A survey of MulVAL extensions and their attack scenarios coverage

D Tayouri, N Baum, A Shabtai, R Puzis - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …

Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams

A Shifa, M Naveed Asghar, A Ahmed… - Journal of Ambient …, 2020 - Springer
This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a
method to auto-detect three different confidentiality levels for videos streamed from …

[图书][B] Practical Applications of Stochastic Modelling: 11th International Workshop, PASM 2022, Alicante, Spain, September 23, 2022, Revised Selected Papers

M Forshaw, K Gilly, W Knottenbelt, N Thomas - 2023 - books.google.com
This book constitutes the referred proceedings of the 11th International Workshop on
Practical Applications of Stochastic Modelling, PASM 2022, was held in Alicante, Spain, in …

Performance Modelling of Attack Graphs

O Almutairi, N Thomas - … Workshop on Practical Applications of Stochastic …, 2022 - Springer
This paper represents an initial study into using Performance Evaluation Process Algebra
(PEPA) to model and analyse attack graphs. Such an approach adds timing information into …

Performance modelling and analysis of systems under attack and misbehaviour

OM Almutairi - 2022 - theses.ncl.ac.uk
Computing systems are growing increasingly complex, incorporating multiple interactive
components. Performance is a critical attribute in evaluating computing systems. Most …