MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

[HTML][HTML] CROSS: A framework for cyber risk optimisation in smart homes

Y Zhang, P Malacaria, G Loukas, E Panaousis - Computers & Security, 2023 - Elsevier
This work introduces a decision support framework, called Cyber Risk Optimiser for Smart
homeS (CROSS), which advises both smart home users and smart home service providers …

[HTML][HTML] “Talking a different Language”: Anticipating adversary attack cost for cyber risk assessment

R Derbyshire, B Green, D Hutchison - Computers & Security, 2021 - Elsevier
Typical cyber security risk assessment methods focus on the system under consideration, its
vulnerabilities, and the resulting impact in the event of a system compromise. Cyber security …

Automated generation of attack graphs using NVD

MU Aksu, K Bicakci, MH Dilek, AM Ozbayoglu… - Proceedings of the …, 2018 - dl.acm.org
Today's computer networks are prone to sophisticated multi-step, multi-host attacks.
Common approaches of identifying vulnerabilities and analyzing the security of such …

GRAVITAS: Graphical reticulated attack vectors for Internet-of-Things aggregate security

J Brown, T Saha, NK Jha - IEEE Transactions on Emerging …, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of
devices connected in a complex network topology. The diversity and complexity of these …

Predicting cvss metric via description interpretation

JC Costa, T Roxo, JBF Sequeiros, H Proenca… - IEEE …, 2022 - ieeexplore.ieee.org
Cybercrime affects companies worldwide, costing millions of dollars annually. The constant
increase of threats and vulnerabilities raises the need to handle vulnerabilities in a …

[HTML][HTML] Vercasm-cps: Vulnerability analysis and cyber risk assessment for cyber-physical systems

B Northern, T Burks, M Hatcher, M Rogers… - Information, 2021 - mdpi.com
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential
to protect their assets from cyber attacks to increase the level of security, safety and …

Magic: A method for assessing cyber incidents occurrence

M Battaglioni, G Rafaiani, F Chiaraluce, M Baldi - IEEE Access, 2022 - ieeexplore.ieee.org
The assessment of cyber risk plays a crucial role for cybersecurity management, and has
become a compulsory task for certain types of companies and organizations. This makes the …

Dynamic probabilistic risk assessment for electric grid cybersecurity

X Diao, Y Zhao, C Smidts, PK Vaddi, R Li, H Lei… - Reliability Engineering & …, 2024 - Elsevier
Electric grid cybersecurity risk has become a significant concern of industries and
governments. This paper proposes a dynamic probabilistic risk assessment method for …

Automatic network restructuring and risk mitigation through business process asset dependency analysis

G Stergiopoulos, P Dedousis, D Gritzalis - Computers & Security, 2020 - Elsevier
In the 4th industrial revolution era, security of multiple interconnected devices has become a
critical issue. A rapidly increasing number of cybersecurity incidents emerge due to complex …