Analysis of attacks and cybersecurity in the health sector during a pandemic COVID-19: Scoping review

A Awaludin, W Sulistyadi, AF Chandra - Journal of Social Science, 2023 - jsss.co.id
COVID-19 as a global pandemic in March 2020 medical personnel and all types of patients
with various chronic conditions is undeniably the largest group of users of digital technology …

[图书][B] Verification and validation methods for extended petri nets modeling cyberattacks

WA Cantrell - 2021 - search.proquest.com
Verification and validation are crucial to establishing the credibility of the results of a
modeling and simulation project. Conclusions drawn from an unverified and unvalidated …

Методика визуализации топологии компьютерной сети для мониторинга безопасности

МВ Коломеец, АА Чечулин… - Известия высших …, 2016 - cyberleninka.ru
Разработана методика визуализации данных топологии компьютерной сети для
мониторинга безопасности, применяемого в SIEM-системах, а также системах …

A framework for Operational Security Metrics Development for industrial control environment

UPD Ani, H He, A Tiwari - Journal of Cyber Security Technology, 2018 - Taylor & Francis
Security metrics are very crucial towards providing insights when measuring security states
and susceptibilities in industrial operational environments. Obtaining practical security …

Hierarchical multi-stage cyber attack scenario modeling based on G&E model for cyber risk simulation analysis

MK Ahn, YH Kim, JR Lee - Applied Sciences, 2020 - mdpi.com
With the advancement in cyber-defense capabilities, cyber attacks have continued to evolve
like living creatures to breach security. Assuming the possibility of various enemy attacks, it …

Design of integrated vulnerabilities database for computer networks security analysis

A Fedorchenko, I Kotenko… - 2015 23rd Euromicro …, 2015 - ieeexplore.ieee.org
Integration of existing open vulnerabilities databases allows to increase the probability of
detection of vulnerable software and hardware that are used in computer networks and …

[图书][B] Modeling and simulation of cyberattacks to aid systems security engineers and cyber-physical designs to aid systems engineers

CD Colvett - 2023 - search.proquest.com
The advent of the Internet has led to an ever-increasingly interconnected world. The range of
cyber-physical systems being interconnected has expanded to include power generation …

Biologically inspired risk assessment in cyber security using neural networks

MG Ionită, VV Patriciu - 2014 10th International Conference on …, 2014 - ieeexplore.ieee.org
The only suitable option for risk assessment systems designed with real-time constraints in
mind, in the present seems to be the one based on attack graphs. Even though it is not …

Designing Simulation Logic of Cyber Operation using Cyber Security Framework

S Lee, D Kang - IEEE Access, 2024 - ieeexplore.ieee.org
Effective education and training of cyber professionals have been proposed as key national
tasks to strengthen cybersecurity. However, traditional training does not include modeling …

Research on system architecture and methodology based on MITRE ATT&CK for experiment analysis on cyber warfare simulation

MK Ahn, JR Lee - Journal of the Korea Society of Computer and …, 2020 - koreascience.kr
In this paper, we propose a system architecture and methodology based on cyber kill chain
and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is …