This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
VL Shivraj, MA Rajan… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Rapid deployment of Internet of Things (IoT) systems around the digital world is posing greater risks in terms of security and privacy. For IoT, risk assessment is complex due to its …
The identification and analysis of potential paths that an adversary may exploit to attack Cyber Physical Systems comprising sub-systems enables the comprehensive …
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state- of-the-art perspective as well as a systematic overview of the recent advances in different …
D Bodeau, R Graubart - The MITRE Corporation, Bedford, MA, 2013 - apps.dtic.mil
This paper presents a vocabulary for stating claims or hypotheses about the effects of cyber mission assurance decisions on cyber adversary behavior. Cyber mission assurance …
D Bodeau, R Graubart… - MTR130432, MITRE …, 2013 - researchgate.net
This paper presents a vocabulary for stating claims or hypotheses about the effects of cyber mission assurance decisions on cyber adversary behavior. Cyber mission assurance …
In smart grids, managing and controlling power operations are supported by information and communication technology (ICT) and supervisory control and data acquisition (SCADA) …
H Polad, R Puzis, B Shapira - … , CSCML 2017, Beer-Sheva, Israel, June 29 …, 2017 - Springer
Before executing an attack, adversaries usually explore the victim's network in an attempt to infer the network topology and identify vulnerabilities in the victim's servers and personal …