• Home
  • University of Twente
  • Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS)
  • Stefano Maria Nicoletti
Stefano Maria Nicoletti

Stefano Maria Nicoletti
University of Twente | UT · Faculty of Electrical Engineering, Mathematics and Computer Science (EEMCS)

Master's Degree in Philosophy of Information. Theory and Management of Knowledge
PostDoc Researcher in Computer Science at the University of Twente (NL), working on Safety/(Cyber)security interactions

About

23
Publications
1,407
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
44
Citations

Publications

Publications (23)
Preprint
Full-text available
When considering risky events or actions, we must not downplay the role of involved objects: a charged battery in our phone averts the risk of being stranded in the desert after a flat tyre, and a functional firewall mitigates the risk of a hacker intruding the network. The Common Ontology of Value and Risk (COVER) highlights how the role of object...
Preprint
Full-text available
The landscape of cyber threats grows more complex by the day. Advanced Persistent Threats carry out systematic attack campaigns against which cybersecurity practitioners must defend. Examples of such organized attacks are operations Dream Job, Wocao, WannaCry or the SolarWinds Compromise. To evaluate which risks are most threatening, and which camp...
Chapter
Das performative und konzeptuelle Potenzial des menschlichen Körpers rückt seit der Mitte des 20. Jahrhunderts zunehmend in den Fokus künstlerischer Auseinandersetzung. Die Beiträger*innen des Bandes widmen sich kompositorischen und performativen Konzepten, in welchen der menschliche Körper nicht nur als Mittel zum Zweck der Klangerzeugung eingeset...
Chapter
Full-text available
Critical infrastructure systems—for which high reliability and availability are paramount—must operate securely. Attack trees (ATs) are hierarchical diagrams that offer a flexible modelling language used to assess how systems can be attacked. ATs are widely employed both in industry and academia but—in spite of their popularity—little work has been...
Article
Full-text available
Safety-critical infrastructures must operate safely and securely. Fault tree and attack tree analysis are widespread methods used to assess risks in these systems: fault trees (FTs) are required — among others — by the Federal Aviation Administration, the Nuclear Regulatory Commission, in the ISO26262 standard for autonomous driving and for softwar...
Preprint
Full-text available
Safety-critical infrastructures must operate in a safe and reliable way. Fault tree analysis is a widespread method used for risk assessment of these systems: fault trees (FTs) are required by, e.g., the Federal Aviation Administration and the Nuclear Regulatory Commission. In spite of their popularity, little work has been done on formulating stru...
Chapter
Full-text available
Safety-critical infrastructures must operate in a safe and reliable way. Fault tree analysis is a widespread method used for risk assessment of these systems: fault trees (FTs) are required by, e.g., the Federal Aviation Administration and the Nuclear Regulatory Commission. In spite of their popularity, little work has been done on formulating stru...
Chapter
Das performative und konzeptuelle Potenzial des menschlichen Körpers rückt seit der Mitte des 20. Jahrhunderts zunehmend in den Fokus künstlerischer Auseinandersetzung. Die Beiträger*innen des Bandes widmen sich kompositorischen und performativen Konzepten, in welchen der menschliche Körper nicht nur als Mittel zum Zweck der Klangerzeugung eingeset...
Preprint
Safety-critical infrastructures must operate safely and reliably. Fault tree analysis is a widespread method used to assess risks in these systems: fault trees (FTs) are required - among others - by the Federal Aviation Authority, the Nuclear Regulatory Commission, in the ISO26262 standard for autonomous driving and for software development in aero...
Article
Full-text available
In this paper, we present a critical stance towards what we call 'strong' conceptions of computational creativity (CC): after discarding theories that uphold the possibility of fully replicating the human mind – creativity included – through computational models, we will employ 'weak' conceptions of CC to investigate how our creativity works and ho...
Conference Paper
Full-text available
Safety-critical infrastructures must operate safely and reliably. Fault tree analysis is a widespread method used to assess risks in these systems: fault trees (FTs) are required - among others - by the Federal Aviation Authority, the Nuclear Regulatory Commission, in the ISO26262 standard for autonomous driving and for software development in aero...
Chapter
Full-text available
Emerging technologies, like self-driving cars, drones, and the Internet-of-Things must not impose threats to people, neither due to accidental failures (safety), nor due to malicious attacks (security). As historically separated fields, safety and security are often analyzed in isolation. They are, however, heavily intertwined: measures that increa...
Preprint
Full-text available
We survey the state-of-the-art on model-based formalisms for safety and security joint analysis, where safety refers to the absence of unintended failures, and security to absence of malicious attacks. We conduct a thorough literature review and - as a result - we consider fourteen model-based formalisms and compare them with respect to several cri...
Conference Paper
Full-text available
Can machines become truly creative? In this paper we argue that is not likely the case, basing our argumentation on the Chinese room argument by John Searle and on the philosophy of the body in Maurice Merleau-Ponty and Roland Barthes. Later on, we connect our ideas with contemporary findings in neuroscience, to give our claims more credibility. N...
Article
Full-text available
In this paper we aim to reflect upon the human-machine relationship in creative contexts and, more precisely, on some of the limits that machines present when we take creativity into consideration. In particular, we want to raise some concerns about the possibility that machines can genuinely instantiate intelligence as we understand it (the thesis...
Article
Full-text available
Could machines ever take our place in the creation of art, and particularly music? The outstanding results of some well-known AIs (e.g. EMI, Flow Machines) might make us believe that this is the case. However, despite this evidence it seems that machines present some intrinsic limits both in creative and non-creative contexts (already highlighted b...
Book
Full-text available
Human-Machine Collaboration in music, arts, and theory, has come to be a particularly challenging, provocative, and necessary topic. As we underlined in the Call for Papers, the theme of the issue highlighted our intention to give space to overcoming the deep-rooted dichotomy “human vs. machine” in the arts. In finding and understanding the flaws a...

Network

Cited By