A logic-based model to support alert correlation in intrusion detection

B Morin, L Mé, H Debar, M Ducassé - Information Fusion, 2009 - Elsevier
Managing and supervising security in large networks has become a challenging task, as
new threats and flaws are being discovered on a daily basis. This requires an in depth and …

Vulnerability assessment methods–a review

HV Nath - International Conference on Network Security and …, 2011 - Springer
This paper reviews the major contributions in the field of Vulnerability Assessment from 1990
onwards. Even well administered networks are vulnerable to attack. Vulnerabilities are …

A description logic ontology for email phishing

F Tchakounté, D Molengar… - International Journal of …, 2020 - dergipark.org.tr
Phishing detection is an area of identifying malicious activities designed by phishers to lure
users providing sensitive information. Existing anti-phishing systems use blacklists based on …

Adaptive modelling for security analysis of networked control systems

J Wolf, F Wiezorek, F Schiller, G Hansch… - … Symposium for ICS …, 2016 - scienceopen.com
Incomplete information about connectivity and functionality of elements of networked control
systems is a challenging issue in applying model-based security analysis in practice. This …

[PDF][PDF] Automating security risk and requirements management for cyber-physical systems

G Hansch - 2020 - ediss.uni-goettingen.de
Abstract Cyber-Physical Systems enable various modern use cases and business models
such as connected vehicles, the Smart (power) Grid, or the Industrial Internet of Things. Their …

Reconciliation engine and metric for network vulnerability assessment

HV Nath, K Gangadharan… - Proceedings of the First …, 2012 - dl.acm.org
Vulnerability reconciliation is the process that analyses the output produced by one or more
vulnerability scanners and provides a more succinct and high-level view of vulnerabilities …

A logic-based approach to network security risk assessment

Y Ji, D Wen, H Wang, C **a - 2009 ISECS International …, 2009 - ieeexplore.ieee.org
An important problem in network security risk assessment is to uncover network threats due
to current software vulnerabilities and misconfigurations. This paper proposes a logic …

A fuzzy description logic model for Intrusion Detection Systems

Z Baniasadi, A Sanei, MR Omidi - 2010 5th International …, 2010 - ieeexplore.ieee.org
Today most managing network security systems, especially Intrusion Detection System
(IDS), play a significant role in computer societies and due to the evolution of threats, the use …

Vulnerability analysis of intelligent network system

D Yan, F Yang - 2009 International Conference on Networks …, 2009 - ieeexplore.ieee.org
All attacks come from the successful utilization of the vulnerabilities of the
telecommunication network or systems by the attackers. So it is the first important thing to …

[PDF][PDF] Modeling computer insecurity

S Engle, S Whalen, M Bishop - … of California at Davis, Davis, CA, 2008 - nob.cs.ucdavis.edu
In this paper, we present a formal model of computer security based on the universal Turing
machine. This model allows us to conclude that given a machine and policy, the problem of …