Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

Hyper attack graph: Constructing a hypergraph for cyber threat intelligence analysis

J Jia, L Yang, Y Wang, A Sang - Computers & Security, 2025 - Elsevier
Cybersecurity experts are actively exploring and implementing automated technologies to
extract and present attack information from Cyber Threat Intelligence. However, there are …

Decoding the mitre engenuity att&ck enterprise evaluation: An analysis of edr performance in real-world environments

X Shen, Z Li, G Burleigh, L Wang, Y Chen - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Endpoint detection and response (EDR) systems have emerged as a critical component of
enterprise security solutions, effectively combating endpoint threats like APT attacks with …

GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs

MR Al-Eiadeh, M Abdallah - Computers & Security, 2024 - Elsevier
We design a resource allocation framework for securing interdependent systems managed
by multiple defenders. Our framework models these multi-defender interdependent systems …

PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs

MR Al-Eiadeh, M Abdallah - International Journal of Information Security, 2025 - Springer
Interdependent systems confront rapidly growing cybersecurity threats. This paper delves
into the realm of security decision-making within these complex interdependent systems. We …

OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM

Y Jiang, Y Ren, Z Wang, Y Tang, S Lu… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
With the continuous development of information technology, the methods of network attacks
have been constantly evolving. Advanced Persistent Threat (APT) attacks are are very …

Probabilistic models for evaluating network edge's resistance against scan and foothold attack

S Wang, Q Pei, Y Xiao, F Shao, S Yuan… - IET …, 2024 - Wiley Online Library
The threat of Scan and Foothold Attack to the Network Edge (SFANE) is increasing, which
greatly affects the application and development of edge computing network architecture …

A Game Theory for Resource-Constrained Tactical Cyber Operations

J Goohs, J Dykstra, A Melaragno… - MILCOM 2024-2024 …, 2024 - ieeexplore.ieee.org
Given the ever-increasing landscape of cyberspace, the battlespace grows at a
disproportionate rate to the given tactical resources armed with proper expertise given a …

Genigraph: Genetic-Based Novel Security Resource Allocation Methods for Interdependent Systems Modeled by Attack Graphs

MR Al-Eiadeh, M Abdallah - Available at SSRN 4691595 - papers.ssrn.com
We design a resource allocation framework for securing interdependent systems managed
by multiple defenders. Our framework models these multi-defender interdependent systems …