[HTML][HTML] Improving IT Architecture Modeling Through Automation: Cyber Security Analysis of Smart Grids

M Välja - 2018 - diva-portal.org
Contemporary organizations depend on IT to reach their goals but the organizations are
constantly adapting to changing market conditions and these changes need to be reflected …

Determination of security threat classes on the basis of vulnerability analysis for automated countermeasure selection

E Doynikova, A Fedorchenko, I Kotenko - Proceedings of the 13th …, 2018 - dl.acm.org
Currently the task of automated security monitoring and responding to security incidents is
highly relevant. The authors propose an approach to determine weaknesses of the analyzed …

[PDF][PDF] Attack graph generation algorithm implementation

J Klos - is.muni.cz
MulVAL is a logic programming based open source framework for analyzing network for
possible attack paths an intruder might take when exploiting security vulnerabilities. This …

Generation and analysis of attack graphs on computer networks

A Janse van Rensburg - 2018 - ora.ox.ac.uk
The complexity of computer network attacks requires a sophisticated understanding of
network security. Attackers combine seemingly inconsequential vulnerabilities into …