Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hypergraph-driven mitigation of cyberattacks., , , and . Internet Technol. Lett., (2018)A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations., , , and . ITASEC, volume 2940 of CEUR Workshop Proceedings, page 47-60. CEUR-WS.org, (2021)A Methodology for Runtime Detection and Extraction of Threat Patterns., , , , , , , , , and . SN Comput. Sci., 1 (5): 238 (2020)A Pyramidal-based Model to Compute the Impact of Cyber Security Events., , and . ARES, page 19:1-19:10. ACM, (2018)Automated Cyber and Privacy Risk Management Toolkit., , , , , , , , and . Sensors, 21 (16): 5493 (2021)ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities., , , , and . J. Inf. Secur. Appl., (2021)Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks., , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 538-555. Springer, (2015)Enriching Threat Intelligence Platforms Capabilities., , , , and . ICETE (2), page 37-48. SciTePress, (2019)Attack Volume Model: Geometrical Approach and Application., , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 242-257. Springer, (2015)Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)., , , , and . NTMS, page 1-6. IEEE, (2015)