Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
This paper proposes a capital accumulation model with a random stopping time corresponding to the occurrence of an environmental catastrophe. Depending on the preventive capital s...
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
The interdependencies between infrastructures may be the cause of serious problems in mission/safety critical systems. In the CRUTIAL3 project the interdependencies between the ele...
Marco Beccuti, Giuliana Franceschinis, Mohamed Ka&...