Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications

RV Yohanandhan, RM Elavarasan, P Manoharan… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention
across academia, government, and industry sectors and covers a wide range of applications …

A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019 - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

Bayesian decision network-based security risk management framework

M Khosravi-Farmad, A Ghaemi-Bafghi - Journal of Network and Systems …, 2020 - Springer
Network security risk management is comprised of several essential processes, namely risk
assessment, risk mitigation and risk validation and monitoring, which should be done …

[HTML][HTML] Assessing cyber threats for storyless systems

PH Meland, DA Nesheim, K Bernsmed… - Journal of Information …, 2022 - Elsevier
A proper assessment of potential cyber threats is vital for security decision-making. This
becomes an even more challenging task when dealing with new system designs and …

A survey of MulVAL extensions and their attack scenarios coverage

D Tayouri, N Baum, A Shabtai, R Puzis - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …

Attack graph analysis: An explanatory guide

K Zenitani - Computers & Security, 2023 - Elsevier
Attack graph analysis is a model-based approach for network-security analysis. It analyzes a
directed graph called an attack graph. Usually, each node in it corresponds to a malicious …

[HTML][HTML] Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception

Z Rehman, I Gondal, M Ge, H Dong, M Gregory… - Computers & …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has become increasingly prevalent in various aspects of
our lives, enabling billions of devices to connect and communicate seamlessly. However …

[HTML][HTML] Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies

M Barrère, C Hankin, N Nicolaou, DG Eliades… - Journal of information …, 2020 - Elsevier
Abstract In recent years, Industrial Control Systems (ICS) have become increasingly
exposed to a wide range of cyber-physical attacks, having massive destructive …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …