Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems

M Barrère, C Hankin, D O'Reilly - Computers & Security, 2023 - Elsevier
Attack graphs are a fundamental security tool focused on depicting how multi-stage attacks
can be carried out through a network to compromise specific assets and systems. While …

iMIA: Interdependent Mission Impact Assessment Using Subjective Bayesian Networks

HJ Yoon, AR Thukkaraju, S Matsumoto… - NOMS 2024-2024 …, 2024 - ieeexplore.ieee.org
A mission impact assessment (MIA) framework assesses a mission system's performance
and/or aims to identify risk factors of mission failure to take a mitigation strategy. The iMIA …

Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection

M Husák, M Javorník - 2023 IEEE Conference on …, 2023 - ieeexplore.ieee.org
Resilient IT infrastructures must maintain the required service level even when faced with
adversarial activity. Not only should we aim at minimizing the attack surface by hardening …

[HTML][HTML] Node Classification of Network Threats Leveraging Graph-Based Characterizations Using Memgraph

S Charkhabi, P Samimi, SS Bagui, D Mink, SC Bagui - Computers, 2024 - mdpi.com
This research leverages Memgraph, an open-source graph database, to analyze graph-
based network data and apply Graph Neural Networks (GNNs) for a detailed classification of …

A Framework for Infusing Cybersecurity Programs With Real-World Artificial Intelligence Education

JE DeBello, E Troja, LM Truong - 2023 IEEE Global …, 2023 - ieeexplore.ieee.org
Cybersecurity has become ubiquitous with the exponential growth of consumer applications
and Internet of Things (IoT) devices. It is a discipline which intersects other important …

Graphical Representation of UWF-ZeekData22 Using Memgraph

SS Bagui, D Mink, SC Bagui, DH Sung, F Mahmud - Electronics, 2024 - mdpi.com
This work uses Memgraph, an open-source graph data platform, to analyze, visualize, and
apply graph machine learning techniques to detect cybersecurity attack tactics in a newly …

Subjective Bayesian Network-based Interdependent Mission Impact Assessment with Game-Theoretic Attack-Defense Interactions

HJ Yoon, AR Thukkaraju, S Matsumoto… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
An accurate assessment of a mission system's performance, called Mission Impact
Assessment (MIA), can effectively identify and counteract any issues in the current system to …

A Generic Qualitative Inquiry on Cyber Professionals' Perceptions of Risk Tolerance Strategies on the Internet of Things Cyber Resilience

LY Wagner - 2024 - search.proquest.com
This research explores cybersecurity professionals' perceptions of risk tolerance strategies
to enhance Internet of Things (IoT) cyber resilience. With the rapid proliferation of IoT …

Decision Support Method and Risk Analysis Based on Merged-Cyber Security Risk Management

MV Devarajan, M Al-Farouni… - … Conference on Data …, 2024 - ieeexplore.ieee.org
The Cyber Security Risk Management is the essential part in today's business because of
quickly changing landscape of threat and presence of developing the cyber-attacks …