default search action
Charles Morisset
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c54]Marlon P. da Silva, Henry C. Nunes, Charles V. Neu, Luana T. Thomas, Avelino F. Zorzo, Charles Morisset:
Impact of Using a Privacy Model on Smart Buildings Data for CO2 Prediction. DBSec 2023: 133-140 - [c53]Natalie Leesakul, Charles Morisset:
Position Paper: The role of law in achieving privacy and security measures in smart buildings from the GDPR context. EuroS&P Workshops 2023: 619-626 - [c52]Naoom Abu Abah, Nick Taylor, Charles Morisset, Maryam Mehrnezhad:
U-Sense: Feasibility Study of "Human as a Sensor" in Incident Reporting Systems in a Smart Campus. EuroS&P Workshops 2023: 641-652 - [c51]Huda Ali Alatwi, Charles Morisset:
Realism versus Performance for Adversarial Examples Against DL-based NIDS. SAC 2023: 1549-1557 - [i13]Marlon P. da Silva, Henry C. Nunes, Charles V. Neu, Luana T. Thomas, Avelino F. Zorzo, Charles Morisset:
Impact of using a privacy model on smart buildings data for CO2 prediction. CoRR abs/2306.00766 (2023) - 2022
- [c50]Huda Ali Alatwi, Charles Morisset:
Threat Modeling for Machine Learning-Based Network Intrusion Detection Systems. IEEE Big Data 2022: 4226-4235 - [c49]Caitlin Brown, Charles Morisset:
Simple and Efficient Identification of Personally Identifiable Information on a Public Website. IEEE Big Data 2022: 4246-4255 - [c48]Charles V. Neu, Joel Gibson, Roben Castagna Lunardi, Natalie Leesakul, Charles Morisset:
A Blockchain-Based Architecture to Manage User Privacy Preferences on Smart Shared Spaces Privately. DPM/CBT@ESORICS 2022: 136-150 - [c47]David Sanchez, Charles Morisset:
Towards Calculating the Resilience of an Urban Transport Network Under Attack. PASM 2022: 27-46 - [i12]Ricardo M. Czekster, Roberto Metere, Charles Morisset:
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models. CoRR abs/2204.03676 (2022) - 2021
- [j8]Ricardo M. Czekster, Charles Morisset, John A. Clark, Sadegh Soudjani, Charalampos Patsios, Peter Davison:
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems. Secur. Priv. 4(3) (2021) - [c46]Ricardo M. Czekster, Charles Morisset:
BDMPathfinder: a tool for exploring attack paths in models defined by Boolean logic Driven Markov Processes. EDCC 2021: 83-86 - [i11]Roberto Metere, Myriam Neaimeh, Charles Morisset, Carsten Maple, Xavier J. A. Bellekens, Ricardo M. Czekster:
Securing the Electric Vehicle Charging Infrastructure. CoRR abs/2105.02905 (2021) - [i10]Luca Arnaboldi, Charles Morisset:
A Review of Intrusion Detection Systems and Their Evaluation in the IoT. CoRR abs/2105.08096 (2021) - [i9]Huda Ali Alatwi, Charles Morisset:
Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review. CoRR abs/2112.03315 (2021) - 2020
- [c45]John C. Mace, Ricardo Melo Czekster, Charles Morisset, Carsten Maple:
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations. EDCC 2020: 59-64
2010 – 2019
- 2019
- [j7]Charles Morisset, Tim A. C. Willemse, Nicola Zannone:
A framework for the extended evaluation of ABAC policies. Cybersecur. 2(1): 6 (2019) - [c44]Charles Morisset, Sowmya Ravidas, Nicola Zannone:
On Attribute Retrieval in ABAC. FPS 2019: 225-241 - [c43]Luca Arnaboldi, Ricardo M. Czekster, Charles Morisset, Roberto Metere:
Modelling Load-Changing Attacks in Cyber-Physical Systems. PASM 2019: 39-60 - [i8]Luca Arnaboldi, Charles Morisset:
Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT. CoRR abs/1901.08421 (2019) - [i7]Luca Arnaboldi, Ricardo M. Czekster, Roberto Metere, Charles Morisset:
Modelling Load-Changing Attacks in Cyber-Physical Systems. CoRR abs/1911.12757 (2019) - 2018
- [c42]Charles Morisset, David Sanchez:
VisABAC: A Tool for Visualising ABAC Policies. ICISSP 2018: 117-126 - [c41]Charles Morisset, David Sanchez:
On Building a Visualisation Tool for Access Control Policies. ICISSP (Revised Selected Papers) 2018: 215-239 - [c40]Charles Morisset, Tim A. C. Willemse, Nicola Zannone:
Efficient Extended ABAC Evaluation. SACMAT 2018: 149-160 - [c39]Luca Arnaboldi, Charles Morisset:
Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT. STAF Workshops 2018: 130-145 - [c38]Peter Carmichael, Thomas Groß, Charles Morisset:
Interventions over smart card swiping behaviour. STAST 2018: 2:1-2:11 - [c37]Peter Carmichael, Charles Morisset, Thomas Groß:
SHRUBS: simulating influencing human behaviour in security. STAST 2018: 6:1-6:11 - 2017
- [c36]John C. Mace, Nipun Balan Thekkummal, Charles Morisset, Aad van Moorsel:
ADaCS: A Tool for Analysing Data Collection Strategies. EPEW 2017: 230-245 - [c35]Peter Carmichael, Charles Morisset:
Learning Decision Trees from Synthetic Data Models for Human Security Behaviour. SEFM Workshops 2017: 56-71 - [c34]Luca Arnaboldi, Charles Morisset:
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems. STM 2017: 224-233 - [i6]Luca Arnaboldi, Charles Morisset:
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems. CoRR abs/1710.11021 (2017) - 2016
- [j6]Iryna Yevseyeva, Charles Morisset, Aad P. A. van Moorsel:
Modeling and analysis of influence power for information security decisions. Perform. Evaluation 98: 36-51 (2016) - [c33]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
WRAD: Tool Support for Workflow Resiliency Analysis and Design. SERENE 2016: 79-87 - [c32]Peter Carmichael, Charles Morisset, Thomas Groß:
Influence tokens: analysing adversarial behaviour change in coloured petri nets. STAST 2016: 29-40 - 2015
- [j5]Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic cost enforcement of security policies. J. Comput. Secur. 23(6): 759-787 (2015) - [c31]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Modelling user availability in workflow resiliency analysis. HotSoS 2015: 7:1-7:10 - [c30]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Impact of Policy Design on Workflow Resiliency Computation Time. QEST 2015: 244-259 - [c29]Jason Crampton, Charles Morisset, Nicola Zannone:
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. SACMAT 2015: 99-109 - [c28]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Resiliency Variance in Workflows with Choice. SERENE 2015: 128-143 - 2014
- [c27]Iryna Yevseyeva, Charles Morisset, Thomas Groß, Aad P. A. van Moorsel:
A Decision Making Model of Influencing Behavior in Information Security. EPEW 2014: 194-208 - [c26]John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Quantitative Workflow Resiliency. ESORICS (1) 2014: 344-361 - [c25]Charles Morisset, Thomas Groß, Aad P. A. van Moorsel, Iryna Yevseyeva:
Nudging for Quantitative Access Control Systems. HCI (24) 2014: 340-351 - [c24]Charles Morisset, Nicola Zannone:
Reduction of access control decisions. SACMAT 2014: 53-62 - [c23]Jason Crampton, Charles Morisset:
Monotonicity and Completeness in Attribute-Based Access Control. STM 2014: 33-48 - [c22]Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad P. A. van Moorsel:
A Formal Model for Soft Enforcement: Influencing the Decision-Maker. STM 2014: 113-128 - 2013
- [j4]Andreas Griesmayer, Zhiming Liu, Charles Morisset, Shuling Wang:
A framework for automated and certified refinement steps. Innov. Syst. Softw. Eng. 9(1): 3-16 (2013) - [c21]Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel:
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms. CD-ARES Workshops 2013: 321-336 - [c20]Suliman A. Alsuhibany, Charles Morisset, Aad P. A. van Moorsel:
Detection of attack strategies. CRiSIS 2013: 1-8 - [c19]Andreas Griesmayer, Charles Morisset:
Automated Certification of Authorisation Policy Resistance. ESORICS 2013: 574-591 - [c18]Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Charles Morisset:
Quantitative Evaluation of Enforcement Strategies - Position Paper. FPS 2013: 178-186 - [c17]Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic Cost Enforcement of Security Policies. STM 2013: 144-159 - [i5]Andreas Griesmayer, Charles Morisset:
Automated Certification of Authorisation Policy Resistance. CoRR abs/1306.4624 (2013) - 2012
- [c16]Ian M. Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo:
Risk-based security decisions under uncertainty. CODASPY 2012: 157-168 - [c15]Fabio Martinelli, Charles Morisset:
Quantitative access control with partially-observable Markov decision processes. CODASPY 2012: 169-180 - [c14]Peter Drábik, Fabio Martinelli, Charles Morisset:
A Quantitative Approach for Inexact Enforcement of Security Policies. ISC 2012: 306-321 - [c13]Fabio Martinelli, Ilaria Matteucci, Charles Morisset:
From Qualitative to Quantitative Enforcement of Security Policy. MMM-ACNS 2012: 22-35 - [c12]Jason Crampton, Charles Morisset:
PTaCL: A Language for Attribute-Based Access Control in Open Systems. POST 2012: 390-409 - [c11]Gianpiero Costantino, Charles Morisset, Marinella Petrocchi:
Subjective review-based reputation. SAC 2012: 2029-2034 - [c10]Peter Drábik, Fabio Martinelli, Charles Morisset:
Cost-Aware Runtime Enforcement of Security Policies. STM 2012: 1-16 - [i4]Jason Crampton, Charles Morisset:
Towards A Generic Formal Framework for Access Control Systems. CoRR abs/1204.2342 (2012) - [i3]Charles Morisset:
Implementing Access Control Markov Decision Processes with GLPK/GMPL. CoRR abs/1208.4722 (2012) - 2011
- [c9]Leanid Krautsevich, Fabio Martinelli, Charles Morisset, Artsiom Yautsiukhin:
Risk-Based Auto-delegation for Probabilistic Availability. DPM/SETOP 2011: 206-220 - [i2]Jason Crampton, Charles Morisset:
PTaCL: A Language for Attribute-Based Access Control in Open Systems. CoRR abs/1111.5767 (2011) - [i1]Andreas Griesmayer, Zhiming Liu, Charles Morisset, Shuling Wang:
A Framework for Automated and Certified Refinement Steps. CoRR abs/1112.0215 (2011) - 2010
- [j3]Bin Lei, Xuandong Li, Zhiming Liu, Charles Morisset, Volker Stolz:
Robustness testing for software components. Sci. Comput. Program. 75(10): 879-897 (2010) - [c8]Zhiming Liu, Charles Morisset, Shuling Wang:
A Graph-Based Implementation for Mechanized Refinement Calculus of OO Programs. SBMF 2010: 258-273 - [c7]Jason Crampton, Charles Morisset:
An Auto-delegation Mechanism for Access Control Systems. STM 2010: 1-16
2000 – 2009
- 2009
- [c6]Zhiming Liu, Charles Morisset, Volker Stolz:
rCOS: Theory and Tool for Component-Based Model Driven Development. FSEN 2009: 62-80 - [c5]Zhenbang Chen, Charles Morisset, Volker Stolz:
Specification and Validation of Behavioural Protocols in the rCOS Modeler. FSEN 2009: 387-401 - [p1]Miaomiao Zhang, Zhiming Liu, Charles Morisset, Anders P. Ravn:
Design and Verification of Fault-Tolerant Components. Methods, Models and Tools for Fault Tolerance 2009: 57-84 - 2008
- [j2]Mathieu Jaume, Charles Morisset:
Un cadre sémantique pour le contrôle d'accès. Tech. Sci. Informatiques 27(8): 951-976 (2008) - [c4]Lionel Habib, Mathieu Jaume, Charles Morisset:
A Formal Comparison of the Bell & LaPadula and RBAC Models. IAS 2008: 3-8 - [c3]Zhiming Liu, Charles Morisset, Volker Stolz:
A Component-Based Access Control Monitor. ISoLA 2008: 339-353 - [c2]Bin Lei, Zhiming Liu, Charles Morisset, Xuandong Li:
State Based Robustness Testing for Components. FACS 2008: 173-188 - 2007
- [b1]Charles Morisset:
Sémantique des systèmes de contrôle d'accès:Définition d'un cadre sémantique pour la spécification, l'implantation et la comparaison de modèles de contrôle d'accès. University of Namur, Belgium, 2007 - [j1]Julien Blond, Charles Morisset:
Un moniteur de référence sr d'une base de données. Tech. Sci. Informatiques 26(9): 1091-1110 (2007) - 2005
- [c1]Mathieu Jaume, Charles Morisset:
Formalisation and implementation of Access control models. ITCC (1) 2005: 703-708
Coauthor Index
aka: Aad van Moorsel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint