S. Attack-graph-engine-technologies and .. , 134 7.3 Information system network topology for simulations, p.137

H. Sensibilité-des-résultats-du, .. En-fonction-de-ses-paramètres, H. Arnold, R. Hermanns, M. Pulungan et al., Timedependent analysis of attacks, Principles of Security and Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, pp.181-285, 2014.

S. Massimiliano-albanese, S. Jajodia, and . Noel, Time-efficient and costeffective network hardening using attack graphs, 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.1-12, 2012.

Q. Althebyan and B. Panda, A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack, IFIP International Information Security Conference, pp.557-571, 2008.
DOI : 10.1007/978-0-387-09699-5_36

M. Lyle and A. , NetSPA: A Network Security Planning Architecture, 2002.

P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586140

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Axelsson, Intrusion detection systems: A survey and taxonomy, 2000.

Z. Saman-aliari, Game-theoretic intrusion response and recovery, 2012.

H. Monowar, D. Bhuyan, J. Kumar-bhattacharyya, and . Kumar-kalita, Network anomaly detection: methods, systems and tools, Communications Surveys & Tutorials IEEE, vol.16, issue.1, pp.303-336, 2014.

H. Birkholz, S. Edelkamp, F. Junge, and K. Sohr, Efficient automated generation of attack trees from vulnerability databases, Working Notes for the 2010 AAAI Workshop on Intelligent Security (SecArt), pp.47-55, 2010.

P. Brooke and R. Paige, Fault trees for security system design and analysis, Computers & Security, vol.22, issue.3, 2003.
DOI : 10.1016/S0167-4048(03)00313-4

F. Cuppens, F. Autrel, Y. Bouzida, J. Garcia, S. Gombault et al., Anti-correlation as a criterion to select appropriate countermeasures in an intrusion detection framework, Annales des télécommunications, pp.197-217, 2006.

C. Carver, Intrusion Response Systems: A Survey, 2000.

H. Cavusoglu, J. Cavusoglu, and . Zhang, Security patch management: Share the burden or share the damage? Management Science, pp.657-670, 2008.
DOI : 10.1287/mnsc.1070.0794

M. Cremonini and P. Martini, Evaluating information security investments from attackers perspective: the return-on-attack (ROA), Fourth Workshop on the Economics of Information Security, pp.800-830, 2005.

R. Cole, Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty, 2013.

C. W. Chang, D. R. Tsai, and J. M. Tsai, A cross-site patch management model and architecture design for large scale heterogeneous environment, Security Technology , 2005. CCST'05. 39th Annual 2005 International Carnahan Conference on, pp.41-46, 2005.

S. Ahmet, C. , and B. Yener, Modeling and detection of complex attacks, 3rd International Conference on Security and Privacy in Communications Networks and the Workshops -SecureComm 2007, pp.234-243, 2007.

R. Dantu, K. Loper, and P. Kolan, Risk management using behavior based attack graphs, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., pp.445-449, 2004.
DOI : 10.1109/ITCC.2004.1286496

G. Dalton, R. Mills, R. Colombi, and . Raines, Analyzing Attack Trees using Generalized Stochastic Petri Nets. Information Assurance Workshop, 2006.
DOI : 10.1109/iaw.2006.1652085

L. Demetz, R. Maier, M. Manhart, H. Plate, and M. Fitz, D1.7 -final project evaluation, PoSecCo European Project from the 7th Framework, p.2013

R. Dewri, N. Poolsappasit, I. Ray, and D. Whitley, Optimal security hardening using multi-objective optimization on attack tree models of networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.204-213, 2007.
DOI : 10.1145/1315245.1315272

J. Marek and . Druzdzel, Smile: Structural modeling, inference, and learning engine and genie: a development environment for graphical decision-theoretic models, Aaai/Iaai, pp.902-903, 1999.

O. M. Dahl, D. Stephen, and . Wolthusen, Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets, Fourth IEEE International Workshop on Information Assurance (IWIA'06), pp.12-168, 2006.
DOI : 10.1109/IWIA.2006.17

M. Frigault and L. Wang, Measuring network security using bayesian networkbased attack graphs, COMPSAC '08. 32nd Annual IEEE International, pp.698-703, 2008.
DOI : 10.1109/compsac.2008.88

URL : http://spectrum.library.concordia.ca/979259/1/MR67114.pdf

M. Frigault, L. Wang, A. Singhal, and S. Jajodia, Measuring network security using dynamic bayesian network, Proceedings of the 4th ACM workshop on Quality of protection, QoP '08, pp.23-30, 2008.
DOI : 10.1145/1456362.1456368

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Gdj-+-12-]-gustavo-gonzalez-granadillo, G. Débar, C. Jacob, M. Gaber, and . Achemlal, Individual countermeasure selection based on the return on response investment index, Computer Network Security, pp.156-170, 2012.

G. Gonzalez-granadillo, G. Jacob, H. Debar, and L. Coppolino, Combination approach to select optimal countermeasures based on the rori index, Second International Conference on Innovative Computing Technology, pp.38-45, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00788696

E. Godefroy, E. Totel, M. Hurfin, and F. Majorczyk, Automatic generation of correlation rules to detect complex attack scenarios, 2014 10th International Conference on Information Assurance and Security, pp.23-28, 2014.
DOI : 10.1109/ISIAS.2014.7064615

URL : https://hal.archives-ouvertes.fr/hal-01091385

H. Matthew, . Henry, M. Ryan, . Layer, R. David et al., Coupled petri nets for computer network risk analysis, International Journal of Critical Infrastructure Protection, vol.3, issue.2, pp.67-75, 2010.

R. Terrance and . Ingoldsby, Attack tree-based threat risk analysis, Amenaza Technologies Ltd. Copyright, 2009.

K. Jensen, Coloured petri nets. Petri nets: central models and their properties, pp.248-299, 1987.
DOI : 10.1007/bfb0046842

R. Jhawar, B. Kordy, S. Mauw, S. Radomirovi?, and R. Trujillo-rasua, Attack Trees with Sequential Conjunction, ICT Systems Security and Privacy Protection, pp.339-353, 2015.
DOI : 10.1007/978-3-319-18467-8_23

URL : https://hal.archives-ouvertes.fr/hal-01197256

S. Jajodia and S. Noel, Advanced cyber attack modeling analysis and visualization, 2010.

. Jajodia, . Noel, . Kalapa, J. Albanese, and . Williams, Cauldron mission-centric cyber situational awareness with defense in depth, 2011, MILCOM 2011 Military Communications Conference, pp.1339-1344, 2011.
DOI : 10.1109/MILCOM.2011.6127490

S. Jajodia, B. Noel, and . Berry, Topological analysis of network attack vulnerability . Managing Cyber Threats, pp.247-266, 2005.

N. Kanoun, F. Cuppens-boulahia, S. Cuppens, A. Dubus, and . Martin, Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems, 2009 International Conference on Computational Science and Engineering, pp.83-91, 2009.
DOI : 10.1109/CSE.2009.233

N. Kheir and N. Cuppens-boulahia, Frédéric Cuppens, and Hervé Debar. A Service Dependency Model for Cost-Sensitive Intrusion Response, Computer Security ? ESORICS 2010, pp.626-642, 2010.

. Kheir, . Debar, F. Cuppens-boulahia, J. Cuppens, and . Viinikka, Cost evaluation for intrusion response using dependency graphs, Network and Service Security, pp.1-6, 2009.

H. Kheir, N. Debar, F. Cuppens-boulahia, J. Cuppens, and . Viinikka, Cost evaluation for intrusion response using dependency graphs, Network and Service Security N2S'09. International Conference on, pp.1-6, 2009.

P. Kijsanayothin and R. Hewett, Analytical Approach to Attack Graph Analysis for Network Security, 2010 International Conference on Availability, Reliability and Security, pp.25-32, 2010.
DOI : 10.1109/ARES.2010.21

N. Kheir, Response Policies and Counter-measure: Management of Service Dependencies and Intrusion and Reaction Impacts, 2010.

R. Kissel, Glossary of key information security terms, NIST Interagency Reports NIST IR, vol.7298, issue.3, 2013.

T. Do-hoon-kim, H. Lee, and . In, Effective security safeguard selection process for return on security investment, Asia-Pacific Services Computing Conference, pp.668-673, 2008.

B. Kordy, L. Piètre-cambacédès, and P. Schweitzer, DAG-based attack and defense modeling: Don???t miss the forest for the attack trees, Computer Science Review, vol.13, issue.14, 2013.
DOI : 10.1016/j.cosrev.2014.07.001

M. Kiviharju, T. Venäläinen, and S. Kinnunen, Towards Modelling Information Security with Key-Challenge Petri Nets, 14th Nordic Conference on Secure IT Systems, pp.190-206, 2009.
DOI : 10.1016/j.comnet.2006.05.008

R. Lippmann and K. Ingols, An annotated review of past papers on attack graphs, 2005.

Y. Liu and H. Man, Network vulnerability assessment using Bayesian networks. Defense and Security, 2005.
DOI : 10.1117/12.604240

L. Steffen, . Lauritzen, J. David, and . Spiegelhalter, Local computations with probabilities on graphical structures and their application to expert systems, Journal of the Royal Statistical Society, 1988.

M. Mcqueen, W. Boyer, M. Flynn, and G. Beitel, Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), p.226, 2006.
DOI : 10.1109/HICSS.2006.405

C. Mehta, H. Bartzis, E. Zhu, J. Clarke, and . Wing, Ranking Attack Graphs, Recent advances in intrusion detection, pp.127-144, 2006.
DOI : 10.1007/11856214_7

J. Mcdermott, Attack net penetration testing, Proceedings of the 2000 workshop on New security paradigms , NSPW '00, pp.15-21, 2000.
DOI : 10.1145/366173.366183

[. Meadows, A representation of protocol attacks for risk assessment, Proceedings of the DIMACS Workshop on Network, 1998.

B. Morin, L. Mé, H. Debar, and M. Ducasséc, M4D4: a Logical Framework to Support Alert Correlation in Intrusion Detection, 2009.

S. Mauw and M. Oostdijk, Foundations of Attack Trees, ICISC'05: Proceedings of the 8th international conference on Information Security and Cryptology, 2005.
DOI : 10.1007/11734727_17

E. Miehling, M. Rasouli, and D. Teneketzis, Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs, Proceedings of the Second ACM Workshop on Moving Target Defense, MTD '15, pp.67-76, 2015.
DOI : 10.1145/2808475.2808482

C. Mu, B. Shuai, and H. Liu, Analysis of Response Factors in Intrusion Response Decision-Making, 2010 Third International Joint Conference on Computational Science and Optimization, pp.395-399, 2010.
DOI : 10.1109/CSO.2010.30

Y. Nunez, F. Gustavson, F. Grossman, and C. Tappert, Designing a distributed patch management security system, Information Society 2010 International Conference on, pp.162-167, 2010.

S. Noel and S. Jajodia, Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs, Journal of Network and Systems Management, vol.45, issue.4, 2008.
DOI : 10.1007/s10922-008-9109-x

S. Noel and S. Jajodia, Proactive intrusion prevention and response via attack graphs, 2009.

S. Noel, S. Jajodia, B. O. Berry, and M. Jacobs, Efficient minimumcost network hardening via exploit dependency graphs, Computer security applications conference, 2003. proceedings. 19th annual, pp.86-95, 2003.
DOI : 10.1109/csac.2003.1254313

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

X. Ou, F. Wayne, . Boyer, A. Miles, and . Mcqueen, A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.336-345, 2006.
DOI : 10.1145/1180405.1180446

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

X. Ou, A. Govindavajhala, and . Appel, Mulval: A logic-based network security analyzer, Proceedings of the 14th conference on USENIX Security Symposium, pp.8-8, 2005.

X. Ou, A. Govindavajhala, and . Appel, Mulval: A logic-based network security analyzer, USENIX Security Symposium, 2005.

S. Paul, Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study, Electronic Proceedings in Theoretical Computer Science, vol.148, 2014.
DOI : 10.4204/EPTCS.148.3

L. Piètre-cambacédès and M. Bouissou, Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP), 2010 European Dependable Computing Conference, pp.199-208, 2010.
DOI : 10.1109/EDCC.2010.32

N. Poolsappasit, R. Dewri, and I. Ray, Dynamic security risk management using bayesian attack graphs. Dependable and Secure Computing, 2012.
DOI : 10.1109/tdsc.2011.34

J. Pearl, Evidential reasoning using stochastic simulation of causal models, Artificial Intelligence, vol.32, issue.2, 1987.
DOI : 10.1016/0004-3702(87)90012-9

J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference, 1988.

S. Pudar, C. Manimaran, and . Liu, PENET: A practical method and tool for integrated modeling of security attacks and countermeasures, Computers & Security, vol.28, issue.8, pp.754-771, 2009.
DOI : 10.1016/j.cose.2009.05.007

J. Pearl and S. Russell, Bayesian networks, 1998.

C. Phillips and L. P. Swiler, A graph-based system for networkvulnerability analysis, the 1998 workshop, pp.71-79, 1998.

X. Qin and W. Lee, Attack plan recognition and prediction using causal networks, Computer Security Applications Conference 20th Annual, pp.370-379, 2004.

M. Roesch, Snort: Lightweight intrusion detection for networks, LISA, pp.229-238, 1999.

I. Ray and N. Poolsapassit, Using Attack Trees to Identify Malicious Attacks from Authorized Insiders, ESORICS'05: Proceedings of the 10th European conference on Research in Computer Security, 2005.
DOI : 10.1007/11555827_14

W. Sonnenreich, J. Albanese, and B. Stout, Return on security investment (ROSI)-A practical quantitative model, Journal of Research and Practice in Information Technology, vol.38, issue.1, pp.45-56, 2006.

[. Stakhanova, J. Basu, and . Wong, A Cost-Sensitive Model for Preemptive Intrusion Response Systems, 21st International Conference on Advanced Networking and Applications (AINA '07), pp.428-435, 2007.
DOI : 10.1109/AINA.2007.9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

N. Stakhanova, J. Basu, and . Wong, A taxonomy of intrusion response systems, International Journal of Information and Computer Security, vol.1, issue.1/2, pp.169-184, 2007.
DOI : 10.1504/IJICS.2007.012248

N. Stakhanova, J. Basu, and . Wong, A taxonomy of intrusion response systems, International Journal of Information and Computer Security, vol.1, issue.1/2, pp.169-184, 2007.
DOI : 10.1504/IJICS.2007.012248

B. Schneier, Attack Trees. Dr. Dobb's, Journal, 1999.

S. Général-de-la-défense-nationale, EBIOS -Expression of Needs and Identification of Security Objectives, 2004.

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002.
DOI : 10.1109/SECPRI.2002.1004377

R. Schuppenies, C. Meinel, and F. Cheng, Automatic extraction of vulnerability information for attack graphs. Hasso-Plattner-Institute for, 2009.

R. Sawilla and X. Ou, Identifying Critical Attack Assets in Dependency Attack Graphs, 2008.
DOI : 10.1145/1052934.1052938

P. Laura, C. Swiler, D. Phillips, S. Ellis, and . Chakerian, Computerattack graph generation tool, DARPA Information Survivability Conference & Exposition II, 2001. DISCEX'01. Proceedings, pp.307-321, 2001.

C. Strasburg, . Stakhanova, J. Basu, and . Wong, Intrusion response cost assessment methodology, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.388-391, 2009.
DOI : 10.1145/1533057.1533112

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

[. Shameli-sendi, N. Ezzati-jivan, and M. Jabbarifar, Intrusion response systems: survey and taxonomy. SIGMOD, 2012.

X. Sun, A. Singhal, and P. Liu, Who Touched My Mission, Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig '15, pp.21-26, 2015.
DOI : 10.1145/2809826.2809834

V. Shandilya, C. B. Simmons, and S. Shiva, Use of Attack Graphs in Security Systems, Journal of Computer Networks and Communications, vol.5283, issue.1, 2014.
DOI : 10.1109/TDSC.2013.24

C. Tucker, S. Furnell, . Ghita, P. Bv, and . Brooke, A new taxonomy for comparing intrusion detection systems, Internet Research, vol.17, issue.1, pp.88-98, 2007.
DOI : 10.1108/10662240710730515

S. Tanachaiwiwat, Y. Hwang, and . Chen, Adaptive intrusion response to minimize risk over multiple network attacks, ACM Trans on Information and System Security, 2002.

T. Toth and C. Kruegel, Evaluating the impact of automated intrusion response mechanisms, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp.301-310, 2002.
DOI : 10.1109/CSAC.2002.1176302

Y. Wu, B. Foo, Y. Mao, S. Bagchi, and E. H. Spafford, Automated adaptive intrusion containment in systems of interacting services, Computer Networks, vol.51, issue.5, pp.1334-1360, 2007.
DOI : 10.1016/j.comnet.2006.09.006

D. Stjohn and D. White, Limiting Vulnerability Exposure through effective Patch Management: threat mitigation through vulnerability remediation, 2006.

L. Wang, S. Noel, and S. Jajodia, Minimum-cost network hardening using attack graphs, Computer Communications, vol.29, issue.18, pp.3812-3824, 2006.
DOI : 10.1016/j.comcom.2006.06.018

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Wu, Achieving high survivability in distributed systems through automated response, 2009.

Z. Wu, D. Xiao, H. Xu, X. Peng, and X. Zhuang, Automated Intrusion Response Decision Based on the Analytic Hierarchy Process, 2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop, pp.574-577, 2008.
DOI : 10.1109/KAMW.2008.4810553

S. Wang, Z. Zhang, and Y. Kadobayashi, Exploring attack graph for cost-benefit security hardening: A probabilistic approach, Computers & Security, vol.32, pp.158-169, 2013.
DOI : 10.1016/j.cose.2012.09.013

J. H. Peng-xie, X. Li, P. Ou, R. Liu, and . Levy, Using Bayesian networks for cyber security analysis, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp.211-220, 2010.
DOI : 10.1109/DSN.2010.5544924

. Yager, OWA trees and their role in security modeling using attack trees, Information Sciences, vol.176, issue.20, pp.27-27, 2006.
DOI : 10.1016/j.ins.2005.08.004

H. [. Zonouz, W. H. Khurana, T. M. Sanders, and . Yardley, Rre: A game-theoretic intrusion response and recovery engine, Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on, pp.439-448, 2009.
DOI : 10.1109/tpds.2013.211

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Zhu, Y. Liu, X. Yang, and X. Sun, Dynamic game based intrusion response model, Journal of Computational Information Systems, pp.2199-2211, 2010.

F. Aguessy, L. Gaspard, O. Bettan, and V. Conan, Remediating Logical Attack Paths Using Information System Simulated Topologies, Computer & Electronics Security Applications Rendez-vous 2014, pp.187-203, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01144971

[. Aguessy, O. Bettan, R. Dobigny, C. Laudy, G. Lortal et al., Adjustable Fusion to Support Cyber Security Operators, Human Aspects of Information Security, Privacy , and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015. Proceedings, pp.143-153, 2015.
DOI : 10.1007/978-3-319-20376-8_13

URL : https://hal.archives-ouvertes.fr/hal-01191516

G. [. Mathieu, W. Doyen, T. Mallouli, O. Silverston, F. Bettan et al., Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment, 2015 10th International Conference on Availability, Reliability and Security, pp.741-748, 2015.
DOI : 10.1109/ARES.2015.71

F. Reynaud, F. Aguessy, O. Bettan, M. Bouet, and V. Conan, Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art, 2016 IEEE NetSoft Conference and Workshops (NetSoft), p.2016, 2016.
DOI : 10.1109/NETSOFT.2016.7502487

URL : https://hal.archives-ouvertes.fr/hal-01393740

[. Aguessy, O. Bettan, G. Blanc, V. Conan, H. Debar et al., Hybrid Risk Assessment Model based on Bayesian Networks Contributions to collaborative projects, 11th International Workshop on Security, IWSEC 2016 D1.1 -Virtualization Techniques: Analysis and Selection. DOCTOR project, 2014.

]. P. Doc1621, B. Truong, F. Mathieu, F. Aguessy, T. Reynaud et al., D2.1 -Security analysis of the virtualized NDN architecture. DOCTOR project

. Vir1531, . Virtualis, and . Consortium, D3.1 -Spécifications techniques du module d'analyses de risques. VIRTUALIS project, FUI 15, 2015.

. Vir1632, . Virtualis, and . Consortium, D3.2 -Briques logicielles d'analyse de risques adaptées à la sécurité physique/logique. VIRTUALIS project, FUI 15

F. The and . Consortium, D.8.1.3: GE Open Specifications. FI-WARE: Future Internet Core Platform, European Project from the 7th Framework Program, as part of the Future Internet Public-Private Partnership Programme (FI-PPP), p.285248, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00765816

F. The and . Consortium, 3: SW Release (version of components delivered for integration in testbed) FI-WARE: Future Internet Core Platform, European Project from the 7th Framework Program, as part of the Future Internet Public-Private Partnership Programme (FI-PPP), p.285248, 2014.

F. The and . Consortium, D.8.3.3: Installation and Administration Guide. FI- WARE: Future Internet Core Platform, European Project from the 7th Framework Program, as part of the Future Internet Public-Private Partnership Programme (FI-PPP), p.285248, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00765816

F. The and . Consortium, 3: User and Programmers Guide. FI-WARE: Future Internet Core Platform, European Project from the 7th Framework Program, as part of the Future Internet Public-Private Partnership Programme (FI-PPP) Project reference, Future Internet Core Platform, European Project from the 7th Framework Program, as part of the Future Internet Public-Private Partnership Programme (FI-PPP), p.285248, 2014.

F. [. Cao and P. Aguessy, Bisson Poster -FI-WARE Security Monitoring Generic Enabler Demonstrator, Trust in the Digital World (TDW), 2015.