D Tayouri, N Baum, A Shabtai, R Puzis - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations employ various adversary models to assess the risk and potential impact of attacks on their networks. A popular method of visually representing cyber risks is the attack …
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for …
N Mohamed, SK Almazrouei, A Oubelaid… - Wireless …, 2022 - Wiley Online Library
Several security tools have been described in recent times to assist security teams; however, the effectiveness and success remain limited to specific devices. Phishing is a type of …
S Choi, JH Yun, BG Min - Proceedings of the 14th Cyber Security …, 2021 - dl.acm.org
To practically leverage a dataset, various attack situations should be created according to the user's objective and how realistic the generated attack sequence is should be …
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and techniques, has been widely adopted by the cybersecurity industry as well as by academic …
A Happe, J Cito - Proceedings of the 31st ACM Joint European Software …, 2023 - dl.acm.org
Offensive security-tests are commonly employed to pro-actively discover potential vulnerabilities. They are performed by specialists, also known as penetration-testers or white …
Social engineering attacks are widespread, costly, and challenging to mitigate through technical means. Companies allocate considerable resources toward security education …
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack forecasting, security incident investigations and security decision support. The attacker …
X Wang, X Yang, X Liang, X Zhang, W Zhang… - Computers & …, 2024 - Elsevier
Alert fatigue problems can have serious consequences for the enterprise security. When analysts become overwhelmed by the sheer number of alerts, high-risk alerts may go …