Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph

M Javorník, M Husák - Engineering Reports, 2022 - Wiley Online Library
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …

[PDF][PDF] A proposed: integration of the Monte Carlo model and the bayes network to propose cyber security risk assessment tool for small and medium enterprises in …

T Ncubukezi - International Journal of Computer Science and …, 2020 - academia.edu
Cyber-risks have become a serious concern and a considered perspective in enterprise risk
management configuration and reporting. Cyber-risks has the potential to harm information …

Ontology-based attack graph enrichment

K Saint-Hilaire, F Cuppens, N Cuppens… - arXiv preprint arXiv …, 2022 - arxiv.org
Attack graphs provide a representation of possible actions that adversaries can perpetrate to
attack a system. They are used by cybersecurity experts to make decisions, eg, to decide …

Modeling Hybrid Attacks and Operations to Assess the Threats in Early Warning Systems

V Sherstjuk, M Zharikova, S Pickl… - 2022 12th …, 2022 - ieeexplore.ieee.org
This work presents a novel method of hybrid threat assessment based on the scenario-case
approach and is developed for use in early warning systems. Authors propose a model of …

[PDF][PDF] The Probabilistic Graphical Model for Multi-Hazard Risk Evaluation of Critical Infrastructure Impairment.

B Sakovych, M Zharikova, V Sherstjuk - CITRisk, 2022 - ceur-ws.org
In this paper, the necessity of analysing and classifying the risks of multi-hazard threats by
their origin and extent has been investigated. The proposed method of multi-hazard risk …

Automated Enrichment of Logical Attack Graphs via Formal Ontologies

K Saint-Hilaire, F Cuppens, N Cuppens… - … Conference on ICT …, 2023 - Springer
Attack graphs represent the possible actions of adversaries to attack a system. Cybersecurity
experts use them to make decisions concerning remediation and recovery plans. There are …

Hybrid Attack Modeling for Critical Energy Infrastructure Protection

M Zharikova, V Sherstjuk, S Pickl - Handbook of Smart Energy Systems, 2023 - Springer
The chapter is aimed at the development of a novel spatially and temporally referenced
model of hybrid attacks on critical energy infrastructure, based on the hierarchical spatial …

[PDF][PDF] Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions.

A Zimba, H Chen, Z Wang - Int. J. Netw. Secur., 2018 - academia.edu
Attackers have come to leverage exploits precipitated by system vulnerabilities and lapses
by using malware which otherwise tends to be noisy as it generates unusual network traffic …

[PDF][PDF] Dossier réalisé par

D LONGIN - irit.fr
Depuis la fondation de l'Intelligence Artificielle (IA), que l'on peut faire remonter à la
conférence de Dartmouth, en 1955 1, et les premières désillusions qui ont suivi, ce domaine …