[HTML][HTML] Survey: Automatic generation of attack trees and attack graphs

AM Konsta, AL Lafuente, B Spiga, N Dragoni - Computers & Security, 2024 - Elsevier
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …

Special Issue on “Advances in condition monitoring, optimization and control for complex industrial processes”

Z Gao, MZQ Chen, D Zhang - Processes, 2021 - mdpi.com
Complex industrial automation systems and processes, such as chemical processes,
manufacturing systems, wireless network systems, power and energy systems, smart grids …

Automated Adversary-in-the-Loop Cyber-Physical Defense Planning

S Banik, T Ramachandran, A Bhattacharya… - ACM Transactions on …, 2023 - dl.acm.org
Security of cyber-physical systems (CPS) continues to pose new challenges due to the tight
integration and operational complexity of the cyber and physical components. To address …

Automated adversary emulation for cyber-physical systems via reinforcement learning

A Bhattacharya, T Ramachandran… - … on Intelligence and …, 2020 - ieeexplore.ieee.org
Adversary emulation is an offensive exercise that provides a comprehensive assessment of
a system's resilience against cyber attacks. However, adversary emulation is typically a …

Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability

Z Qu, H Shi, Y Wang, G Yin, A Abu-Siada - Processes, 2022 - mdpi.com
Vulnerable parts in the cyber-physical power system can be maliciously attacked to trigger
cascading failures. This paper proposes a defense framework with active and passive …

ICCPS: Impact discovery using causal inference for cyber attacks in CPSs

RR Maiti, S Adepu, E Lupu - arXiv preprint arXiv:2307.14161, 2023 - arxiv.org
We propose a new method to quantify the impact of cyber attacks in Cyber Physical Systems
(CPSs). In particular, our method allows to identify the Design Parameter (DPs) affected due …

Impact-Driven Sampling Strategies for Hybrid Attack Graphs

O Subasi, S Purohit, A Bhattacharya… - … on Technologies for …, 2022 - ieeexplore.ieee.org
Cyber-Physical Systems (CPSs) have a large input space, with discrete and continuous
elements across multiple layers. Hybrid Attack Graphs (HAGs) provide a flexible and efficient …

A Hybrid Attack Graph Analysis Method based on Model Checking

Y Ge, X Shen, B Xu, G He - … on Advanced Cloud and Big Data …, 2022 - ieeexplore.ieee.org
Attack graph is an essential tool for the security assessment of industrial Internet systems.
Unfortunately, the traditional attack graph mainly focuses on discrete information and cannot …

Community-based link-addition strategies for mitigating cascading failures in modern power systems

P Hu, L Lee - Processes, 2020 - mdpi.com
The propagation of cascading failures of modern power systems is mainly constrained by
the network topology and system parameter. In order to alleviate the cascading failure …

[HTML][HTML] Special Issue on “Advances in Condition Monitoring, Optimization and Control for Complex Industrial Processes.” Processes 2021, 9, 664

Z Gao, MZQ Chen, D Zhang - Advances in Condition Monitoring …, 2021 - books.google.com
Complex industrial automation systems and processes, such as chemical processes,
manufacturing systems, wireless network systems, power and energy systems, smart grids …