Gustavo Gonzalez Granadillo

Orcid: 0000-0003-2036-981X

Affiliations:
  • Telecom & Management SudParis, Évry, Essonne, France


According to our database1, Gustavo Gonzalez Granadillo authored at least 40 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool.
J. Inf. Secur. Appl., 2022

Efficient Hybrid Model for Intrusion Detection Systems.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures.
J. Cybersecur. Priv., June, 2021

Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures.
Sensors, 2021

Automated Cyber and Privacy Risk Management Toolkit.
Sensors, 2021

ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities.
J. Inf. Secur. Appl., 2021

An Improved Live Anomaly Detection System (I-LADS) based on Deep Learning Algorithms.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

A Multi-factor Assessment Mechanism to Define Priorities on Vulnerabilities affecting Healthcare Organizations.
Proceedings of the Italian Conference on Cybersecurity, 2021

2020
A Methodology for Runtime Detection and Extraction of Threat Patterns.
SN Comput. Sci., 2020

Stateful RORI-based countermeasure selection using hypergraphs.
J. Inf. Secur. Appl., 2020

2019
LADS: A Live Anomaly Detection System based on Machine Learning Methods.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Enriching Threat Intelligence Platforms Capabilities.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic Platforms.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

An Overview of the CUREX Platform.
Proceedings of the 32nd IEEE International Symposium on Computer-Based Medical Systems, 2019

2018
Hypergraph-driven mitigation of cyberattacks.
Internet Technol. Lett., 2018

Dynamic risk management response system to handle cyber threats.
Future Gener. Comput. Syst., 2018

Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances.
IEEE Access, 2018

Towards an Enhanced Security Data Analytic Platform.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Pyramidal-based Model to Compute the Impact of Cyber Security Events.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A polytope-based approach to measure the impact of events against critical infrastructures.
J. Comput. Syst. Sci., 2017

Selection of Pareto-efficient response plans based on financial and operational assessments.
EURASIP J. Inf. Secur., 2017

Choosing Models for Security Metrics Visualization.
Proceedings of the Computer Network Security, 2017

Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Towards a Security Event Data Taxonomy.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

New Types of Alert Correlation for Security Information and Event Management Systems.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Towards an Automated and Dynamic Risk Management Response System.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

An n-Sided Polygonal Model to Calculate the Impact of Cyber Security Events.
Proceedings of the Risks and Security of Internet and Systems, 2016

Selection of Mitigation Actions Based on Financial and Operational Impact Assessments.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index.
Comput. Electr. Eng., 2015

Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2015

Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs).
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Attack Volume Model: Geometrical Approach and Application.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
RORI-based countermeasure selection using the OrBAC formalism.
Int. J. Inf. Sec., 2014

Combining Technical and Financial Impacts for Countermeasure Selection.
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014

2013
Optimization of cost-based threat response for Security Information and Event Management (SIEM) systems. (Optimisation de la réponse aux menaces basée sur les coûts dans des systèmes pour la Sécurité de l'Information et la Gestion des Evénements (SIEMs)).
PhD thesis, 2013

2012
An ontology-driven approach to model SIEM information and operations using the SWRL formalism.
Int. J. Electron. Secur. Digit. Forensics, 2012

Individual Countermeasure Selection Based on the Return On Response Investment Index.
Proceedings of the Computer Network Security, 2012

2011
A Dual Approach to Detect Pharming Attacks at the Client-Side.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

An Ontology-Based Model for SIEM Environments.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011


  Loading...