Search Results - "De Faveri, Cristiano"
-
1
Goal-Driven Deception Tactics Design
Published in 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE) (01-10-2016)“…Deception-based defense relies on intentional actions employed to induce erroneous inferences on attackers. Existing deception approaches are included in the…”
Get full text
Conference Proceeding -
2
Multi-paradigm deception modeling for cyber defense
Published in The Journal of systems and software (01-07-2018)“…•Multi-paradigm modeling approach and tool for deception-based defense.•Metamodel combination of multiple modeling paradigms.•Deception tactics integration…”
Get full text
Journal Article -
3
Modeling Deception for Cyber Security
Published 01-01-2021“…In the era of software-intensive, smart and connected systems, the growing power and sophistication of cyber attacks poses increasing challenges to software…”
Get full text
Dissertation -
4
Visual Modeling of Cyber Deception
Published in 2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC) (01-10-2018)“…Deception-based defense relies on deliberated actions to manipulate the attackers' perception of a system. It requires careful planning and application of…”
Get full text
Conference Proceeding -
5
Designing Adaptive Deception Strategies
Published in 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) (01-08-2016)“…Deception-based defense is the process by which actions are intentionally employed to cause misrepresentation and induce erroneous inferences on attackers…”
Get full text
Conference Proceeding -
6
An approach to align business and IT perspectives during the SOA services identification
Published in 2017 17th International Conference on Computational Science and Its Applications (ICCSA) (01-07-2017)“…Service-oriented architectures are a widely used business practice to develop enterprise information systems. However, the current analysis and design methods…”
Get full text
Conference Proceeding -
7
Deception planning models for cyber security
Published in 2017 17th International Conference on Computational Science and Its Applications (ICCSA) (01-07-2017)“…Deception-based mechanisms are typically used to enhance overall security by causing misperception on adversaries who take actions in favor of defense. The…”
Get full text
Conference Proceeding -
8
Designing elderly care ecosystem in collaborative networks environment
Published in 2017 International Conference on Computing Networking and Informatics (ICCNI) (01-10-2017)“…As noticed in diverse areas, service providers realize that the provision of collaborative, integrated, and user-centric services can garner a competitive…”
Get full text
Conference Proceeding -
9
An Elderly Care Ecosystem Application
Published in IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society (01-10-2019)“…The growing percentage of the elderly population within modern society is remarkable. Additionally, the aging process comes with specific individual needs,…”
Get full text
Conference Proceeding -
10
Towards Security Modeling of e-Voting Systems
Published in 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) (01-09-2016)“…As voting systems evolve from paper ballots to electronic voting (E-voting) applications, we have noticed significant efforts to develop real-world securer…”
Get full text
Conference Proceeding