Andrew Fielder

According to our database1, Andrew Fielder authored at least 16 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool.
CoRR, 2022

Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

2020
SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Modelling the Impact of Threat Intelligence on Advanced Persistent Threat Using Games.
Proceedings of the From Lambda Calculus to Cybersecurity Through Program Analysis, 2020

2019
Post-incident audits on cyber insurance discounts.
Comput. Secur., 2019

2018
Risk Assessment Uncertainties in Cybersecurity Investments.
Games, 2018

2017
Uncertainty in Cyber Security Investments.
CoRR, 2017

2016
Decision support approaches for cyber security investment.
Decis. Support Syst., 2016

Modelling Cost-Effectiveness of Defenses in Industrial Control Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Defense-in-depth vs. Critical Component Defense for Industrial Control Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

Efficient Numerical Frameworks for Multi-objective Cyber Security Planning.
Proceedings of the Computer Security - ESORICS 2016, 2016

Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Optimizing time allocation for network defence.
J. Cybersecur., 2015

Comparing Decision Support Approaches for Cyber Security Investment.
CoRR, 2015

2014
Game Theory Meets Information Security Management.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Cybersecurity Games and Investments: A Decision Support Approach.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014


  Loading...