Verification and validation are crucial to establishing the credibility of the results of a modeling and simulation project. Conclusions drawn from an unverified and unvalidated …
UPD Ani, H He, A Tiwari - Journal of Cyber Security Technology, 2018 - Taylor & Francis
Security metrics are very crucial towards providing insights when measuring security states and susceptibilities in industrial operational environments. Obtaining practical security …
MK Ahn, YH Kim, JR Lee - Applied Sciences, 2020 - mdpi.com
With the advancement in cyber-defense capabilities, cyber attacks have continued to evolve like living creatures to breach security. Assuming the possibility of various enemy attacks, it …
Integration of existing open vulnerabilities databases allows to increase the probability of detection of vulnerable software and hardware that are used in computer networks and …
The advent of the Internet has led to an ever-increasingly interconnected world. The range of cyber-physical systems being interconnected has expanded to include power generation …
MG Ionită, VV Patriciu - 2014 10th International Conference on …, 2014 - ieeexplore.ieee.org
The only suitable option for risk assessment systems designed with real-time constraints in mind, in the present seems to be the one based on attack graphs. Even though it is not …
S Lee, D Kang - IEEE Access, 2024 - ieeexplore.ieee.org
Effective education and training of cyber professionals have been proposed as key national tasks to strengthen cybersecurity. However, traditional training does not include modeling …
MK Ahn, JR Lee - Journal of the Korea Society of Computer and …, 2020 - koreascience.kr
In this paper, we propose a system architecture and methodology based on cyber kill chain and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is …