default search action
Martín Barrère
Person information
- affiliation: University of Surrey, UK
- affiliation: Imperial College London, UK
- affiliation (former): University of the Republic, Montevideo, Uruguay
- affiliation (former): University of Lorraine, Nancy, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Martín Barrère, Chris Hankin, Dean O'Reilly:
Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems. Comput. Secur. 132: 103348 (2023) - 2021
- [j4]Martín Barrère, Chris Hankin:
Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT. ACM Trans. Cyber Phys. Syst. 5(3): 30:1-30:29 (2021) - 2020
- [j3]Martín Barrère, Chris Hankin, Nicolas Nicolaou, Demetrios G. Eliades, Thomas Parisini:
Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies. J. Inf. Secur. Appl. 52: 102471 (2020) - [c16]Chris Hankin, Martín Barrère:
Trustworthy Inter-connected Cyber-Physical Systems. CRITIS 2020: 3-13 - [c15]Martín Barrère, Chris Hankin:
Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT. DSN (Supplements) 2020: 53-54 - [i6]Martín Barrère, Chris Hankin:
Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT. CoRR abs/2005.03003 (2020) - [i5]Martín Barrère, Chris Hankin:
MaxSAT Evaluation 2020 - Benchmark: Identifying Maximum Probability Minimal Cut Sets in Fault Trees. CoRR abs/2007.08255 (2020)
2010 – 2019
- 2019
- [j2]Luis Munoz-Gonzalez, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. 16(2): 231-244 (2019) - [i4]Martín Barrère, Chris Hankin, Nicolas Nicolaou, Demetrios G. Eliades, Thomas Parisini:
Identifying Security-Critical Cyber-Physical Components in Industrial Control Systems. CoRR abs/1905.04796 (2019) - [i3]Martín Barrère, Chris Hankin, Nicolas Nicolaou, Demetrios G. Eliades, Thomas Parisini:
MaxSAT Evaluation 2019 - Benchmark: Identifying Security-Critical Cyber-Physical Components in Weighted AND/OR Graphs. CoRR abs/1911.00516 (2019) - [i2]Martín Barrère, Chris Hankin, Demetrios G. Eliades, Nicolas Nicolaou, Thomas Parisini:
Assessing Cyber-Physical Security in Industrial Control Systems. CoRR abs/1911.09404 (2019) - 2018
- [c14]Martín Barrère, Chris Hankin, Angelo Barboni, Giulio Zizzo, Francesca Boem, Sergio Maffeis, Thomas Parisini:
CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research. RTCSA 2018: 240-241 - 2017
- [c13]Martín Barrère, Emil C. Lupu:
Naggen: A network attack graph generation tool - IEEE CNS 17 poster. CNS 2017: 378-379 - [c12]Martín Barrère, Rodrigo Vieira Steiner, Rabih Mohsen, Emil C. Lupu:
Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs. CNSM 2017: 1-7 - 2015
- [c11]Martín Barrère, Gustavo Betarte, Víctor Codocedo, Marcelo Rodríguez, Hernán Astudillo, Marcelo Aliquintuy, Javier Baliosian, Remi Badonnel, Olivier Festor, Carlos Raniery Paula dos Santos, Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Amedeo Napoli:
Machine-assisted Cyber Threat Analysis Using Conceptual Knowledge Discovery. FCA4AI@IJCAI 2015: 75-86 - [i1]Luis Muñoz-González, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Dynamic Analysis of Attack Graphs. CoRR abs/1510.02427 (2015) - 2014
- [b1]Martín Barrère:
Vulnerability Management for Safe Configurations in Autonomic Networks and Systems. (Gestion des Vulnérabilités dans les Réseaux et Systèmes Autonomes). University of Lorraine, Nancy, France, 2014 - [j1]Martín Barrère, Remi Badonnel, Olivier Festor:
Vulnerability Assessment in Autonomic Networks and Services: A Survey. IEEE Commun. Surv. Tutorials 16(2): 988-1004 (2014) - [c10]Martín Barrère, Remi Badonnel, Olivier Festor:
A SAT-based autonomous strategy for security vulnerability management. NOMS 2014: 1-9 - 2013
- [c9]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
A probabilistic cost-efficient approach for mobile security assessment. CNSM 2013: 235-242 - [c8]Martín Barrère, Remi Badonnel, Olivier Festor:
Improving present security through the detection of past hidden vulnerable states. IM 2013: 471-477 - [c7]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
Ovaldroid: An OVAL-based vulnerability assessment framework for Android. IM 2013: 1074-1075 - 2012
- [c6]Martín Barrère, Remi Badonnel, Olivier Festor:
Collaborative remediation of configuration vulnerabilities in autonomic networks and systems. CNSM 2012: 357-363 - [c5]Martín Barrère, Remi Badonnel, Olivier Festor:
Towards the assessment of distributed vulnerabilities in autonomic networks and systems. NOMS 2012: 335-342 - [c4]Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor:
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. SafeConfig 2012: 41-58 - 2011
- [c3]Martín Barrère, Remi Badonnel, Olivier Festor:
Towards Vulnerability Prevention in Autonomic Networks and Systems. AIMS 2011: 65-68 - [c2]Martín Barrère, Remi Badonnel, Olivier Festor:
Supporting vulnerability awareness in autonomic networks and systems with OVAL. CNSM 2011: 1-8 - [c1]Martín Barrère, Gustavo Betarte, Marcelo Rodríguez:
Towards machine-assisted formal procedures for the collection of digital evidence. PST 2011: 32-35
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint