A cyber-physical risk assessment approach for Internet of Things enabled transportation infrastructure

K Ntafloukas, DP McCrum, L Pasquale - Applied Sciences, 2022 - mdpi.com
Featured Application Cyber and physical security of transportation infrastructure. Abstract A
critical transportation infrastructure integrated with the Internet of Things based wireless …

[HTML][HTML] Анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности при реализации целевых атак

И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей
кибербезопасности в интересах построения перспективной системы атрибуции при …

Cyber attacker profiling for risk analysis based on machine learning

I Kotenko, E Fedorchenko, E Novikova, A Jha - Sensors, 2023 - mdpi.com
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack
forecasting, security incident investigations and security decision support. The attacker …

Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation

R Kryukov, V Zima, E Fedorchenko, E Novikova… - … Workshop on Attacks …, 2022 - Springer
Modern information systems generate a lot of events. Analysis of the events allows detecting
malicious activity within the system. There are a lot of event correlation techniques intended …

RMF: A Risk Measurement Framework for Machine Learning Models

J Schröder, J Breier - arXiv preprint arXiv:2406.12929, 2024 - arxiv.org
Machine learning (ML) models are used in many safety-and security-critical applications
nowadays. It is therefore important to measure the security of a system that uses ML as a …

Security assessment based on attack graphs using NVD and MITRE ATT & CK database for heterogeneous infrastructures

R Kryukov, EV Fedorchenko, I Kotenko… - Информационно …, 2024 - i-us.ru
Introduction: Security assessment of modern information systems is a challenging task.
These systems incorporate heterogeneous objects, things, subjects and connections …

Feature Selection for Attacker Attribution in Industrial Automation & Control Systems

A Jha, ES Novikova, D Tokarev… - 2021 IV International …, 2021 - ieeexplore.ieee.org
Modern Industrial Automation & Control Systems (IACS) are essential part of the critical
infrastructures and services. They are used in health, power, water, and transportation …

Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation

E Novikova, I Kotenko - Attacks and Defenses for the Internet-of-Things - Springer
Modern information systems generate a lot of events. Analysis of the events allows detecting
malicious activity within the system. There are a lot of event correlation techniques intended …

ВОПРОСЫ КИБЕРБЕЗОПАСНОСТИ

И КОТЕНКО, ИБ Саенко, РИ Захарченко… - ВОПРОСЫ … - elibrary.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей
кибербезопасности в интересах построения перспективной системы атрибуции при …

[PDF][PDF] Выбор атрибутов для построения профиля нарушителя информационной безопасности в автоматизированных системах управления

А Джха, Д Токарев, ЕС Новикова… - … в технических системах, 2021 - cts.etu.ru
Современные автоматизированные системы управления технологическими
процессами (АСУ ТП) являются неотъемлемой частью критически важных …