A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

The flying car—challenges and strategies toward future adoption

SS Ahmed, KF Hulme, G Fountas, U Eker… - Frontiers in Built …, 2020 - frontiersin.org
In recent years, our surface transportation infrastructure is suffering from overuse, extreme
traffic congestion, and roadway disrepair. Instead of following the traditional infrastructure …

Risk assessment method of IoT host based on attack graph

H Yang, H Yuan, L Zhang - Mobile Networks and Applications, 2023 - Springer
With the rapid development and widespread application of the Internet of things (IoT), how to
comprehensively and effectively evaluate the risk of the host in the IoT is of great …

基于攻击图的主机安全评估方法

杨宏宇, 袁海航, 张良 - 通信学报, 2022 - infocomm-journal.com
针对目前主机安全评估方法中无法准确计算主机安全值, 忽略攻击图中主机关联性等问题,
提出一种基于攻击图的主机安全评估方法. 首先, 生成主机攻击图, 从漏洞自身, 时间 …

Cybersecurity: Time series predictive modeling of vulnerabilities of desktop operating system using linear and non-linear approach

NR Pokhrel, H Rodrigo… - Journal of Information …, 2017 - scholarworks.utrgv.edu
Vulnerability forecasting models help us to predict the number of vulnerabilities that may
occur in the future for a given Operating System (OS). There exist few models that focus on …

The information system for critical use access process dependability modeling

OV Bisikalo, VV Kovtun… - 2019 9th International …, 2019 - ieeexplore.ieee.org
Objective reasons for the introduction of multi-server architecture for the creation of
information systems for critical use (ISCU) have led to complications in ensuring their …

基于贝叶斯攻击图的SDN 入侵意图识别算法的研究

罗智勇, 张玉, 王青, 宋伟伟 - 通信学报, 2023 - infocomm-journal.com
针对目前已有的软件定义网络(SDN) 安全预测方法中未考虑攻击代价以及控制器漏洞对SDN
安全所产生的影响, 提出了一种基于贝叶斯攻击图的SDN 入侵意图识别算法. 利用PageRank …

Machine learning approach to predict computer operating systems vulnerabilities

F Alenezi, CP Tsokos - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
Information security is everyone's concern. Computer systems are used to store sensitive
data. Any weakness in their reliability and security makes them vulnerable. The Common …

一种基于主机重要度的网络主机节点风险评估方法

杨宏宇, 袁海航, 张良 - 北京邮电大学学报, 2022 - journal.bupt.edu.cn
现有依据攻击图评估网络主机节点方法中的原子攻击概率和资产保护价值计算时,
未考虑主机节点间关联关系对主机节点风险值的影响. 对此, 提出了以网络中主机重要程度为 …

Attack Scenarios Generation Algorithm Based on Discrete Event System Formalism

A Raynaud, T Serru, N Nguyen - ACM SIGAda Ada Letters, 2024 - dl.acm.org
To help automatize the security risk assessment process of Cyber-Physical Systems (CPS),
we propose a tool based on Discrete Event Systems (DES) to model the architecture and the …