Leanid Krautsevich

According to our database1, Leanid Krautsevich authored at least 20 papers between 2010 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Using Attack Graphs to Analyze Social Engineering Threats.
Int. J. Secur. Softw. Eng., 2015

2014
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Evaluation of Risk for Complex Systems Using Attack Surface.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Evaluation of Adaptive Attacker Models.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Analysis of Social Engineering Threats with Attack Graphs.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Quantitative Evaluation and Reevaluation of Security in Services.
PhD thesis, 2013

Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties.
IEEE Syst. J., 2013

Formal Analysis of Security Metrics with Defensive Actions.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Towards Attribute-Based Access Control Policy Engineering Using Risk.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

Towards Policy Engineering for Attribute-Based Access Control.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
Towards Modelling Adaptive Attacker's Behaviour.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Formal Analysis of Security Metrics and Risk.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

A General Method for Assessment of Security in Complex Services.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Risk-Based Auto-delegation for Probabilistic Availability.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Cost-effective Enforcement of UCON<sub>A</sub> Policies.
Proceedings of the CRiSIS 2011, 2011

2010
Usage Control, Risk and Trust.
Proceedings of the Trust, 2010

Influence of Attribute Freshness on Decision Making in Usage Control.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Risk-Based Usage Control for Service Oriented Architecture.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Formal approach to security metrics.: what does "more secure" mean for you?
Proceedings of the Software Architecture, 4th European Conference, 2010


  Loading...