Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures

G González-Granadillo, S González-Zarzosa, R Diaz - Sensors, 2021 - mdpi.com
Security Information and Event Management (SIEM) systems have been widely deployed as
a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have …

Review on semantic modeling and simulation of cybersecurity and interoperability on the internet of underwater things

K Kotis, S Stavrinos, C Kalloniatis - Future Internet, 2022 - mdpi.com
As maritime and military missions become more and more complex and multifactorial over
the years, there has been a high interest in the research and development of (autonomous) …

Methodology for management of the protection system of smart power supply networks in the context of cyberattacks

I Kotenko, I Saenko, O Lauta, M Karpov - Energies, 2021 - mdpi.com
This paper examines an approach that allows one to build an efficient system for protecting
the information resources of smart power supply networks from cyberattacks based on the …

[PDF][PDF] Ontology of cyber security of self-recovering smart Grid

SA Petrenko, KA Makoveichuk - CEUR Workshop, 2017 - ceur-ws.org
The article describes the modern Smart Grid from the standpoint of providing resistance to
negative impacts, preventing them, and quickly restoring functions after accidents in …

Ontology of metrics for cyber security assessment

E Doynikova, A Fedorchenko, I Kotenko - Proceedings of the 14th …, 2019 - dl.acm.org
Development of metrics that are valuable for assessing security and decision making is an
important element of efficient counteraction to cyber threats. The paper proposes an …

Security assessment of computer networks based on attack graphs and security events

I Kotenko, E Doynikova - … Communication Technology: Second IFIP TC5/8 …, 2014 - Springer
Security assessment is an important task for operation of modern computer networks. The
paper suggests the security assessment technique based on attack graphs which can be …

Towards an ontology of security assessment: a core model proposal

F de Franco Rosa, M Jino, R Bonacin - Information Technology-New …, 2018 - Springer
Abstract SecAOnto (Security Assessment Ontology) aims at formalizing the knowledge on
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …

Attack hypothesis generation

A Elitzur, R Puzis, P Zilberman - 2019 European Intelligence …, 2019 - ieeexplore.ieee.org
In recent years, the perpetrators of cyber-attacks have been playing a dynamic cat and
mouse game with cybersecurity analysts who try to trace the attack and reconstruct the …

Security assurance assessment methodology for hybrid clouds

A Hudic, P Smith, ER Weippl - Computers & Security, 2017 - Elsevier
The emergence of the cloud computing paradigm has altered the delivery models for ICT
services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced …