Dependability and Security Evaluation of Computer-based Systems (6 ECTS)

The purpose of this course is to present the main concepts and techniques that are commonly used to evaluate the dependability and security of computing systems. Both accidental and malicious threats are addressed considering model-based and experimental evaluation approaches. Examples of applications and case studies are presented for illustration.


Suggested readings:

D. P. Siewiorek and R. Swartz: Reliable Computer Systems, Design and Evaluation, Third Edition, A. K. Peters, Ltd, 1998.

K. Trivedi: Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd Edition, John Willey & Sons, New York, 2001. Slides available at

M. Ajmone Marsan, G. Balbo, G. Conte, S. Donatelli and G. Franceschinis: Modelling with Generalized Stochastic Petri Nets, John Wiley and Sons. Freely available at:

N. Provos, T. Holz: Virtual Honeypots - From Botnets Tracking to Intrusion Detection, Addison Wesley, 2007

ReSIST Courseware  (right click and select "Save as" to download)

Courseware examples and locations where taught:

Parts of the courseware proposed here are taught at the following schools:

Line of teaching

View this course in the RKBExplorer

Back to MSc Curriculum.