A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

Assessing the effectiveness of moving target defenses using security models

JB Hong, DS Kim - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Cyber crime is a developing concern, where criminals are targeting valuable assets and
critical infrastructures within networked systems, causing a severe socio-economic impact …

Using Bayesian networks for probabilistic identification of zero-day attack paths

X Sun, J Dai, P Liu, A Singhal… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Enforcing a variety of security measures (such as intrusion detection systems, and so on)
can provide a certain level of protection to computer networks. However, such security …

PCySeMoL: Predictive, Probabilistic Cyber Security Modeling Language

H Holm, K Shahzad, M Buschle… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper presents the Predictive, Probabilistic Cyber Security Modeling Language (P 2
CySeMoL), an attack graph tool that can be used to estimate the cyber security of enterprise …

[HTML][HTML] Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies

M Barrère, C Hankin, N Nicolaou, DG Eliades… - Journal of information …, 2020 - Elsevier
Abstract In recent years, Industrial Control Systems (ICS) have become increasingly
exposed to a wide range of cyber-physical attacks, having massive destructive …

Securi cad by foreseeti: A cad tool for enterprise cyber security management

M Ekstedt, P Johnson, R Lagerström… - 2015 IEEE 19th …, 2015 - ieeexplore.ieee.org
This paper presents a CAD tool for enterprise cyber security management called securi
CAD. It is a software developed during ten years of research at KTH Royal Institute of …

After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud

S Zhang, X Zhang, X Ou - Proceedings of the 9th ACM symposium on …, 2014 - dl.acm.org
Infrastructure as a Service (IaaS) cloud has been attracting more and more customers as it
provides the highest level of flexibility by offering configurable virtual machines (VMs) and …

Security optimization of dynamic networks with probabilistic graph modeling and linear programming

HMJ Almohri, LT Watson, D Yao… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Securing the networks of large organizations is technically challenging due to the complex
configurations and constraints. Managing these networks requires rigorous and …

Predicting cyber risks through national vulnerability database

S Zhang, X Ou, D Caragea - Information Security Journal: A Global …, 2015 - Taylor & Francis
Software vulnerabilities are the major cause of cyber security problems. The National
Vulnerability Database (NVD) is a public data source that maintains standardized …