Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

A Study of Different Awareness Campaigns in a Company

L Gamisch, D Pöhn - Proceedings of the 18th International Conference …, 2023 - dl.acm.org
Phishing is a major cyber threat to organizations that can cause financial and reputational
damage, threatening their existence. The technical measures against phishing should be …

Severity-based triage of cybersecurity incidents using kill chain attack graphs

L Sadlek, MM Yamin, P Čeleda, B Katt - Journal of Information Security and …, 2025 - Elsevier
Security teams process a vast number of security events. Their security analysts spend
considerable time triaging cybersecurity alerts. Many alerts reveal incidents that must be …

Surgical immunization strategies against lateral movement in Active Directory environments

D Herranz-Oliveros, I Marsa-Maestre… - Journal of Network and …, 2024 - Elsevier
Lateral movement, in which a cyber attacker progresses through an enterprise network in
order to compromise its most valuable assets, is a key stage of any intrusion nowadays …

Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification

Á Ruman, M Drašar, L Sadlek, SJ Yang… - Proceedings of the 19th …, 2024 - dl.acm.org
Diverse, accurate, and up-to-date training environments are essential for training
cybersecurity experts and autonomous systems. However, preparation of their content is …

Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs

L Sadlek, M Husák, P Čeleda - 2024 20th International …, 2024 - ieeexplore.ieee.org
Cyber threat modeling is a proactive method for identifying possible cyber attacks on
network infrastructure that has a wide range of applications in security assessment, risk …

Boosting D3FEND: Ontological analysis and recommendations

Í Oliveira, G Engelberg, PPF Barcelos… - Formal Ontology in …, 2023 - ebooks.iospress.nl
Formal Ontology is a discipline whose business is to develop formal theories about general
aspects of reality such as identity, dependence, parthood, truthmaking, causality, etc. A …

Optimal Attack Path Planning based on Reinforcement Learning and Cyber Threat Knowledge Graph Combining the ATT&CK for Air Traffic Management System

C Liu, B Wang, F Li, J Tian, Y Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the development of the Air Traffic Management System (ATM), the ATM network has
transitioned from a closed physical isolation network to an open Cyber-Physical System …

[HTML][HTML] Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios

S Abbaspour Asadollah, S Imtiaz… - … of Cybersecurity and …, 2024 - mdpi.com
Integration of the Internet of Things (IoT) in industrial settings necessitates robust
cybersecurity measures to mitigate risks such as data leakage, vulnerability exploitation, and …

Методы интеллектуального анализа системных событий для обнаружения многошаговых кибератак: использование методов машинного обучения

ИВ Котенко, ДА Левшун - Искусственный интеллект и принятие …, 2023 - elibrary.ru
В данном исследовании представлена классификация и сравнительный анализ
методов интеллектуального анализа системных событий, применяемых для …