A systematic literature review on advanced persistent threat behaviors and its detection strategy

NI Che Mat, N Jamil, Y Yusoff… - Journal of …, 2024 - academic.oup.com
Advanced persistent threats (APTs) pose significant security-related challenges to
organizations owing to their sophisticated and persistent nature, and are inimical to the …

A threat hunting framework for industrial control systems

Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …

HARMer: Cyber-attacks automation and evaluation

SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn… - IEEE …, 2020 - ieeexplore.ieee.org
With the increasing growth of cyber-attack incidences, it is important to develop innovative
and effective techniques to assess and defend networked systems against cyber attacks …

Linking common vulnerabilities and exposures to the mitre att&ck framework: A self-distillation approach

B Ampel, S Samtani, S Ullman, H Chen - arXiv preprint arXiv:2108.01696, 2021 - arxiv.org
Due to the ever-increasing threat of cyber-attacks to critical cyber infrastructure,
organizations are focusing on building their cybersecurity knowledge base. A salient list of …

Design and development of automated threat hunting in industrial control systems

M Arafune, S Rajalakshmi, L Jaldon… - … and other Affiliated …, 2022 - ieeexplore.ieee.org
Traditional industrial systems, eg, power plants, water treatment plants, etc., were built to
operate highly isolated and controlled capacity. Recently, Industrial Control Systems (ICSs) …

Multi-layer protection approach MLPA for the detection of advanced persistent threat

N Mohamed, E Alam, GL Stubbs - Journal of Positive School …, 2022 - mail.journalppw.com
Background: The ongoing coronavirus (COVID-19) pandemic has had a profound global
impact. Although it has unexpectedly placed considerable strain on healthcare sectors, the …

[HTML][HTML] Когнитивное моделирование вектора кибератак на основе меташаблонов CAPEC

ВИ Васильев, АД Кириллова… - Вопросы …, 2021 - cyberleninka.ru
Цель исследования: автоматизация моделирования вектора сложной атаки на основе
формализованных меташаблонов CAPEC в базисе нечетких когнитивных карт. Метод …

An Adversarial Approach: Comparing Windows and Linux Security Hardness Using Mitre ATT&CK Framework for Offensive Security

HS Sikandar, U Sikander, A Anjum… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
Operating systems are essential software components for any computer. The goal of
computer system manu-facturers is to provide a safe operating system that can resist a …