scispace - formally typeset
P

Pamela Peretti

Publications -  7
Citations -  329

Pamela Peretti is an academic researcher. The author has contributed to research in topics: Profitability index & Security information and event management. The author has an hindex of 5, co-authored 7 publications receiving 303 citations.

Papers
More filters
Proceedings ArticleDOI

Defense trees for economic evaluation of security investments

TL;DR: It is shown how the mixed qualitative and quantitative approach can be used to evaluate effectiveness and economic profitability of countermeasures as well as their deterrent effect on attackers, thus providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.
Book ChapterDOI

Strategic games on defense trees

TL;DR: This paper uses defense trees, an extension of attack trees with countermeasures, to represent attack scenarios and game theory to detect the most promising actions attacker and defender, providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.
Proceedings ArticleDOI

Using CP-nets as a guide for countermeasure selection

TL;DR: A qualitative approach for the selection of security countermeasures able to protect an IT system from attacks is presented and two different methods for the composition of preferences are introduced: the and-com composition and the or-composition.
Journal ArticleDOI

Evaluation of complex security scenarios using defense trees and economic indexes

TL;DR: It is shown how the mixed qualitative and quantitative approach can be used to evaluate economic profitability of countermeasures and their deterrent effect on attackers, thus providing decision makers with a useful tool for performing better evaluation of IT security investments during the risk management process.
Journal ArticleDOI

Analyzing Security Scenarios Using Defence Trees and Answer Set Programming

TL;DR: An implementation that select the best set of countermeasure able to mitigate all the vulnerabilities by computing the optimal answer set of the corresponding ASO program is described.