Filter your results
- 5
- 5
- 5
- 1
- 1
- 2
- 1
- 5
- 5
- 2
- 2
- 1
- 1
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.330-348, ⟨10.1007/978-3-319-95729-6_21⟩
Conference papers
hal-01954421v1
|
||
|
CASFinder: Detecting Common Attack Surface33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.338-358, ⟨10.1007/978-3-030-22479-0_18⟩
Conference papers
hal-02384581v1
|
||
|
Mining Likely Properties of Access Control Policies via Association Rule Mining24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.193-208, ⟨10.1007/978-3-642-13739-6_13⟩
Conference papers
hal-01056688v1
|
||
|
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers
hal-01954402v1
|
||
|
Security auditing of internet of things devices in a smart home17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.213-234, ⟨10.1007/978-3-030-88381-2_11⟩
Conference papers
hal-03764368v1
|