Bibliographical review on cyber attacks from a control oriented perspective

HS Sánchez, D Rotondo, T Escobet, V Puig… - Annual Reviews in …, 2019 - Elsevier
This paper presents a bibliographical review of definitions, classifications and applications
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …

[PDF][PDF] Simulation for cybersecurity: state of the art and future directions

H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …

Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model

RP Tracy, H Barrett, GM Catlin - US Patent 6,983,221, 2006 - Google Patents
A computer-assisted system, medium and method of providing a risk assessment of a target
system. The method includes providing one or more test requirements categories …

AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis

SK Shandilya, S Upadhyay, A Kumar… - Future Generation …, 2022 - Elsevier
In the current ever-changing cybersecurity scenario, active cyber defense strategies are
imperative. In this work, we present a standard testbed to measure the efficacy and efficiency …

Dependability and security models

KS Trivedi, DS Kim, A Roy… - 2009 7th International …, 2009 - ieeexplore.ieee.org
There is a need to quantify system properties methodically. Dependability and security
models have evolved nearly independently. Therefore, it is crucial to develop a classification …

Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment

RP Tracy, H Barrett, GM Catlin - US Patent 6,980,927, 2005 - Google Patents
Viding a risk assessment of a target System. The method includes electronically Scanning,
on a predetermined basis, hardware and/or Software characteristics of components within a …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …

Method and device for simulating network resiliance against attacks

SP Hassell, PF Beraud III, A Cruz, G Ganga… - US Patent …, 2018 - Google Patents
Embodiments of a system and method for a cyber modeling and simulation framework arc
generally described herein. In some embodiments, an interface (212) for ingest of network …

Attacks against computer network: Formal grammar-based framework and simulation tool

V Gorodetski, I Kotenko - International Workshop on Recent Advances in …, 2002 - Springer
The paper presents an approach and formal framework for modeling attacks against
computer network and its software implementation on the basis of a multi-agent architecture …

Session-level adversary intent-driven cyberattack simulator

M Drašar, S Moskal, S Yang… - 2020 IEEE/ACM 24th …, 2020 - ieeexplore.ieee.org
Recognizing the need for proactive analysis of cyber adversary behavior, this paper
presents a new event-driven simulation model and implementation to reveal the efforts …