[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2023 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …

Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

Systematic literature review of security event correlation methods

I Kotenko, D Gaifulina, I Zelichenok - Ieee Access, 2022 - ieeexplore.ieee.org
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …

Pentestgpt: An llm-empowered automatic penetration testing tool

G Deng, Y Liu, V Mayoral-Vilches, P Liu, Y Li… - arXiv preprint arXiv …, 2023 - arxiv.org
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …

Intrusion response systems for cyber-physical systems: A comprehensive survey

M Bashendy, A Tantawy, A Erradi - Computers & Security, 2023 - Elsevier
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …

A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities

D Levshun, I Kotenko - Artificial Intelligence Review, 2023 - Springer
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …

A key review on graph data science: The power of graphs in scientific studies

R Das, M Soylu - Chemometrics and Intelligent Laboratory Systems, 2023 - Elsevier
This comprehensive review provides an in-depth analysis of graph theory, various graph
types, and the role of graph visualization in scientific studies. Graphs serve as powerful tools …

A review on attack graph analysis for iot vulnerability assessment: challenges, open issues, and future directions

OSMBH Almazrouei, P Magalingam, MK Hasan… - IEEE …, 2023 - ieeexplore.ieee.org
Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of
the domain and the increasing complexity of security threats. This study aims to address the …

Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs

A Kazeminajafabadi, M Imani - Cybersecurity, 2023 - Springer
Early attack detection is essential to ensure the security of complex networks, especially
those in critical infrastructures. This is particularly crucial in networks with multi-stage …

Automated security risk identification using AutomationML-based engineering data

M Eckhart, A Ekelhart, E Weippl - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Systems integrators and vendors of industrial components need to establish a security-by-
design approach, which includes the assessment and subsequent treatment of security …