Huma: A multi-layer framework for threat analysis in a heterogeneous log environment

J Navarro, V Legrand, S Lagraa, J François… - … and Practice of Security …, 2018 - Springer
The advent of massive and highly heterogeneous information systems poses major
challenges to professionals responsible for IT security. The huge amount of monitoring data …

Goal-oriented co-engineering of security and safety requirements in cyber-physical systems

C Ponsard, G Dallons, P Massonet - International Conference on …, 2016 - Springer
Many safety critical systems are integrating more and more software based systems and are
becoming increasingly connected. Such Cyber-Physical Systems require high assurance …

Attack-graph threat modeling assessment of ambulatory medical devices

P Luckett, JT McDonald, WB Glisson - arXiv preprint arXiv:1709.05026, 2017 - arxiv.org
The continued integration of technology into all aspects of society stresses the need to
identify and understand the risk associated with assimilating new technologies. This …

[PDF][PDF] Attack prediction to enhance attack path discovery using improved attack graph

Z Al-Araji, SS Syed Ahmad, RS Abdullah - Karbala International Journal …, 2022 - iasj.net
Organisations and governments constantly face potential security attacks. However, the
need for nextgeneration cyber defence has become even more urgent in a day and age …

Countermeasure selection based on the attack and service dependency graphs for security incident management

E Doynikova, I Kotenko - Risks and Security of Internet and Systems: 10th …, 2016 - Springer
The paper suggests an approach to countermeasure selection that is based on the
application of quantitative risk metrics. The approach incorporates several techniques …

A Risk Assessment Framework for Cyber-Physical Security in Distribution Grids with Grid-Edge DERs

X Gao, M Ali, W Sun - Energies, 2024 - mdpi.com
Integration of inverter-based distributed energy resources (DERs) is reshaping the
landscape of distribution grids to fulfill the socioeconomic, environmental, and sustainability …

[图书][B] An introduction to cyber modeling and simulation

JM Couretas - 2018 - books.google.com
Introduces readers to the field of cyber modeling and simulation and examines current
developments in the US and internationally This book provides an overview of cyber …

[PDF][PDF] Integrated Repository of Security Information for Network Security Evaluation.

A Fedorchenko, IV Kotenko… - J. Wirel. Mob. Networks …, 2015 - academia.edu
Security evaluation systems usually use various information sources to estimate computer
network security. One of the important tasks in these systems is integration and storage of …

Обзор методологических примитивов для поэтапного построения модели визуализации данных

МВ Коломеец, АА Чечулин… - Информатика и …, 2015 - proceedings.spiiras.nw.ru
Аннотация В статье рассматриваются основные методологические примитивы на
примере поэтапного построения модели визуализации с заранее подготовленными …

[PDF][PDF] Исследование алгоритмов анализа сетевого трафика с использованием технологий больших данных для обнаружения компьютерных атак

НС Василишин, ИА Ушаков, ИВ Котенко - Аллея науки, 2018 - alley-science.ru
В статье предлагаются алгоритмы анализа сетевого трафика, основанные на
технологии больших данных, предназначенные для обнаружения компьютерных атак …