Systematic review of SIEM technology: SIEM-SC birth

JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …

Review into state of the art of vulnerability assessment using artificial intelligence

S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

I Kalderemidis, A Farao, P Bountakas… - Proceedings of the 17th …, 2022 - dl.acm.org
Investments on cybersecurity are essential for organizations to protect operational activities,
develop trust relationships with clients, and maintain financial stability. A cybersecurity …

Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach

S Moskal, SJ Yang, ME Kuhl - The Journal of Defense …, 2018 - journals.sagepub.com
Existing research on cyber threat assessment focuses on analyzing the network
vulnerabilities and producing possible attack graphs. Cyber attacks in real-world enterprise …

CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection

E Doynikova, I Kotenko - 2017 25th Euromicro International …, 2017 - ieeexplore.ieee.org
The paper suggests several techniques for computer network risk assessment based on
Common Vulnerability Scoring System (CVSS) and attack modeling. Techniques use a set …

[HTML][HTML] Анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности при реализации целевых атак

И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей
кибербезопасности в интересах построения перспективной системы атрибуции при …

The CAPEC based generator of attack scenarios for network security evaluation

I Kotenko, E Doynikova - 2015 IEEE 8th International …, 2015 - ieeexplore.ieee.org
The paper proposes a technique and a software tool for generation of attack scenarios-
random sequences of attack patterns and appropriate sequences of security events. The …

Dynamical calculation of security metrics for countermeasure selection in computer networks

I Kotenko, E Doynikova - 2016 24th Euromicro International …, 2016 - ieeexplore.ieee.org
The paper considers the issue of countermeasures selection for ongoing computer network
attacks. The suggested technique is based on the countermeasure model that was defined …

[PDF][PDF] Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.

IV Kotenko, E Doynikova - J. Wirel. Mob. Networks Ubiquitous Comput …, 2014 - isyou.info
The paper is devoted to the security assessment problem. Authors suggest an approach to
the security assessment based on the attack graphs that can be implemented in …