Profil

MULLER Steve

Main Referenced Co-authors
Harpes, Carlo (4)
Bonnin, Jean-Marie (3)
Gombault, Sylvain (3)
LE TRAON, Yves  (3)
Hoffmann, Paul (1)
Main Referenced Keywords
Risk assessment (2); Risk management (2); Risk perception (2); Anomaly detection (1); Anomaly detection systems (1);
Main Referenced Disciplines
Computer science (5)

Publications (total 5)

The most downloaded
17 downloads
MULLER, S., Lancrenon, J., Harpes, C., LE TRAON, Y., Gombault, S., & Bonnin, J.-M. (2018). A training-resistant anomaly detection system. Computers and Security, 76, 1-11. doi:10.1016/j.cose.2018.02.015 https://hdl.handle.net/10993/36142

The most cited

13 citations (Scopus®)

MULLER, S., Lancrenon, J., Harpes, C., LE TRAON, Y., Gombault, S., & Bonnin, J.-M. (2018). A training-resistant anomaly detection system. Computers and Security, 76, 1-11. doi:10.1016/j.cose.2018.02.015 https://hdl.handle.net/10993/36142

MULLER, S. (2018). Risk Monitoring and Intrusion Detection for Industrial Control Systems [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/36171

MULLER, S., Lancrenon, J., Harpes, C., LE TRAON, Y., Gombault, S., & Bonnin, J.-M. (2018). A training-resistant anomaly detection system. Computers and Security, 76, 1-11. doi:10.1016/j.cose.2018.02.015
Peer Reviewed verified by ORBi

MULLER, S., Harpes, C., & Muller, C. (2017). Fast and optimal countermeasure selection for attack defence trees. Lecture Notes in Computer Science, 10224 LNCS, 53-65. doi:10.1007/978-3-319-57858-3_5
Peer reviewed

MULLER, S., Harpes, C., LE TRAON, Y., Gombault, S., & Bonnin, J.-M. (2017). Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Computers and Security, 64, 59-68. doi:10.1016/j.cose.2016.09.008
Peer Reviewed verified by ORBi

MULLER, S., Harpes, C., LE TRAON, Y., Gombault, S., Bonnin, J.-M., & Hoffmann, P. (2016). Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. In International Conference on Critical Information Infrastructures Security (pp. 163-175). Springer International Publishing. doi:10.1007/978-3-319-71368-7_14
Peer reviewed

Contact ORBilu