Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications

RV Yohanandhan, RM Elavarasan, P Manoharan… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention
across academia, government, and industry sectors and covers a wide range of applications …

Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

CRUSOE: A toolset for cyber situational awareness and decision support in incident handling

M Husák, L Sadlek, S Špaček, M Laštovička… - Computers & …, 2022 - Elsevier
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …

Alert-driven attack graph generation using s-pdfa

A Nadeem, S Verwer, S Moskal… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …

Survey of attack graph analysis methods from the perspective of data and knowledge processing

J Zeng, S Wu, Y Chen, R Zeng… - Security and …, 2019 - Wiley Online Library
Attack graph can simulate the possible paths used by attackers to invade the network. By
using the attack graph, the administrator can evaluate the security of the network and …

Bayesian decision network-based security risk management framework

M Khosravi-Farmad, A Ghaemi-Bafghi - Journal of Network and Systems …, 2020 - Springer
Network security risk management is comprised of several essential processes, namely risk
assessment, risk mitigation and risk validation and monitoring, which should be done …

A2G2V: Automatic attack graph generation and visualization and its applications to computer and SCADA networks

AT Al Ghazo, M Ibrahim, H Ren… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Securing cyber-physical systems (CPS) and Internet of Things (IoT) systems requires the
identification of how interdependence among existing atomic vulnerabilities may be …

A review in recent development of network threats and security measures

R Dastres, M Soori - International Journal of Information Sciences and …, 2021 - hal.science
Networks are vulnerable devices due to their basic feature of facilitating remote access and
data communication. The information in the networks needs to be kept secured and safe in …

Automated security risk identification using AutomationML-based engineering data

M Eckhart, A Ekelhart, E Weippl - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Systems integrators and vendors of industrial components need to establish a security-by-
design approach, which includes the assessment and subsequent treatment of security …

Including insider threats into risk management through Bayesian threat graph networks

N d'Ambrosio, G Perrone, SP Romano - Computers & Security, 2023 - Elsevier
Cybersecurity incidents do represent a serious danger for companies. In fact, the number of
cyber crimes is exponentially growing in a scenario where the global COVID-19 pandemic …