Critical infrastructure systems - for which high reliability and availab...
Attack trees (ATs) are a widely deployed modelling technique to categori...
Safety-critical infrastructures must operate in a safe and reliable way....
Numerous analysis methods for quantitative attack tree analysis have bee...
We consider the setting of publishing data without leaking sensitive
inf...
Attack trees are an important tool in security analysis, and an importan...
We consider data release protocols for data X=(S,U), where S is
sensitiv...
In the Open Data approach, governments and other public organisations wa...
We consider a database X⃗ = (X_1,...,X_n) containing the data of
n users...
When collecting information, local differential privacy (LDP) relieves t...
We present four lower bounds on the mean squared error of both frequency...
Local Differential Privacy (LDP) protocols allow an aggregator to obtain...
Local Differential Privacy (LDP) protects user privacy from the data
col...