Reading Time: < 1 minute
25 entries « 2 of 2 »

Nardone, Roberto; Rodríguez, Ricardo J; Marrone, Stefano

Formal Security Assessment of Modbus Protocol Inproceedings

Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, pp. 142–147, IEEE, 2016.

Abstract | Links | BibTeX | Tags: Cyber-Physical Security, Dynamic State Machines, Modbus, Model checking, SCADA control systems

Rodríguez, Ricardo J; Chang, Xiaolin; Li, Xiaodan; Trivedi, Kishor S

Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack Inproceedings

Kordy, Barbara; Ekstedt, Mathias; Kim, Seong Dong (Ed.): Proceedings of the 3rd International Workshop on Graphical Models for Security, pp. 134–149, 2016.

Abstract | Links | BibTeX | Tags: APT, Cyberattacks, Markov chains, Security metrics, Stochastic reward nets, Survivability, Transient analysis

Rodríguez, Ricardo J; Marrone, Stefano

Model-Based Vulnerability Assessment of Self-Adaptive Protection Systems Incollection

Novais, Paulo; Camacho, David; Analide, Cesar; Seghrouchni, Amal El Fallah; Badica, Costin (Ed.): Intelligent Distributed Computing IX, 616 , pp. 439–449, Springer International Publishing, 2016, ISBN: 978-3-319-25015-1.

Abstract | Links | BibTeX | Tags: Dynamic Bayesian Networks, model-based, security assessment, vulnerability

Rodríguez, Ricardo J; Rodríguez-Gastón, Iñaki; Alonso, Javier

Towards the Detection of Isolation-Aware Malware Journal Article

IEEE Latin America Transactions (Revista IEEE America Latina), 14 (2), pp. 1024–1036, 2016, ISSN: 1548-0992.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, Dynamic binary instrumentation, program binary analysis

Botas, Alvaro; Rodríguez, Ricardo J; Vaisanen, Teemu; Zdzichowski, Patrycjusz

Counterfeiting and Defending the Digital Forensic Process Inproceedings

Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), pp. 1966–1971, IEEE, 2015.

Abstract | Links | BibTeX | Tags: anti-forensics, categorization, forensics

Marrone, Stefano; Rodríguez, Ricardo J; Nardone, Roberto; Flammini, Francesco; Vittorini, Valeria

On Synergies of Cyber and Physical Security Modelling in Vulnerability Assessment of Railway Systems Journal Article

Computers and Electrical Engineering, 47 , pp. 275–285, 2015, ISSN: 0045-7906.

Abstract | Links | BibTeX | Tags: Bayesian networks, Cyber-physical systems, Generalized stochastic Petri nets, UML, UML profile, Vulnerability assessment

Rodríguez, Ricardo J; Merseguer, José; Bernardi, Simona

Modelling Security of Critical Infrastructures: A Survivability Assessment Journal Article

The Computer Journal, 58 (10), pp. 2313–2327, 2015.

Abstract | Links | BibTeX | Tags: Security, sensitive analysis, software system engineering, Survivability, UML

Vila, José; Rodríguez, Ricardo J

Practical Experiences on NFC Relay Attacks with Android: Virtual Pickpocketing Revisited Inproceedings

Proceedings of the 11th International Workshop on RFID Security (RFIDsec), pp. 87–103, Springer, 2015.

Abstract | Links | BibTeX | Tags: Android, contactless cards, contactless payment, NFC, relay attacks, Security

Rodríguez, Ricardo J; Júlvez, Jorge; Merseguer, José

Quantification and Compensation of the Impact of Faults in System Throughput Journal Article

Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, 227 (6), pp. 614–628, 2013.

Abstract | Links | BibTeX | Tags: fault-tolerant techniques, integer-linear programming, Performability, Petri nets

Rodríguez, Ricardo J; Merseguer, José; Bernardi, Simona

Modelling and Analysing Resilience as a Security Issue within UML Inproceedings

Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems (SERENE), pp. 42–51, ACM, London, United Kingdom, 2010.

Abstract | Links | BibTeX | Tags: Petri nets, Petri nets, Security, software system engineering, UML

25 entries « 2 of 2 »