P
Pamela Peretti
Publications - 7
Citations - 329
Pamela Peretti is an academic researcher. The author has contributed to research in topics: Profitability index & Security information and event management. The author has an hindex of 5, co-authored 7 publications receiving 303 citations.
Papers
More filters
Proceedings ArticleDOI
Defense trees for economic evaluation of security investments
TL;DR: It is shown how the mixed qualitative and quantitative approach can be used to evaluate effectiveness and economic profitability of countermeasures as well as their deterrent effect on attackers, thus providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.
Book ChapterDOI
Strategic games on defense trees
TL;DR: This paper uses defense trees, an extension of attack trees with countermeasures, to represent attack scenarios and game theory to detect the most promising actions attacker and defender, providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.
Proceedings ArticleDOI
Using CP-nets as a guide for countermeasure selection
TL;DR: A qualitative approach for the selection of security countermeasures able to protect an IT system from attacks is presented and two different methods for the composition of preferences are introduced: the and-com composition and the or-composition.
Journal ArticleDOI
Evaluation of complex security scenarios using defense trees and economic indexes
TL;DR: It is shown how the mixed qualitative and quantitative approach can be used to evaluate economic profitability of countermeasures and their deterrent effect on attackers, thus providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.
Journal ArticleDOI
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
TL;DR: An implementation that select the best set of countermeasure able to mitigate all the vulnerabilities by computing the optimal answer set of the corresponding ASO program is described.