Author of the publication

A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems.

, , , , , , and . ITASEC, volume 2315 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non deterministic repairable fault trees for computing optimal repair strategy., , , and . VALUETOOLS, page 56. ICST/ACM, (2008)A GSPN based tool to inference generalized continuous time Bayesian networks., and . VALUETOOLS, page 316-319. ICST/ACM, (2013)Supporting reliability engineers in exploiting the power of Dynamic Bayesian Networks., , and . Int. J. Approx. Reason., 51 (2): 179-195 (2010)Decision Networks for Modeling and Analysis of Attack/Defense Scenarios in Critical Infrastructures., , and . FLAIRS, AAAI Press, (2014)Radyban: A tool for reliability analysis of dynamic fault trees through conversion into dynamic Bayesian networks., , , and . Reliab. Eng. Syst. Saf., 93 (7): 922-932 (2008)Decision Networks for Security Risk Assessment of Critical Infrastructures., and . ACM Trans. Internet Techn., 18 (3): 29:1-29:22 (2018)Extended fault trees analysis supported by stochastic petri nets.. University of Turin, Italy, (2006)A Preliminary Application of Generalized Fault Trees to Security.. SECRYPT, page 609-614. SciTePress, (2013)Quantitative evaluation of attack/defense scenarios through Decision Network modelling and analysis., , and . ICCST, page 1-6. IEEE, (2014)Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis., , , and . Comput. J., 57 (12): 1870-1892 (2014)