Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

How does Endpoint Detection use the {MITRE}{ATT&CK} Framework?

A Virkud, MA Inam, A Riddle, J Liu, G Wang… - 33rd USENIX Security …, 2024 - usenix.org
MITRE ATT&CK is an open-source taxonomy of adversary tactics, techniques, and
procedures based on real-world observations. Increasingly, organizations leverage ATT&CK …

Severity-based triage of cybersecurity incidents using kill chain attack graphs

L Sadlek, MM Yamin, P Čeleda, B Katt - Journal of Information Security and …, 2025 - Elsevier
Security teams process a vast number of security events. Their security analysts spend
considerable time triaging cybersecurity alerts. Many alerts reveal incidents that must be …

V2TSA: Analysis of Vulnerability to Attack Techniques using a Semantic Approach

DY Kim, SS Yoon, IC Euom - IEEE Access, 2024 - ieeexplore.ieee.org
In recent years, vulnerabilities in industrial control systems have increased substantially. The
operational environment's availability constraints hinder penetration testing from the …

Automated Genetic Algorithms Feature Engineering for Operating System and Incident Classification in Networks

LE Valle - 2024 - search.proquest.com
Detecting and mitigating threats is paramount for maintaining the integrity of network
infrastructure. Operating System (OS) detection within local networks is a foundational …

Strategies to Mitigate Cyberattacks in Oil and Gas Companies in North America

EM Ndorh - 2024 - search.proquest.com
Cyberattacks on oil and gas companies in North America are increasingly sophisticated,
threaten critical operations, and cause business leaders to deploy security knowledge …

Games and interactions to motivate the secure and analytical mindsets of developers

L McGregor - 2023 - ros.hw.ac.uk
Today, poor developer security mindsets, lack of secure programming knowledge, and
difficult to use secure development tools, result in vulnerabilities introduced into code. To …

OWASP Top 10-listan riittävyys kyberturvallisessa verkkosovelluskehityksessä

T Jormakka - 2023 - jyx.jyu.fi
Tässä kandidaatintutkielmassa perehdytään kymmeneen yleisimpään
verkkosovelluskehityksen riskiin pohjautuen OWASP verkkosivuilta löytyvään top 10 listaan …

[PDF][PDF] 脆弱性に基づいたサイバー演習環境の構築に関する検討

真島匠海, 小早川倫広 - IEICE Conferences Archives, 2023 - ieice.org
1. 背景・目的近年, オープンソースソフトウェア (OSS) の利用が企業において急速に増加しており,
それに伴い OSS の脆弱性を狙ったサイバー攻撃が増えている [1]. サイバー攻撃の被害が増加する …