Gustavo Gonzalez Granadillo
Gustavo Gonzalez Granadillo
Atos Spain
Verified email at
Cited by
Cited by
Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures
G González-Granadillo, S González-Zarzosa, R Diaz
Sensors 21 (14), 4759, 2021
Botnets: lifecycle and taxonomy
N Hachem, Y Ben Mustapha, G Gonzalez Granadillo, H Debar
Conference on Network and Information Systems Security (SAR-SSI), 1-8, 2011
Botnets: lifecycle and taxonomy
HD Nabil Hachem, Yosra Ben Mustapha, Gustavo Gonzalez Granadillo
Conference on Network and Information Systems Security (SAR-SSI), 1-8, 2011
Decisive heuristics to differentiate legitimate from phishing sites
S Gastellier-Prevost, GG Granadillo, M Laurent
2011 conference on network and information systems security, 1-9, 2011
Dynamic risk management response system to handle cyber threats
G Gonzalez-Granadillo, S Dubus, A Motzek, J Garcia-Alfaro, E Alvarez, ...
Future Generation Computer Systems 83, 535-552, 2018
Individual countermeasure selection based on the return on response investment index
G Gonzalez Granadillo, H Débar, G Jacob, C Gaber, M Achemlal
Computer Network Security: 6th International Conference on Mathematical …, 2012
A dual approach to detect pharming attacks at the client-side
S Gastellier-Prevost, GG Granadillo, M Laurent
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
Choosing models for security metrics visualization
M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ...
Computer Network Security: 7th International Conference on Mathematical …, 2017
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index
G Gonzalez-Granadillo, J Garcia-Alfaro, E Alvarez, M El-Barbori, H Debar
Computers & Electrical Engineering 47, 13-34, 2015
RORI-based countermeasure selection using the OrBAC formalism
G Gonzalez Granadillo, M Belhaouane, H Debar, G Jacob
International journal of information security 13, 63-79, 2014
New types of alert correlation for security information and event management systems
GG Granadillo, M El-Barbori, H Debar
2016 8th IFIP international conference on new technologies, mobility and …, 2016
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities
G González-Granadillo, M Faiella, I Medeiros, R Azevedo, ...
Journal of Information Security and Applications 58, 102715, 2021
Automated cyber and privacy risk management toolkit
G Gonzalez-Granadillo, SA Menesidou, D Papamartzivanos, R Romeu, ...
Sensors 21 (16), 5493, 2021
An ontology-based model for siem environments
G Gonzalez Granadillo, Y Ben Mustapha, N Hachem, H Debar
International Conference on e-Democracy, 148-155, 2011
Selection of mitigation actions based on financial and operational impact assessments
GG Granadillo, A Motzek, J Garcia-Alfaro, H Debar
2016 11th International Conference on Availability, Reliability and Security …, 2016
Cybersecurity and privacy risk assessment of point-of-care systems in healthcare—a use case approach
M Jofre, D Navarro-Llobet, R Agulló, J Puig, G Gonzalez-Granadillo, ...
Applied Sciences 11 (15), 6699, 2021
Attack graph-based countermeasure selection using a stateful return on investment metric
G Gonzalez-Granadillo, E Doynikova, I Kotenko, J Garcia-Alfaro
Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018
An ontology-driven approach to model SIEM information and operations using the SWRL formalism
G Gonzalez Granadillo, Y Ben Mustapha, N Hachem, H Debar
International Journal of Electronic Security and Digital Forensics 7 4 (2-3 …, 2012
Enriching Threat Intelligence Platforms Capabilities.
M Faiella, GG Granadillo, I Medeiros, R Azevedo, SG Zarzosa
ICETE (2), 37-48, 2019
Combination approach to select optimal countermeasures based on the rori index
GG Granadillo, H Debar, L Coppolino
Second International Conference on the Innovative Computing Technology …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20