A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

A graph theory based generic risk assessment framework for internet of things (IoT)

VL Shivraj, MA Rajan… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Rapid deployment of Internet of Things (IoT) systems around the digital world is posing
greater risks in terms of security and privacy. For IoT, risk assessment is complex due to its …

Attack path analysis for cyber physical systems

G Kavallieratos, S Katsikas - … , and ADIoT, Guildford, UK, September 14–18 …, 2020 - Springer
The identification and analysis of potential paths that an adversary may exploit to attack
Cyber Physical Systems comprising sub-systems enables the comprehensive …

Cyber-Security Threats, Actors, and Dynamic Mitigation

N Kolokotronis, S Shiaeles - 2021 - books.google.com
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-
of-the-art perspective as well as a systematic overview of the recent advances in different …

Characterizing effects on the cyber adversary: A vocabulary for analysis and assessment

D Bodeau, R Graubart - The MITRE Corporation, Bedford, MA, 2013 - apps.dtic.mil
This paper presents a vocabulary for stating claims or hypotheses about the effects of cyber
mission assurance decisions on cyber adversary behavior. Cyber mission assurance …

[PDF][PDF] Characterizing effects on the cyber adversary

D Bodeau, R Graubart… - MTR130432, MITRE …, 2013 - researchgate.net
This paper presents a vocabulary for stating claims or hypotheses about the effects of cyber
mission assurance decisions on cyber adversary behavior. Cyber mission assurance …

[PDF][PDF] Threat assessment for multistage cyber attacks in smart grid communication networks

X He - 2017 - opus4.kobv.de
In smart grids, managing and controlling power operations are supported by information and
communication technology (ICT) and supervisory control and data acquisition (SCADA) …

Attack graph obfuscation

H Polad, R Puzis, B Shapira - … , CSCML 2017, Beer-Sheva, Israel, June 29 …, 2017 - Springer
Before executing an attack, adversaries usually explore the victim's network in an attempt to
infer the network topology and identify vulnerabilities in the victim's servers and personal …

[PDF][PDF] 基于属性邻接矩阵的攻击图表示方法研究

苏婷婷, 潘晓中, 肖海燕, 申军伟 - 电子与信息学报, 2012 - jeit.ac.cn
为降低攻击图的复杂度, 方便安全人员的理解分析, 该文提出了属性邻接矩阵的表示方法,
并设计了多步邻接矩阵的算法. 利用邻接矩阵元素表示目标网络中各属性的连接关系 …