Martín Barrère

Orcid: 0000-0002-1460-6818

Affiliations:
  • University of Surrey, UK
  • Imperial College London, UK
  • University of the Republic, Montevideo, Uruguay (former)
  • University of Lorraine, Nancy, France (former)


According to our database1, Martín Barrère authored at least 27 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems.
Comput. Secur., September, 2023

2021
Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT.
ACM Trans. Cyber Phys. Syst., 2021

2020
Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies.
J. Inf. Secur. Appl., 2020

MaxSAT Evaluation 2020 - Benchmark: Identifying Maximum Probability Minimal Cut Sets in Fault Trees.
CoRR, 2020

Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Trustworthy Inter-connected Cyber-Physical Systems.
Proceedings of the Critical Information Infrastructures Security, 2020

2019
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs.
IEEE Trans. Dependable Secur. Comput., 2019

Assessing Cyber-Physical Security in Industrial Control Systems.
CoRR, 2019

MaxSAT Evaluation 2019 - Benchmark: Identifying Security-Critical Cyber-Physical Components in Weighted AND/OR Graphs.
CoRR, 2019

Identifying Security-Critical Cyber-Physical Components in Industrial Control Systems.
CoRR, 2019

2018
CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research.
Proceedings of the 24th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2018

2017
Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Naggen: A network attack graph generation tool - IEEE CNS 17 poster.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2015
Exact Inference Techniques for the Dynamic Analysis of Attack Graphs.
CoRR, 2015

Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery.
Proceedings of the 4th International Workshop "What can FCA do for Artificial Intelligence?", 2015

2014
Vulnerability Management for Safe Configurations in Autonomic Networks and Systems. (Gestion des Vulnérabilités dans les Réseaux et Systèmes Autonomes).
PhD thesis, 2014

Vulnerability Assessment in Autonomic Networks and Services: A Survey.
IEEE Commun. Surv. Tutorials, 2014

A SAT-based autonomous strategy for security vulnerability management.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

2013
Ovaldroid: An OVAL-based vulnerability assessment framework for Android.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Improving present security through the detection of past hidden vulnerable states.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A probabilistic cost-efficient approach for mobile security assessment.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Towards the assessment of distributed vulnerabilities in autonomic networks and systems.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Collaborative remediation of configuration vulnerabilities in autonomic networks and systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
Towards machine-assisted formal procedures for the collection of digital evidence.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Supporting vulnerability awareness in autonomic networks and systems with OVAL.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Towards Vulnerability Prevention in Autonomic Networks and Systems.
Proceedings of the Managing the Dynamics of Networks and Services, 2011


  Loading...