[图书][B] An introduction to cyber modeling and simulation

JM Couretas - 2018 - books.google.com
Introduces readers to the field of cyber modeling and simulation and examines current
developments in the US and internationally This book provides an overview of cyber …

[图书][B] Cybersecurity: A Business Solution: An executive perspective on managing cyber risk

R Arnold - 2017 - books.google.com
As a business leader, you might think you have cybersecurity under control because you
have a great IT team. But managing cyber risk requires more than firewalls and good …

Cyber threat modeling: Survey, assessment, and representative framework

DJ Bodeau, CD McCollum, DB Fox - Mitre Corp, Mclean, 2018 - apps.dtic.mil
This report provides a survey of cyber threat modeling frameworks, presents a comparative
assessment of the surveyed frameworks, and extends an existing framework to serve as a …

Recommendations for model-driven paradigms for integrated approaches to cyber defense

M Lange, A Kott, N Ben-Asher, W Mees… - arXiv preprint arXiv …, 2017 - arxiv.org
The North Atlantic Treaty Organization (NATO) Exploratory Team meeting," Model-Driven
Paradigms for Integrated Approaches to Cyber Defense," was organized by the NATO …

Cyber Analysis and Targeting

JM Couretas - An Introduction to Cyber Analysis and Targeting, 2022 - Springer
The goal of this book is to describe cyber analysis and targeting for defensive applications.
One objective of developing a cyber analysis and targeting methodology is to add …

An overview of cyber attack and computer network operations simulation

SP Leblanc, A Partington, I Chapman… - Proceedings of the 2011 …, 2011 - dl.acm.org
This paper represents a snapshot of the current state of the art in the simulation and
modeling of cyber attacks and defensive responses to those. It discusses a number of …

Framing cyber warfare: an analyst's perspective

A Ween, P Dortmans, N Thakur… - The Journal of Defense …, 2019 - journals.sagepub.com
Understanding how new phenomenon impacts complex systems requires the capacity to
examine and characterize how the system might respond. A soft-systems approach to …

Cybersecurity risk: The business significance of ongoing tracking

SL Burton - … Interventions for Business, Technology, and Healthcare, 2023 - igi-global.com
Technology as the single solution to risk is outdated and enables cybersecurity incidents.
The no-involvement integrated focus on business and IT elements continues. Cyberattacks …

A cyber-based behavioral model

D Robinson, G Cybenko - The Journal of Defense Modeling …, 2012 - journals.sagepub.com
While long considered an important aspect of strategic and theater planning, situational
awareness (SA) is the linchpin to both cyber planning and execution. As stated in Joint …

[图书][B] The cyber risk handbook: Creating and measuring effective cybersecurity capabilities

D Antonucci - 2017 - books.google.com
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk
Handbook is the practitioner's guide to implementing, measuring and improving the counter …