A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Quantified security is a weak hypothesis: a critical survey of results and assumptions

V Verendel - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
This paper critically surveys previous work on quantitative representation and analysis of
security. Such quantified security has been presented as a general approach to precisely …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …

A cyber attack modeling and impact assessment framework

I Kotenko, A Chechulin - 2013 5th International Conference on …, 2013 - ieeexplore.ieee.org
The paper suggests a framework for cyber attack modeling and impact assessment. It is
supposed that the common approach to attack modeling and impact assessment is based …

HARMer: Cyber-attacks automation and evaluation

SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn… - IEEE …, 2020 - ieeexplore.ieee.org
With the increasing growth of cyber-attack incidences, it is important to develop innovative
and effective techniques to assess and defend networked systems against cyber attacks …

Distributed attack graph generation

K Kaynar, F Sivrikaya - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Attack graphs show possible paths that an attacker can use to intrude into a target network
and gain privileges through series of vulnerability exploits. The computation of attack graphs …

Are markets for vulnerabilities effective?

S Ransbotham, S Mitra, J Ramsey - Mis Quarterly, 2012 - JSTOR
Current reward structures in security vulnerability disclosure may be skewed toward
benefitting nefarious usage of vulnerability information rather than responsible disclosure …

Применение технологии управления информацией и событиями безопасности для защиты информации в критически важных инфраструктурах

ИВ Котенко, ИБ Саенко… - Информатика и …, 2012 - proceedings.spiiras.nw.ru
Аннотация Применение SIEM-технологии (технологии управления информацией и
событиями безопасности) является перспективным направлением в области защиты …

An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception

HS Lallie, K Debattista, J Bal - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely
recognized and welldocumented, and more effective techniques are needed to aid cyber …

Use of attack graphs in security systems

V Shandilya, CB Simmons… - Journal of Computer …, 2014 - Wiley Online Library
Attack graphs have been used to model the vulnerabilities of the systems and their potential
exploits. The successful exploits leading to the partial/total failure of the systems are subject …