P Cheimonidis, K Rantos - International Journal of Information Security, 2024 - Springer
The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However, concurrently, it has …
ND Schiele, O Gadyatskaya - … Conference on Risks and Security of Internet …, 2021 - Springer
Attack trees and attack graphs are both common graphical threat models used by organizations to better understand possible cybersecurity threats. These models have been …
Graph models are helpful means of analyzing computer networks as well as complex system architectures for security. In this paper we evaluate the current state of research for …
Attack graphs are a tool for analyzing security vulnerabilities that capture different and prospective attacks on a system. As a threat modeling tool, it shows possible paths that an …
The ever-growing complexity of computer networks and advancement of cyber attack tactics have made exhaustively searching for potential attack seqences within most networks …
Modern vehicles of today integrate new services and advanced functionalities to bring comfort and safety features to the driver and passengers. As these vehicles are connected to …
G Viswanathan - Web Intelligence, 2021 - content.iospress.com
Threat modeling is an essential activity in the security development lifecycle. To provide security at the design phase of software development, Microsoft introduced threat modeling …
P Cheimonidis, K Rantos - arXiv preprint arXiv:2404.16854, 2024 - arxiv.org
The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However, concurrently, it has …