High-risk problem of penetration testing of power grid rainstorm disaster artificial intelligence prediction system and its countermeasures

Y Ye, J Guo, X Xu, Q Li, H Liu… - 2019 IEEE 3rd Conference …, 2019 - ieeexplore.ieee.org
System penetration testing is an important measure of discovering information system
security issues. This paper summarizes and analyzes the high-risk problems found in the …

Визуальный анализ защищенности компьютерных сетей

ИВ Котенко, ЕС Новикова - Информационно-управляющие …, 2013 - cyberleninka.ru
Исследуются методики визуального анализа защищенности компьютерных сетей.
Описывается компонент визуализации системы оценки защищенности компьютерной …

Intelligent security analysis of railway transport infrastructure components on the base of analytical modeling

I Kotenko, A Chechulin, M Bulgakov - … for Industry”(IITI'17) Volume 2, 2018 - Springer
To increase the level of security in control systems for railway infrastructure the paper
proposes to use the intelligent methods of security analysis based on analytic modeling of …

Оценивание защищенности информационных систем и реагирование на инциденты информационной безопасности с учетом текущей ситуации по …

ЕВ Дойникова - Материалы конференции" Информационные …, 2014 - elibrary.ru
Доклад посвящен проблеме реагирования на инциденты информационной
безопасности в информационных системах с учетом различной информации по …

Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis

Y Liao - Scalable Computing: Practice and Experience, 2024 - scpe.org
Insufficient communication attack defense capabilities within industrial control networks is a
serious problem that is addressed in this study. The author proposes a methodology that …

Security evaluation for cyber situational awareness

I Kotenko, E Doynikova - 2014 IEEE Intl Conf on High …, 2014 - ieeexplore.ieee.org
The paper considers techniques for measurement and calculation of security metrics taking
into account attack graphs and service dependencies. The techniques are based on several …

[图书][B] Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks

M Salfer - 2024 - books.google.com
Our lives depend on automotive cybersecurity, which protects us inside vehicles as well as
near them. If vehicles go rogue, they can operate against the driver's will and potentially …

[图书][B] RAGE: The rage attack graph engine

KA Cook - 2018 - search.proquest.com
Performing security analytics on modern networks is a difficult task. As networks grow larger
and more complex, the models become more difficult to accurately create. The potential …

Evaluation of SOA security metrics using attack graphs

J Magott, M Woda - 2008 Third International Conference on …, 2008 - ieeexplore.ieee.org
First, different security metrics are presented. A proposal of risk assessment for service
oriented architecture (SOA) is given. This proposal is based on service availability metrics …

Tool Support for Enterprise Architecture Analysis: with application in cyber security

M Buschle - 2014 - diva-portal.org
In today's companies, business processes and information technology are interwoven. Old
and new systems as well as off-the-shelf products and tailored solutions are used. This …