Profil

JHAWAR Ravi

Main Referenced Co-authors
MAUW, Sjouke  (5)
LOUNIS, Karim  (3)
TRUJILLO RASUA, Rolando  (2)
GADYATSKAYA, Olga  (1)
Kordy, Barbara (1)
Main Referenced Disciplines
Computer science (6)

Publications (total 6)

The most downloaded
570 downloads
Jhawar, R., Lounis, K., & Mauw, S. (2016). A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. In 12th International Workshop on Security and Trust Management. doi:10.1007/978-3-319-46598-2_10 https://hdl.handle.net/10993/29397

The most cited

80 citations (Scopus®)

Jhawar, R., Kordy, B., Mauw, S., Radomirovic, S., & Trujillo Rasua, R. (2015). Attack Trees with Sequential Conjunction. In Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (pp. 339--353). Springer. https://hdl.handle.net/10993/25860

Jhawar, R., Lounis, K., Mauw, S., & Ramirez Cruz, Y. (2018). Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library. In S. Katsikas & C. Alcaraz (Eds.), Security and Trust Management. STM 2018 (pp. 85-101). Springer. doi:10.1007/978-3-030-01141-3_6
Peer reviewed

Jhawar, R., & Mauw, S. (2017). Model-driven situational awareness for moving target defense. In M. Scanlon & N.-A. Le-Khac (Eds.), Proc. 16th European Conference on Cyber Warfare and Security (pp. 184-192). ACPI.
Peer reviewed

Jhawar, R., Mauw, S., & Zakiuddin, I. (2016). Automating Cyber Defense Response Using Attack-Defence Trees and Game Theory. In The 15th European Conference on Cyber Warfare and Security (pp. 163-172).
Peer reviewed

Jhawar, R., Lounis, K., & Mauw, S. (2016). A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. In 12th International Workshop on Security and Trust Management. doi:10.1007/978-3-319-46598-2_10
Peer reviewed

Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., & Trujillo Rasua, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer. doi:10.1007/978-3-319-43425-4_10
Peer reviewed

Jhawar, R., Kordy, B., Mauw, S., Radomirovic, S., & Trujillo Rasua, R. (2015). Attack Trees with Sequential Conjunction. In Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (pp. 339--353). Springer.
Peer reviewed

Contact ORBilu