A survey of MulVAL extensions and their attack scenarios coverage

D Tayouri, N Baum, A Shabtai, R Puzis - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …

[HTML][HTML] Moving-target defense in depth: pervasive self-and situation-aware vm mobilization across federated clouds in presence of active attacks

Y Magdy, M Azab, A Hamada, MRM Rizk, N Sadek - Sensors, 2022 - mdpi.com
Federated clouds are interconnected cooperative cloud infrastructures offering vast hosting
capabilities, smooth workload migration and enhanced reliability. However, recent …

Dynamic vulnerability severity calculator for industrial control systems

P Cheimonidis, K Rantos - International Journal of Information Security, 2024 - Springer
The convergence of information and communication technologies has introduced new and
advanced capabilities to Industrial Control Systems. However, concurrently, it has …

A novel approach for attack tree to attack graph transformation

ND Schiele, O Gadyatskaya - … Conference on Risks and Security of Internet …, 2021 - Springer
Attack trees and attack graphs are both common graphical threat models used by
organizations to better understand possible cybersecurity threats. These models have been …

Graph models for Cybersecurity--A Survey

J Wachter - arXiv preprint arXiv:2311.10050, 2023 - arxiv.org
Graph models are helpful means of analyzing computer networks as well as complex system
architectures for security. In this paper we evaluate the current state of research for …

Streamlining Attack Tree Generation: A Fragment-Based Approach

I Pekaric, M Frick, JG Adigun, R Groner, T Witte… - arXiv preprint arXiv …, 2023 - arxiv.org
Attack graphs are a tool for analyzing security vulnerabilities that capture different and
prospective attacks on a system. As a threat modeling tool, it shows possible paths that an …

CyberEvo: evolutionary search of knowledge-based behaviors in a cyber attack campaign

S Moskal, E Hemberg, UM O'Reilly - Proceedings of the Genetic and …, 2022 - dl.acm.org
The ever-growing complexity of computer networks and advancement of cyber attack tactics
have made exhaustively searching for potential attack seqences within most networks …

Overview of Attack Graph Generation For Automotive Systems

MNE Saulaiman, M Kozlovszky… - 2022 IEEE 10th …, 2022 - ieeexplore.ieee.org
Modern vehicles of today integrate new services and advanced functionalities to bring
comfort and safety features to the driver and passengers. As these vehicles are connected to …

A hybrid threat model for system-centric and attack-centric for effective security design in SDLC

G Viswanathan - Web Intelligence, 2021 - content.iospress.com
Threat modeling is an essential activity in the security development lifecycle. To provide
security at the design phase of software development, Microsoft introduced threat modeling …

Dynamic Vulnerability Criticality Calculator for Industrial Control Systems

P Cheimonidis, K Rantos - arXiv preprint arXiv:2404.16854, 2024 - arxiv.org
The convergence of information and communication technologies has introduced new and
advanced capabilities to Industrial Control Systems. However, concurrently, it has …