Publications

Peer-reviewed publications

Generated using php-bibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.

  • 2016:
    1. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. In 13th International Conference on Quantitative Evaluation of SysTems (QEST’16), Québec, Canada, August 23-25, 2016. 2016. bib ]
    2. Automating Cyber Defence Responses Using Attack-Defence Trees and Game Theory. R. Jhawar, S. Mauw and I. Zakiuddin. In 15th European Conference on Cyber Warfare and Security. pp. 163–172, 2016. bib ]
    3. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. R. Jhawar, K. Lounis and S. Mauw. In 12th International Workshop on Security and Trust Management. 2016. bib ]
  • 2015:
    1. Attack trees with sequential conjunction. R. Jhawar, B. Kordy, S. Mauw, S. Radomirović and R. Trujillo-Rasua. In Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIPSec’15). Springer-Verlag, IFIP AICT 455, pp. 339–353, 2015. bib ]
    2. Dependability-oriented resource management schemes for cloud computing data centers. R. Jhawar and V. Piuri. In Handbook on Data Centers, Springer New York, pp. 1285–1305, 2015. bib ]
    3. Theory of Attack Trees with Sequential Conjunction. R. Jhawar, B. Kordy, S. Mauw, S. Radomirović and R. Trujillo-Rasua. , 2015. bib ]
  • 2014:
    1. Dependability-Oriented Resource Management Schemes for Cloud Computing Data Centers. R. Jhawar and V. Piuri. , 2014. bib ]
  • 2013:
    1. Dependability Certification of Services: A Model-Based Approach. C.A. Ardagna, R. Jhawar and V. Piuri. Computing, 2013. bib ]
    2. Fault Tolerance Management in Cloud Computing: A System-Level Perspective. R. Jhawar, V. Piuri and M. Santambrogio. IEEE Systems Journal, 7(2):288–297, 2013. bib ]
    3. Reliable Mission Deployment in Vulnerable Distributed Systems. M. Albanese, S. Jajodia, R. Jhawar and V. Piuri. In Proc. of the 43rd Annual IEEE⁄IFIP International Conference on Dependable Systems and Networks Workshops (DSN-RSDA 2013). 2013. bib ]
    4. Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing. R. Jhawar and V. Piuri. In Proc. of the 10th International Conference on Security and Cryptography (SECRYPT 2013). 2013. bib ]
    5. Securing Mission-Centric Operations in the Cloud. M. Albanese, S. Jajodia, R. Jhawar and V. Piuri. In Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2013. bib ]
    6. Fault Tolerance and Resilience in Cloud Computing Environments. R. Jhawar and V. Piuri. In Computer and Information Security Handbook, 2nd Edition, Morgan Kaufmann, pp. 125–142, 2013. bib ]
  • 2012:
    1. A Model-Based Approach to Reliability Certification of Services. C.A.. Ardagna, E. Damiani, R. Jhawar and V. Piuri. In Proc. of the 6th IEEE International Conference on Digital Ecosystem Technologies - Complex Environment Engineering (DEST-CEE 2012). 2012. bib ]
    2. Fault Tolerance Management in IaaS Clouds. R. Jhawar and V. Piuri. In Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Telecommunications (ESTEL 2012). ESTEL 2012, 2012. bib ]
    3. A Comprehensive Conceptual System-Level Approach to Fault Tolerance in Cloud Computing. R. Jhawar, V. Piuri and M. Santambrogio. In 2012 IEEE International Systems Conference (SysCon 2012). 2012. bib ]
    4. Supporting Security Requirements for Resource Management in Cloud Computing. R. Jhawar, V. Piuri and P. Samarati. In Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012). CSE 2012, 2012. bib ]
  • 2011:
    1. Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication. R. Jhawar, P. Inglesant, N. Courtois and A. Sasse. In Proc. of 5th International Conference on Network and System Security (NSS). pp. 81–88, 2011. bib ]