A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions

M Ozkan-Ozay, E Akin, Ö Aslan, S Kosunalp… - IEEE …, 2024 - ieeexplore.ieee.org
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …

Probabilistic attack sequence generation and execution based on mitre att&ck for ics datasets

S Choi, JH Yun, BG Min - Proceedings of the 14th Cyber Security …, 2021 - dl.acm.org
To practically leverage a dataset, various attack situations should be created according to
the user's objective and how realistic the generated attack sequence is should be …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

Out of the cage: How stochastic parrots win in cyber security environments

M Rigaki, O Lukáš, CA Catania, S Garcia - arXiv preprint arXiv:2308.12086, 2023 - arxiv.org
Large Language Models (LLMs) have gained widespread popularity across diverse
domains involving text generation, summarization, and various natural language processing …

Nasimemu: Network attack simulator & emulator for training agents generalizing to novel scenarios

J Janisch, T Pevný, V Lisý - … Symposium on Research in Computer Security, 2023 - Springer
Current frameworks for training offensive penetration testing agents with deep reinforcement
learning struggle to produce agents that perform well in real-world scenarios, due to the …

Generation of cyberattacks leading to safety top event using altarica: an automotive case study

T Serru, N Nguyen, M Batteux, A Rauzy… - 23e Congrès de …, 2022 - hal.science
Cyber-Physical Systems (CPS) are safety critical as they can be at risk for their users and
environment. It is thus paramount to assess all risks related to their use, including the risks of …

Catch Me If You Can: Improving Adversaries in Cyber-Security With Q-Learning Algorithms

A Bandhana, O Lukáš, S Garcia, T Kroupa - arXiv preprint arXiv …, 2023 - arxiv.org
The ongoing rise in cyberattacks and the lack of skilled professionals in the cybersecurity
domain to combat these attacks show the need for automated tools capable of detecting an …

[PDF][PDF] Towards a Visual Analytics Workflow for Cybersecurity Simulations.

V Rusnák, M Drasar - VISIGRAPP (3: IVAPP), 2023 - scitepress.org
One of the contemporary grand challenges in cybersecurity research is designing and
evaluating effective attack strategies on network infrastructures performed by autonomous …

[图书][B] HeAt PATRL: Network-Agnostic Cyber Attack Campaign Triage with Pseudo-Active Transfer Learning

SF Moskal - 2021 - search.proquest.com
Abstract SOC (Security Operation Center) analysts historically struggled to keep up with the
growing sophistication and daily prevalence of cyber attackers. To aid in the detection of …