Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools

E Ruijters, M Stoelinga - Computer science review, 2015 - Elsevier
Fault tree analysis (FTA) is a very prominent method to analyze the risks related to safety
and economically critical assets, like power plants, airplanes, data centers and web shops …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey of approaches combining safety and security for industrial control systems

S Kriaa, L Pietre-Cambacedes, M Bouissou… - Reliability engineering & …, 2015 - Elsevier
The migration towards digital control systems creates new security threats that can endanger
the safety of industrial infrastructures. Addressing the convergence of safety and security …

[HTML][HTML] STPA-SafeSec: Safety and security analysis for cyber-physical systems

I Friedberg, K McLaughlin, P Smith, D Laverty… - Journal of information …, 2017 - Elsevier
Cyber-physical systems tightly integrate physical processes and information and
communication technologies. As today's critical infrastructures, eg, the power grid or water …

A meta language for threat modeling and attack simulations

P Johnson, R Lagerström, M Ekstedt - Proceedings of the 13th …, 2018 - dl.acm.org
Attack simulations may be used to assess the cyber security of systems. In such simulations,
the steps taken by an attacker in order to compromise sensitive system assets are traced …

Intrusion response systems for cyber-physical systems: A comprehensive survey

M Bashendy, A Tantawy, A Erradi - Computers & Security, 2023 - Elsevier
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …

Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

[HTML][HTML] Cyber security in the nuclear industry: A closer look at digital control systems, networks and human factors

A Ayodeji, M Mohamed, L Li, A Di Buono… - Progress in Nuclear …, 2023 - Elsevier
The development life cycle of conventional nuclear power plants (NPPs) needs to be
optimized if the energy produced by advanced reactors and small modular reactors is to be …

[HTML][HTML] The meta attack language-a formal description

W Wideł, S Hacks, M Ekstedt, P Johnson… - Computers & …, 2023 - Elsevier
Nowadays, IT infrastructures are involved in making innumerable aspects of our lives
convenient, starting with water or energy distribution systems, and ending with e-commerce …

[HTML][HTML] Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs

MHR Khouzani, Z Liu, P Malacaria - European Journal of Operational …, 2019 - Elsevier
We present a framework to efficiently solve a multi-objective optimisation problem for cyber-
security defence. Facing an attacker who can mount a multi-stage attack (modelled using …