A Model Driven Approach for Cyber Security Scenarios Deployment. Braghin, C., Cimato, S., Damiani, E., Frati, F., Mauri, L., & Riccobene, E. In Fournaris, A. P., Athanatos, M., Lampropoulos, K., Ioannidis, S., Hatzivasilis, G., Damiani, E., Abie, H., Ranise, S., Verderame, L., Siena, A., & García-Alfaro, J., editors, Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, volume 11981, of Lecture Notes in Computer Science, pages 107–122, 2019. Springer.
Paper doi bibtex @inproceedings{DBLP:conf/esorics/BraghinCDFMR19,
author = {Chiara Braghin and
Stelvio Cimato and
Ernesto Damiani and
Fulvio Frati and
Lara Mauri and
Elvinia Riccobene},
editor = {Apostolos P. Fournaris and
Manos Athanatos and
Konstantinos Lampropoulos and
Sotiris Ioannidis and
George Hatzivasilis and
Ernesto Damiani and
Habtamu Abie and
Silvio Ranise and
Luca Verderame and
Alberto Siena and
Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
title = {A Model Driven Approach for Cyber Security Scenarios Deployment},
booktitle = {Computer Security - {ESORICS} 2019 International Workshops, IOSec,
MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019,
Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {11981},
pages = {107--122},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-42051-2\_8},
doi = {10.1007/978-3-030-42051-2\_8},
timestamp = {Mon, 03 Jan 2022 22:15:08 +0100},
biburl = {https://dblp.org/rec/conf/esorics/BraghinCDFMR19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"RGqhYbc5wJ8aPiPmH","bibbaseid":"braghin-cimato-damiani-frati-mauri-riccobene-amodeldrivenapproachforcybersecurityscenariosdeployment-2019","authorIDs":[],"author_short":["Braghin, C.","Cimato, S.","Damiani, E.","Frati, F.","Mauri, L.","Riccobene, E."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Chiara"],"propositions":[],"lastnames":["Braghin"],"suffixes":[]},{"firstnames":["Stelvio"],"propositions":[],"lastnames":["Cimato"],"suffixes":[]},{"firstnames":["Ernesto"],"propositions":[],"lastnames":["Damiani"],"suffixes":[]},{"firstnames":["Fulvio"],"propositions":[],"lastnames":["Frati"],"suffixes":[]},{"firstnames":["Lara"],"propositions":[],"lastnames":["Mauri"],"suffixes":[]},{"firstnames":["Elvinia"],"propositions":[],"lastnames":["Riccobene"],"suffixes":[]}],"editor":[{"firstnames":["Apostolos","P."],"propositions":[],"lastnames":["Fournaris"],"suffixes":[]},{"firstnames":["Manos"],"propositions":[],"lastnames":["Athanatos"],"suffixes":[]},{"firstnames":["Konstantinos"],"propositions":[],"lastnames":["Lampropoulos"],"suffixes":[]},{"firstnames":["Sotiris"],"propositions":[],"lastnames":["Ioannidis"],"suffixes":[]},{"firstnames":["George"],"propositions":[],"lastnames":["Hatzivasilis"],"suffixes":[]},{"firstnames":["Ernesto"],"propositions":[],"lastnames":["Damiani"],"suffixes":[]},{"firstnames":["Habtamu"],"propositions":[],"lastnames":["Abie"],"suffixes":[]},{"firstnames":["Silvio"],"propositions":[],"lastnames":["Ranise"],"suffixes":[]},{"firstnames":["Luca"],"propositions":[],"lastnames":["Verderame"],"suffixes":[]},{"firstnames":["Alberto"],"propositions":[],"lastnames":["Siena"],"suffixes":[]},{"firstnames":["Joaquín"],"propositions":[],"lastnames":["García-Alfaro"],"suffixes":[]}],"title":"A Model Driven Approach for Cyber Security Scenarios Deployment","booktitle":"Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers","series":"Lecture Notes in Computer Science","volume":"11981","pages":"107–122","publisher":"Springer","year":"2019","url":"https://doi.org/10.1007/978-3-030-42051-2\\_8","doi":"10.1007/978-3-030-42051-2_8","timestamp":"Mon, 03 Jan 2022 22:15:08 +0100","biburl":"https://dblp.org/rec/conf/esorics/BraghinCDFMR19.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/esorics/BraghinCDFMR19,\n author = {Chiara Braghin and\n Stelvio Cimato and\n Ernesto Damiani and\n Fulvio Frati and\n Lara Mauri and\n Elvinia Riccobene},\n editor = {Apostolos P. Fournaris and\n Manos Athanatos and\n Konstantinos Lampropoulos and\n Sotiris Ioannidis and\n George Hatzivasilis and\n Ernesto Damiani and\n Habtamu Abie and\n Silvio Ranise and\n Luca Verderame and\n Alberto Siena and\n Joaqu{\\'{\\i}}n Garc{\\'{\\i}}a{-}Alfaro},\n title = {A Model Driven Approach for Cyber Security Scenarios Deployment},\n booktitle = {Computer Security - {ESORICS} 2019 International Workshops, IOSec,\n MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019,\n Revised Selected Papers},\n series = {Lecture Notes in Computer Science},\n volume = {11981},\n pages = {107--122},\n publisher = {Springer},\n year = {2019},\n url = {https://doi.org/10.1007/978-3-030-42051-2\\_8},\n doi = {10.1007/978-3-030-42051-2\\_8},\n timestamp = {Mon, 03 Jan 2022 22:15:08 +0100},\n biburl = {https://dblp.org/rec/conf/esorics/BraghinCDFMR19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Braghin, C.","Cimato, S.","Damiani, E.","Frati, F.","Mauri, L.","Riccobene, E."],"editor_short":["Fournaris, A. P.","Athanatos, M.","Lampropoulos, K.","Ioannidis, S.","Hatzivasilis, G.","Damiani, E.","Abie, H.","Ranise, S.","Verderame, L.","Siena, A.","García-Alfaro, J."],"key":"DBLP:conf/esorics/BraghinCDFMR19","id":"DBLP:conf/esorics/BraghinCDFMR19","bibbaseid":"braghin-cimato-damiani-frati-mauri-riccobene-amodeldrivenapproachforcybersecurityscenariosdeployment-2019","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-030-42051-2\\_8"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://dltgroup.dmi.unipg.it/temp_files/global.bib","creationDate":"2021-01-14T18:29:35.984Z","downloads":0,"keywords":[],"search_terms":["model","driven","approach","cyber","security","scenarios","deployment","braghin","cimato","damiani","frati","mauri","riccobene"],"title":"A Model Driven Approach for Cyber Security Scenarios Deployment","year":2019,"dataSources":["SjN5QvQnwzXZgxsKq","PCdRvyaDZRZMeqKhf"]}