Joaquin GARCIA-ALFARO (Professor)
Contact
As anyone at the chair, you can reach me at surname@thisdomain.
My research
My publications
2018
These sur la securite des systemes cyber-physiques industriels Technical Report
2018.
Adaptive Control-Theoretic Detection of Integrity Attacks against Cyber-Physical Industrial Systems Journal Article
In: Transactions on Emerging Telecommunications Technologies, vol. 32, no. 9, pp. 1–17, 2018.
A pyramidal-based model to compute the impact of cyber security events Proceedings Article
In: ACM, (Ed.): 13th International Conference on Availability, Reliability and Security (ARES 2018), pp. 1–10, New York, 2018.
2017
Anonymous Certification for an e-Assessment Framework Proceedings Article
In: 22nd Nordic Conference on Secure IT Systems (NordSec 2017) Tartu, Estonia, pp. 70–85, Springer, 2017.
Learning to Communicate Underwater (An exploration of Limited Mobility Agents in Underwater Acoustic Sensor Networks) Proceedings Article
In: 12th ACM International Conference on Underwater Networks & Systems, WUWNet'17, Nov 6-8, 2017, Halifax, pp. 1–5, ACM, 2017.
Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric Proceedings Article
In: Foundations and Practice of Security. FPS 2017. Lecture Notes in Computer Science, vol 10723, pp. 293–302, Springer, 2017.
The Sound of Communication in Underwater Acoustic Sensor Networks Proceedings Article
In: 9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada, pp. 13–23, Springer, 2017.
Doppler Effect in the Underwater Acoustic Ultra Low Frequency Band Proceedings Article
In: 9th EAI International Conference on Ad Hoc Networks, Niagara Falls, Canada, pp. 3–12, Springer, 2017.
Towards a Security Event Data Taxonomy Proceedings Article
In: 12th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2017), Dinard, France, pp. 29–45, Springer, 2017.
Selection of Pareto-efficient Response Plans based on Financial and Operational Assessments Journal Article
In: EURASIP Journal on Information Security, vol. 2017, iss. 12, pp. 1–22, 2017.
On the use of Watermark-based Schemes to Detect Cyber-Physical Attacks Journal Article
In: EURASIP Journal on Information Security, vol. 2017, iss. 8, pp. 1–25, 2017.
Introduction to the special section on critical systems modelling and security Journal Article
In: Computers and Electrical Engineering, vol. 59, pp. 73–75, 2017.
A polytope-based approach to measure the impact of events against critical infrastructures Journal Article
In: Journal of Computer and System Sciences, vol. 83, no. 1, pp. 3–21, 2017.
Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances Journal Article
In: IEEE Access, vol. 6, pp. 8810–8828, 2017.
2016
Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks Proceedings Article
In: 21st Nordic Conference on Secure IT Systems (NordSec 2016), pp. 3–19, Springer, 2016.
Towards an Automated and Dynamic Risk Management Response System Proceedings Article
In: 21st Nordic Conference on Secure IT Systems (NordSec 2016), pp. 37–53, Springer, 2016.
Security of Cyber-Physical Systems. From Theory to Testbeds and Validation Proceedings Article
In: 2nd Workshop on the Security of Industrial Control Systems & Cyber-Physical Systems (CyberICPS 2016), pp. 3–18, Springer, 2016.
An n-sided polygonal model to calculate the impact of cyber security events Proceedings Article
In: 11th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2016), Roscoff, France, September 2016, pp. 87–102, Springer, 2016.
Revisiting a watermark-based detection scheme to handle cyber-physical attacks Proceedings Article
In: Availability, Reliability and Security (ARES), 2016 11th International Conference on, pp. 21–28, IEEE, 2016.
Selection of mitigation actions based on financial and operational impact assessments Proceedings Article
In: Availability, Reliability and Security (ARES), 2016 11th International Conference on, pp. 137–146, IEEE, 2016.
Considering internal vulnerabilities and the attacker's knowledge to model the impact of cyber events as geometrical prisms Proceedings Article
In: Trustcom/BigDataSE/ISPA, 2016 IEEE, pp. 340–348, IEEE, 2016.
CACEV: a Cost and Carbon Emission-Efficient Virtual Machine Placement Method for Green Distributed Clouds Proceedings Article
In: Services Computing (SCC), 2016 IEEE International Conference on, pp. 275–282, IEEE, 2016.
0000
Special section on critical systems modelling and security Proceedings
Elsevier, vol. 47, 0000.