Hackers Profiled ??? Who Are They and What Are Their Motivations?, Computer Fraud & Security, vol.2001, issue.2, pp.14-17, 2001. ,
DOI : 10.1016/S1361-3723(01)02017-6
Ontology-based model of network and computer attacks for security assessment, Journal of Shanghai Jiaotong University (Science), vol.27, issue.2, pp.554-562, 2013. ,
DOI : 10.1007/s12204-013-1439-5
Solms: Management of risk in the information age, Computer & Security, vol.14, pp.16-30, 2005. ,
Juoyce: Quantitative risk-based security prediction for componentbased systems with explicity modeled attack profiles, Journal of Systems and Software, vol.81, issue.8, p.13271345, 2008. ,
Adaptable security mechanism for dynamic environments, Computers & Security, vol.26, issue.3, pp.246-255, 2007. ,
DOI : 10.1016/j.cose.2006.11.002
QoP-ML: Quality of protection modelling language for cryptographic protocols, Computers & Security, vol.31, issue.4, pp.569-596, 2012. ,
DOI : 10.1016/j.cose.2012.01.006
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML), LNCS, vol.7804, pp.261-270, 2013. ,
DOI : 10.1007/978-3-642-36818-9_27
URL : https://hal.archives-ouvertes.fr/hal-01480233
Tidke: Self-reported computer criminal behavior: A psychological analysis: Digital Investigation 3, p.116120, 2006. ,
Klabbers: Using Attacker Capabilities and Motivations in Estimating Security Risk, SOUPS, 2013. ,
Automated generation and analysis of attack graphs. S&Pi, 2002. ,
Xenakis: A Quantitative Risk Analysis Approach for Deliberate Threats, CRITIS, pp.13-25, 2011. ,