
S. Muller, C. Harpes and C. Muller, ‘Fast and optimal countermeasureselection for attack defence trees’, in Risk Assessment and Risk-Driven Quality Assurance: 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, J. Großmann, M. Felderer and F. Seehusen, Eds. Cham: Springer International Publishing, 2017, pp. 53–65, ISBN: 978-3-319-57858-3. DOI: 10.1007/978- 3- 319- 57858- 3_5. [Online]. Available: http://dx.doi.org/10.1007/978-3-319-57858-3_5.
S. Muller, C. Harpes, Y. L. Traon, S. Gombault and J.-M. Bonnin, ‘Efficiently computing the likelihoods of cyclically interdependent risk scenarios’, Computers & Security, vol. 64, pp. 59–68, 2017, ISSN: 0167-DOI: http://dx.doi.org/10.1016/j.cose.2016.09. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167404816301158.
Du 26 au 28 septembre, les partenaires du projet ATENA se sont rencontrés au centre de contrôle de CREOS au Luxembourg, ainsi que dans les locaux de SWDE en Belgique pour discuter du déroulement du projet.
S. Muller, C. Harpes, Y. Le Traon, S. Gombault, J.-M. Bonnin and P. Hoffmann, ‘Dynamic risk analyses and dependency-aware rootcause model for critical infrastructures’, in Critical Information Infrastructures
Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers, G. Havarneanu,
R. Setola, H. Nassopoulos and S. Wolthusen, Eds. Cham: Springer 146 Bibliography International Publishing, 2017, pp. 163–175, ISBN: 978-3-319-71368-7. DOI: 10.1007/978-3-319-71368-7_14. [Online].
Information Security Maturity as an Integral Part of ISMS based Risk Management Tools,
Ben Fetler, Carlo Harpes,
24 au 28 Juillet 2016, the tenth international conference on emerging security information, systems and technologies – SECURWARE 2016, Nice, France
Gadyatskaya O., Harpes C., Mauw S., Muller C., Muller S.
(2016) Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
In: Kordy B., Ekstedt M., Kim D. (eds) Graphical Models for Security.
GraMSec 2016. Lecture Notes in Computer Science, vol 9987. Springer, Cham.
Steve Muller, ‘Risk monitoring in industrial control systems’, in Advanced Data Collection and Risks (ADaCoR) Workshop 2016, 2016.
B. Fetler and S. Muller, ‘Dynamic risk analysis’, in Security Assessment for Systems, Services, and Infrastructures (SASSI) Workshop 2015, 2015.
"Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets"
Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, et Yves Le Traon
IEEE Transactions on Computers PrePrint, no. 1, pp. 1, doi:10.1109/TC.2014.2375189
"Un nouveau regard en matière d'analyse de risques",
Dr. Carlo Harpes,
10 mars 2015, Lëtzebuerger Gemengen (LG) Hors-série ICT