Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications

RV Yohanandhan, RM Elavarasan, P Manoharan… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention
across academia, government, and industry sectors and covers a wide range of applications …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model

Y Jia, Z Gu, L Du, Y Long, Y Wang, J Li… - Knowledge-Based …, 2023 - Elsevier
Smart cities have attracted a lot of attention from interdisciplinary research, and plenty of
artificial intelligence based solutions have been proposed. However, cyber security has …

[HTML][HTML] Attack dynamics: An automatic attack graph generation framework based on system topology, CAPEC, CWE, and CVE databases

C Hankin, P Malacaria - Computers & Security, 2022 - Elsevier
Through a built-in security analysis feature based on metadata, this article provides a novel
framework that starts with a scenario input and produces a collection of visualizations based …

A survey on policies, modelling and security of cyber‐physical systems in smart grids

Q Wang, G Zhang, F Wen - Energy Conversion and Economics, 2021 - Wiley Online Library
A more reliable, efficient, and resilient smart grid depends on the applications of advanced
information and communication technologies to support new functions and controls. The …

Including insider threats into risk management through Bayesian threat graph networks

N d'Ambrosio, G Perrone, SP Romano - Computers & Security, 2023 - Elsevier
Cybersecurity incidents do represent a serious danger for companies. In fact, the number of
cyber crimes is exponentially growing in a scenario where the global COVID-19 pandemic …

Attack graph analysis: An explanatory guide

K Zenitani - Computers & Security, 2023 - Elsevier
Attack graph analysis is a model-based approach for network-security analysis. It analyzes a
directed graph called an attack graph. Usually, each node in it corresponds to a malicious …

An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers

AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …

An intelligence-driven security-aware defense mechanism for advanced persistent threats

Y Li, W Dai, J Bai, X Gan, J Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Combined with many different attack forms, advanced persistent threats (APTs) are
becoming a major threat to cyber security. Existing security protection works typically either …

Model-Based Cybersecurity Analysis: Extending Enterprise Modeling to Critical Infrastructure Cybersecurity

Y Jiang, MA Jeusfeld, J Ding, E Sandahl - Business & Information Systems …, 2023 - Springer
Critical infrastructure (CIs) such as power grids link a plethora of physical components from
many different vendors to the software systems that control them. These systems are …