Security modeling and quantification of intrusion tolerant systems using attack‐response graph

BB Madan, KS Trivedi - Journal of High Speed Networks, 2004 - content.iospress.com
Increasing deployment of computer systems in critical applications has made study and
quantifiable analysis of the security aspects of these systems an important issue. Security …

Using strategy objectives for network security analysis

E Bursztein, JC Mitchell - International Conference on Information Security …, 2009 - Springer
The anticipation game framework is an extension of attack graphs based on game theory. It
is used to anticipate and analyze intruder and administrator concurrent interactions with the …

Arcades: analysis of risk from cyberattack against defensive strategies for the power grid

M Touhiduzzaman, A Hahn… - IET Cyber‐Physical …, 2018 - Wiley Online Library
In this study, the authors introduce ARCADES (Analysis of Risk from Cyberattack against
DEfensive Strategy), a technique to systematically explore the cybersecurity defence …

Development of an instrument for the assessment of scenarios of work 4.0 based on socio-technical criteria

S Jenderny, M Foullois, AL Kato-Beiderwieden… - Proceedings of the 11th …, 2018 - dl.acm.org
The mechanical engineering and related industries are increasingly being dominated by
information and communication technology, leading to the development of cyber-physical …

[PDF][PDF] An ant colony optimization algorithm for network vulnerability analysis

M Abadi, S Jalili - Iran. J. Electr. Electron. Eng, 2006 - scholar.archive.org
Intruders often combine exploits against multiple vulnerabilities in order to break into the
system. Each attack scenario is a sequence of exploits launched by an intruder that leads to …

Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks

JH Cho, R Chen - Performance Evaluation, 2011 - Elsevier
We develop a mathematical model to quantitatively analyze a scalable region-based
hierarchical group key management protocol integrated with intrusion detection to deal with …

[引用][C] 网络安全评估方法研究进展

徐玮晟, 张保稳, 李生红 - 信息安全与通信保密, 2009

Enhancement of probabilistic attack graphs for accurate cyber security monitoring

E Doynikova, I Kotenko - … & Communications, Cloud & Big Data …, 2017 - ieeexplore.ieee.org
Timely and adequate response on the computer security incidents depends on the accurate
monitoring of the security situation. The paper investigates the task of refinement of the …

[PDF][PDF] A trend analysis of vulnerabilities

R Gopalakrishna, EH Spafford… - West Lafayette: Purdue …, 2005 - cerias.purdue.edu
Software vulnerabilities exist and will continue to do so. Every week, a new vulnerability
gains popular attention, is discussed at length in mailing lists, and hopefully gets patched by …

Development of a change management instrument for the implementation of technologies

L Mlekus, A Paruzel, D Bentler, S Jenderny, M Foullois… - Technologies, 2018 - mdpi.com
The manufacturing industry is increasingly being dominated by information and
communication technology, leading to the development of cyber-physical systems. Most …