.acm.org
The Advanced Persistent Threats (APT) are sophisticated and well-resourced attacks
targeting valuable assets. For APTs both the attack and the defense require advanced …

FML: un langage de fédération de modèles pour l'interopérabilité sémantique de sources d'information hétérogènes

S Guérin - 2023 - theses.hal.science
La modélisation est une pratique universelle à la base de la pensée humaine, pour
concevoir, comprendre, calculer, imaginer, analyser, communiquer. L'Ingénierie Dirigée par …

Fédération de modèles pour l'analyse de cybersécurité du point de vue d'un attaquant

B Drouot - 2021 - theses.hal.science
La cybersécurité est un domaine de recherche très étendu qui couvre de nombreux aspects.
L'un d'entre eux, la modélisation et l'analyse de menaces, regroupe différents domaines qui …

[PDF][PDF] A Method for Detecting Common Weaknesses in Self-Sovereign Identity Systems Using Domain-Specific Models and Knowledge Graph.

C Pattiyanon, T Aoki, D Ishii - MODELSWARD, 2022 - scitepress.org
A Self-Sovereign Identity (SSI) system is a decentralized identity management system based
on claims that leverages blockchain technology to empower individuals to manage their …

[PDF][PDF] Bastien DROUOT

B DROUOT - 2021 - researchgate.net
Cybersecurity encompasses multiple problem areas. One of those," Cyber Threat
Analysis"(CTA), intersects various domains, system modeling, attacker modeling and threat …

[PDF][PDF] Exploration de Scénarios de Systemes Cyber-Physiques pour l'Analyse de la Menace

TN Sun, L Le Roux, C Teodorov, P Dhaussy - lirmm.fr
Résumé La cybersécurité des systemes est un besoin vital depuis que l'industrie se dirige
vers l'automatisation, que ce soit dans les systemes cyber-physiques ou dans” l'industrie du …