Author of the publication

A Workflow for Distributed and Resilient Attack Graph Generation.

, and . DSN-S, page 185-187. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BenchIMP: A Benchmark for Quantitative Evaluation of the Incident Management Process Assessment., , and . ARES, page 3:1-3:12. ACM, (2024)A Methodology to Support Automatic Cyber Risk Assessment Review., , and . CoRR, (2022)Toward a Context-Aware Methodology for Information Security Governance Assessment Validation., , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 171-187. Springer, (2020)Critical nodes reveal peculiar features of human essential genes and protein interactome., , , , , and . BIBM, page 2121-2128. IEEE, (2019)Mixed Models with Multiple Instance Learning., , , , and . AISTATS, volume 238 of Proceedings of Machine Learning Research, page 3664-3672. PMLR, (2024)Context-Aware Trace Alignment with Automated Planning., , , , , and . ICPM, page 104-111. IEEE, (2022)A compliance assessment system for Incident Management process., , , , and . Comput. Secur., (2024)How to assess measurement capabilities of a security monitoring infrastructure and plan investment through a graph-based approach., , and . Expert Syst. Appl., (2025)A Workflow for Distributed and Resilient Attack Graph Generation., and . DSN-S, page 185-187. IEEE, (2023)It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation., and . ESORICS (4), volume 14985 of Lecture Notes in Computer Science, page 229-250. Springer, (2024)